Author of the publication

The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface.

, , , , and . Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 126-138. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Metrics for the Android Ecosystem., , and . SPSM@CCS, page 87-98. ACM, (2015)Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict., , , , , and . CoRR, (2022)When will my PLC support Mirai? The security economics of large-scale attacks against Internet-connected ICS devices., , and . eCrime, page 1-14. IEEE, (2020)The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface., , , , and . Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 126-138. Springer, (2015)Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict., , , , , and . WWW, page 1596-1607. ACM, (2024)Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks., , , and . Internet Measurement Conference, page 50-64. ACM, (2019)Measuring eWhoring., , , and . Internet Measurement Conference, page 463-477. ACM, (2019)Ethical issues in research using datasets of illicit origin., , , , and . Internet Measurement Conference, page 445-462. ACM, (2017)Device analyzer: a privacy-aware platform to support research on the Android ecosystem., , , and . WISEC, page 34:1-34:2. ACM, (2015)Security metrics for computer systems. Cambridge Computer Laboratory, University of Cambridge, (September 2015)