Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment., , , , , , , and . GraMSec@CSF, volume 9987 of Lecture Notes in Computer Science, page 39-61. Springer, (2016)A Usage-Pattern Perspective for Privacy Ranking of Android Apps., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 245-256. Springer, (2014)AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements., , , and . ACSAC, page 297-306. ACM, (2011)Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors., , , , and . ACSAC, page 425-436. ACM, (2017)Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations., , , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 418-435. Springer, (2012)SwapGuard: A software-only solution for attesting hot-swappable devices in power grids., , and . SmartGridComm, page 357-363. IEEE, (2016)An Empirical Study of Dangerous Behaviors in Firefox Extensions., , , , , , and . ISC, volume 7483 of Lecture Notes in Computer Science, page 188-203. Springer, (2012)Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning., , , , , and . Comput. Secur., (2015)A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications., , , and . ICECCS, page 177-187. IEEE Computer Society, (2013)Towards Fine-Grained Access Control in JavaScript Contexts., , , , and . ICDCS, page 720-729. IEEE Computer Society, (2011)