From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps., , , , , , , и . USENIX Security Symposium, стр. 6665-6682. USENIX Association, (2023)BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks., , , , и . RAID, стр. 397-411. USENIX Association, (2020)Security Evaluation of Smart Contracts based on Code and Transaction - A Survey., , , и . ICSS, стр. 41-48. IEEE, (2022)Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems., , , , , и . NDSS, The Internet Society, (2022)SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis., , , и . ISSTA, стр. 980-991. ACM, (2023)Understanding Malicious Cross-library Data Harvesting on Android., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 4133-4150. USENIX Association, (2021)On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices., , , и . NDSS, The Internet Society, (2021)DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator., , , , , , и . DSN, стр. 480-493. IEEE, (2023)SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services., , , , , и . DSN, стр. 534-546. IEEE, (2022)SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding., , , и . ASE, стр. 294-306. IEEE, (2023)