Author of the publication

VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.

, , , , , , , and . ACM Conference on Computer and Communications Security, page 426-437. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster: A Large Scale Investigation of Obfuscation Use in Google Play, , , , , and . In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019, (February 2019)Poster: Project Leine - A Virtualized Study Infrastructure, , , , and . In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019, (February 2019)Poster: Towards Understanding the WhatsApp Dilemma, , , , , , and . In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, (September 2019)Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges., , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 393-411. Springer, (2020)Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security., , , , , , and . IEEE Symposium on Security and Privacy, page 121-136. IEEE Computer Society, (2017)Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites, , , , , and . Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 12-14, 2020, (August 2020)A Stitch in Time: Supporting Android Developers in WritingSecure Code., , , , , and . ACM Conference on Computer and Communications Security, page 1065-1077. ACM, (2017)Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs, , , and . CHI '20: CHI Conference on Human Factors in Computing Systems,Honolulu, HI, USA, April 25-30, 2020, page 1--13. ACM, (2020)Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications, , , , , , and . In 41st IEEE Symposium on Security and Privacy, IEEE S&P 2020, May 18-20, 2020, (May 2020)Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers., , , , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2017)