Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices., , , , , , , and . CoRR, (2022)5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol., , , , and . ACM Conference on Computer and Communications Security, page 669-684. ACM, (2019)Seamless and Secure Bluetooth LE Connection Migration., , , and . CODASPY, page 147-149. ACM, (2017)Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices., , , and . IEEE Trans. Mob. Comput., 17 (4): 927-944 (2018)Insecure connection bootstrapping in cellular networks: the root of all evil., , , , and . WiSec, page 1-11. ACM, (2019)Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy., , , , and . WISEC, page 133-143. ACM, (2020)LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE., , , and . NDSS, The Internet Society, (2018)SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices., , , and . EWSN, page 132-143. Junction Publishing, Canada / ACM, (2017)In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping., , and . USENIX Security Symposium, USENIX Association, (2024)Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands., , , , , , and . USENIX Security Symposium, USENIX Association, (2024)