Author of the publication

Jekyll on iOS: When Benign Apps Become Evil.

, , , , and . USENIX Security Symposium, page 559-572. USENIX Association, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation., and . ACM Conference on Computer and Communications Security, page 2149-2150. ACM, (2020)BLADE: an attack-agnostic approach for preventing drive-by malware infections., , , and . ACM Conference on Computer and Communications Security, page 440-450. ACM, (2010)AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis., , , , and . CoRR, (2023)Research and development of autism diagnosis information system based on deep convolution neural network and facial expression data., and . Libr. Hi Tech, 38 (4): 799-817 (2020)A Study of Multi-Factor and Risk-Based Authentication Availability., , , , , , and . USENIX Security Symposium, page 2043-2060. USENIX Association, (2023)Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps., , , and . USENIX Security Symposium, page 1955-1972. USENIX Association, (2021)On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers., , , , and . IEEE Trans. Dependable Secur. Comput., 21 (1): 419-433 (January 2024)Breaking Embedded Software Homogeneity with Protocol Mutations., , , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 770-790. Springer, (2022)Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy., , , , , and . ISC, volume 13118 of Lecture Notes in Computer Science, page 161-176. Springer, (2021)(t, p)-Threshold point function secret sharing scheme based on polynomial interpolation and its application., , , , and . UCC, page 269-275. ACM, (2016)