Author of the publication

Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.

, , , , , and . NDSS, The Internet Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security., , , , and . AsiaCCS, page 8-9. ACM, (2012)Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface., , , , , , and . IEEE Trans. Mob. Comput., 17 (11): 2675-2688 (2018)SpellBound: Defending Against Package Typosquatting., , , , and . CoRR, (2020)WebShield: Enabling Various Web Defense Techniques without Client Side Modifications., , , , , , and . NDSS, The Internet Society, (2011)Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks., , , , and . EuroS&P, page 480-495. IEEE, (2019)Measurements in OLPC mesh networks., , and . WiOpt, page 1-6. IEEE, (2009)AppsPlayground: automatic security analysis of smartphone applications., , and . CODASPY, page 209-220. ACM, (2013)Redefining web browser principals with a Configurable Origin Policy., , , , and . DSN, page 1-12. IEEE Computer Society, (2013)Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android., , , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 256-276. Springer, (2015)All your Google and Facebook logins are belong to us: A case for single sign-off., and . IC3, page 416-421. IEEE Computer Society, (2015)