Author of the publication

Jekyll on iOS: When Benign Apps Become Evil.

, , , , and . USENIX Security Symposium, page 559-572. USENIX Association, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications., , , and . NDSS, The Internet Society, (2014)PUMM: Preventing Use-After-Free Using Execution Unit Partitioning., , , and . USENIX Security Symposium, page 823-840. USENIX Association, (2023)Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search., , , , and . USENIX Security Symposium, page 911-928. USENIX Association, (2021)On Random-Inspection-Based Intrusion Detection., and . RAID, volume 3858 of Lecture Notes in Computer Science, page 165-184. Springer, (2005)Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop., , , and . IEEE Symposium on Security and Privacy, page 1041-1057. IEEE Computer Society, (2017)Advanced Allergy Attacks: Does a Corpus Really Help?, and . RAID, volume 4637 of Lecture Notes in Computer Science, page 236-255. Springer, (2007)Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis., , , and . CCS, page 320-336. ACM, (2021)ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems., , , , , and . USENIX Security Symposium, page 1989-2006. USENIX Association, (2021)On the Feasibility of Automating Stock Market Manipulation., , , , , and . ACSAC, page 277-290. ACM, (2020)Swarm Attacks against Network-Level Emulation/Analysis., and . RAID, volume 5230 of Lecture Notes in Computer Science, page 175-190. Springer, (2008)