Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Where's Wally?: Precise User Discovery Attacks in Location Proximity Services., , , , and . ACM Conference on Computer and Communications Security, page 817-828. ACM, (2015)Evaluating the Privacy Guarantees of Location Proximity Services., , , , and . ACM Trans. Priv. Secur., 19 (4): 12:1-12:31 (2017)I Forgot Your Password: Randomness Attacks Against PHP Applications., and . USENIX Security Symposium, page 81-96. USENIX Association, (2012)Blueprints for a Large-Scale Early Warning System., , , , , , , and . Panhellenic Conference on Informatics, page 7-11. IEEE Computer Society, (2010)HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations., , , , and . IEEE Symposium on Security and Privacy, page 521-538. IEEE Computer Society, (2017)The Learnability of Symbolic Automata., and . CAV (1), volume 10981 of Lecture Notes in Computer Science, page 427-445. Springer, (2018)SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning., , , , and . CCS, page 1690-1701. ACM, (2016)Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters., , , and . IEEE Symposium on Security and Privacy, page 91-109. IEEE Computer Society, (2016)Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks., , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 565-585. Springer, (2019)