Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting., , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1334-1349 (2021)Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls., , , , , , , , and . CoRR, (2023)Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods., , , , , , , and . StudentWorkshop@CoNEXT, page 26-28. ACM, (2022)In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes., , , , , , , , , and 1 other author(s). IMC, page 437-456. ACM, (2023)Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem., , , , , , and . USENIX Security Symposium, page 2115-2132. USENIX Association, (2023)Blind In/On-Path Attacks and Applications to VPNs., , , , and . USENIX Security Symposium, page 3129-3146. USENIX Association, (2021)Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API., , and . EuroS&P, page 832-846. IEEE, (2023)Understanding Incentivized Mobile App Installs on Google Play Store., , , , , and . Internet Measurement Conference, page 696-709. ACM, (2020)50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System., , , , , and . USENIX Security Symposium, page 603-620. USENIX Association, (2019)Not Your Average App: A Large-scale Privacy Analysis of Android Browsers., , , , , , and . CoRR, (2022)