Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pin it! Improving Android network security at runtime., , , and . Networking, page 297-305. IEEE Computer Society, (2016)Notary-Assisted Certificate Pinning for Improved Security of Android Apps., , , and . ARES, page 365-371. IEEE Computer Society, (2016)Catch Me if You Can! Transparent Detection of Shellcode., , and . ICSSA, page 60-63. IEEE, (2016)Network Security Challenges in Android Applications., , , , and . ARES, page 327-332. IEEE Computer Society, (2015)u'smile - Secure Mobile Environments., , , and . ERCIM News, (2017)Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs., , , and . ARES, page 53:1-53:9. ACM, (2019)Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools., , , , , , and . EuroS&P, page 319-333. IEEE, (2017)FLASH: Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage & Its Security and Privacy Implications., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 9 (4): 26-40 (2018)Block Cipher Defined by Matrix Presentation of Quasigroups., , , , , and . IACR Cryptol. ePrint Arch., (2021)Discovering Cryptographic Algorithms in Binary Code Through Loop Enumeration., , , and . ICSSA, page 80-86. IEEE, (2017)