Author of the publication

Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.

, , , , , and . USENIX Security Symposium, page 2759-2776. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis., , and . USENIX Security Symposium, page 1153-1168. USENIX Association, (2016)OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary., , , , , , , and . SP, page 813-832. IEEE, (2021)Precise Android API Protection Mapping Derivation and Reasoning., , , , and . CCS, page 1151-1164. ACM, (2018)Poirot: Probabilistically Recommending Protections for the Android Framework., , and . CCS, page 937-950. ACM, (2022)Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References., , , , , , , , and . CCS, page 1248-1259. ACM, (2015)Finding client-side business flow tampering vulnerabilities., , , , , , and . ICSE, page 222-233. ACM, (2020)PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning., , , , , , , and . SP, page 1121-1138. IEEE, (2020)DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android., , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 86-103. Springer, (2013)Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing., , , , , and . USENIX Security Symposium, page 2759-2776. USENIX Association, (2021)Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach., , , , , , , and . CCS, page 801-816. ACM, (2018)