Author of the publication

"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.

, , , , , and . ACM Conference on Computer and Communications Security, page 791-804. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatically Identifying Trigger-based Behavior in Malware., , , , , and . Botnet Detection, volume 36 of Advances in Information Security, Springer, (2008)Immunizing Servers from Buffer-Overflow Attacks, , and . Adaptive and Resilient Computing Security Workshop, (November 2004)Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions., , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 859-876. Springer, (2012)Expanding Malware Defense by Securing Software Installations., , , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 164-185. Springer, (2008)Automated identification of sensitive data from implicit user specification., and . Cybersecurity, 1 (1): 13 (2018)Automated Identification of Sensitive Data via Flexible User Requirements., and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 151-171. Springer, (2018)Scrutinizing Implementations of Smart Home Integrations., , , , , , and . IEEE Trans. Software Eng., 47 (12): 2667-2683 (2021)Golden implementation driven software debugging., , , and . SIGSOFT FSE, page 177-186. ACM, (2010)A Usage-Pattern Perspective for Privacy Ranking of Android Apps., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 245-256. Springer, (2014)Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis., , , , and . NDSS, The Internet Society, (2012)