From post

Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts.

, , , , , , , и . PAM, том 10176 из Lecture Notes in Computer Science, стр. 100-112. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World., , , , , , , , , и . ACM Conference on Computer and Communications Security, стр. 1701-1713. ACM, (2018)The Misuse of Android Unix Domain Sockets and Security Implications., , , , и . ACM Conference on Computer and Communications Security, стр. 80-91. ACM, (2016)Top of the Heap: Efficient Memory Error Protection for Many Heap Objects., , , , , и . CoRR, (2023)Discover and Tame Long-running Idling Processes in Enterprise Systems., , , , , , , и . AsiaCCS, стр. 543-554. ACM, (2015)Collaborative TCP sequence number inference attack: how to crack sequence number under a second., , и . CCS, стр. 593-604. ACM, (2012)SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers., , , и . CCS, стр. 749-763. ACM, (2021)Assisting Static Analysis with Large Language Models: A ChatGPT Experiment., , , и . ESEC/SIGSOFT FSE, стр. 2107-2111. ACM, (2023)A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel., , , , , и . USENIX Security Symposium, стр. 4211-4228. USENIX Association, (2023)App in the Middle: Demystify Application Virtualization in Android and its Security Threats., , , , , , , и . SIGMETRICS (Abstracts), стр. 75-76. ACM, (2019)The Taming of the Stack: Isolating Stack Data from Memory Errors., , , , , , и . NDSS, The Internet Society, (2022)