Author of the publication

Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications.

, , , , and . EuroS&P, page 190-203. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack., , , , , and . CoRR, (2020)The Misuse of Android Unix Domain Sockets and Security Implications., , , , and . ACM Conference on Computer and Communications Security, page 80-91. ACM, (2016)Demo: Security of Deep Learning based Automated Lane Centering under Physical-World Attack., , , , , and . SP (Workshops), page 244. IEEE, (2021)Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE., , , , , , , and . MobiCom, page 452-463. ACM, (2015)ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms., , , , , , and . NDSS, The Internet Society, (2017)TrafficNet: An open naturalistic driving scenario library., , and . ITSC, page 1-8. IEEE, (2017)Towards secure and safe appified automated vehicles., , , and . Intelligent Vehicles Symposium, page 705-711. IEEE, (2017)Hold Tight and Never Let Go: Security of Deep Learning based Automated Lane Centering under Physical-World Attack., , , , , and . CoRR, (2020)Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications., , , , and . EuroS&P, page 190-203. IEEE, (2017)Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks., , , , and . CCS, page 388-400. ACM, (2015)