Author of the publication

Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code.

, , , , , , and . INFOCOM, page 550-558. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable analysis of interaction threats in IoT systems., , and . ISSTA, page 272-285. ACM, (2020)BLAFS: A Bloat Aware File System., , and . CoRR, (2023)Machine Learning Systems are Bloated and Vulnerable., , , , , and . Proc. ACM Meas. Anal. Comput. Syst., 8 (1): 6:1-6:30 (2024)Software Quality Assessment for Robot Operating System.. CoRR, (2020)Machine Learning Containers are Bloated and Vulnerable., , , , , , and . CoRR, (2022)DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code., , , , , , and . INFOCOM, page 550-558. IEEE, (2019)Boosting Usability for Protecting Online Banking Applications Against APTs., and . CCC, page 70-76. IEEE, (2016)slash: A Technique for Static Configuration-Logic Identification., , , , and . CoRR, (2023)Practical Data Access Minimization in Trigger-Action Platforms., , , , and . USENIX Security Symposium, page 2929-2945. USENIX Association, (2022)