Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications., , and . USENIX Security Symposium, page 5467-5484. USENIX Association, (2023)Shooter Localization Based on TDOA and N-Shape Length Measurements of Distributed Microphones., , , and . FUSION, page 1-8. IEEE, (2021)Raccoon: automated verification of guarded race conditions in web applications., , , and . SAC, page 1678-1687. ACM, (2020)Using Algorithm Selection for Adaptive Vehicle Perception Aboard UAV., , and . AVSS, page 1-8. IEEE, (2019)FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities., , , , and . NDSS, The Internet Society, (2023)Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications., , , and . CCS, page 3576-3578. ACM, (2023)Keeping Privacy Labels Honest., , , , and . Proc. Priv. Enhancing Technol., 2022 (4): 486-506 (2022)A Black-Box Privacy Analysis of Messaging Service Providers' Chat Message Processing., , , , and . Proc. Priv. Enhancing Technol., 2024 (3): 674-691 (2024)SSRF vs. Developers: A Study of SSRF-Defenses in PHP Applications., , , and . USENIX Security Symposium, USENIX Association, (2024)Manufacturing of polygon fiber reinforced plastic profiles by rotational molding and intrinsic hybridization., , and . Prod. Eng., 9 (3): 317-328 (2015)