Author of the publication

Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection.

, , , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 130-149. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BareDroid: Large-Scale Analysis of Android Apps on Real Devices., , , , , , , and . ACSAC, page 71-80. ACM, (2015)Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security., , , and . SAC, page 1649-1656. ACM, (2014)You are what you include: large-scale evaluation of remote javascript inclusions., , , , , , , and . CCS, page 736-747. ACM, (2012)What the App is That? Deception and Countermeasures in the Android User Interface., , , , , and . IEEE Symposium on Security and Privacy, page 931-948. IEEE Computer Society, (2015)Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection., , , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 130-149. Springer, (2014)Nazca: Detecting Malware Distribution in Large-Scale Networks., , , , , , , and . NDSS, The Internet Society, (2014)Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning., , , , , and . CoRR, (2023)Hybrid Post-Quantum Signatures in Hardware Security Keys., , , , , , , , and . IACR Cryptol. ePrint Arch., (2022)Understanding the Mirai Botnet., , , , , , , , , and 9 other author(s). USENIX Security Symposium, page 1093-1110. USENIX Association, (2017)Ten Years of iCTF: The Good, The Bad, and The Ugly., , , , , , , and . 3GSE, USENIX Association, (2014)