Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web., and . NDSS, The Internet Society, (2021)Information-Flow Control for Database-Backed Applications., , , , and . EuroS&P, page 79-94. IEEE, (2019)Friendly Fire: Cross-app Interactions in IoT Platforms., , , and . ACM Trans. Priv. Secur., 24 (3): 16:1-16:40 (2021)Language Support for Secure Software Development with Enclaves., , , and . CSF, page 1-16. IEEE, (2021)SandTrap: Securing JavaScript-driven Trigger-Action Platforms., , , , and . USENIX Security Symposium, page 2899-2916. USENIX Association, (2021)Unveiling the Invisible: Detection and Evaluation of Prototype Pollution Gadgets with Dynamic Taint Analysis., , and . WWW, page 1800-1811. ACM, (2024)Explicit Secrecy: A Policy for Taint Tracking., , , and . EuroS&P, page 15-30. IEEE, (2016)Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis., , and . ICSA, page 191-200. IEEE, (2019)Securing Cross-App Interactions in IoT Platforms., , and . CSF, page 319-334. IEEE, (2019)Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly., , and . SecDev, page 94-102. IEEE, (2021)