Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resolving the Predicament of Android Custom Permissions., , , and . NDSS, The Internet Society, (2018)Practical least privilege for cross-origin interactions on mobile operating systems. University of Illinois Urbana-Champaign, USA, (2019)Smart LaBLEs: Proximity, Autoconfiguration, and a Constant Supply of Gatorade(TM)., , , and . SEC, page 142-154. IEEE Computer Society, (2016)(In)Security of File Uploads in Node.js., , , , , and . WWW, page 1573-1584. ACM, (2024)Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android., , and . ACM Conference on Computer and Communications Security, page 104-115. ACM, (2016)Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security., , , , , and . CoRR, (2020)Evaluating User Behavior in Smartphone Security: A Psychometric Perspective., , , , , and . SOUPS, page 509-524. USENIX Association, (2023)Demo: SaveAlert: design for a sensor-driven CrowdWatch danger detection system., , and . MobiSys, page 362-363. ACM, (2014)Participant recruitment and data collection framework for opportunistic sensing: a comparative analysis., , and . CHANTS@MobiCom, page 25-30. ACM, (2013)See No Evil: Phishing for Permissions with False Transparency., , and . USENIX Security Symposium, page 415-432. USENIX Association, (2020)