Author of the publication

Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.

, , , , and . NDSS, The Internet Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preventing Capability Abuse through Systematic Analysis of Exposed Interface.. University of Michigan, USA, (2019)Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework., , , , and . NDSS, The Internet Society, (2016)Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks., , , , and . CCS, page 388-400. ACM, (2015)Towards Automated Safety Vetting of PLC Code in Real-World Plants., , , , , , , , , and 1 other author(s). IEEE Symposium on Security and Privacy, page 522-538. IEEE, (2019)The Misuse of Android Unix Domain Sockets and Security Implications., , , , and . ACM Conference on Computer and Communications Security, page 80-91. ACM, (2016)A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications., , , , and . EuroSys, page 31:1-31:14. ACM, (2019)ADD: Application and Data-Driven Controller Design., , , , , and . SOSR, page 84-90. ACM, (2019)On Tracking Information Flows through JNI in Android Applications., , , and . DSN, page 180-191. IEEE Computer Society, (2014)Towards a scalable resource-driven approach for detecting repackaged Android applications., , , , and . ACSAC, page 56-65. ACM, (2014)