Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preventing Capability Abuse through Systematic Analysis of Exposed Interface.. University of Michigan, USA, (2019)Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework., , , , and . NDSS, The Internet Society, (2016)Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks., , , , and . CCS, page 388-400. ACM, (2015)A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications., , , , and . EuroSys, page 31:1-31:14. ACM, (2019)Categorization of Anomalies in Smart Manufacturing Systems to Support the Selection of Detection Mechanisms., , , , , , , and . IEEE Robotics Autom. Lett., 2 (4): 1885-1892 (2017)The Misuse of Android Unix Domain Sockets and Security Implications., , , , and . ACM Conference on Computer and Communications Security, page 80-91. ACM, (2016)Towards Automated Safety Vetting of PLC Code in Real-World Plants., , , , , , , , , and 1 other author(s). IEEE Symposium on Security and Privacy, page 522-538. IEEE, (2019)ADD: Application and Data-Driven Controller Design., , , , , and . SOSR, page 84-90. ACM, (2019)On Tracking Information Flows through JNI in Android Applications., , , and . DSN, page 180-191. IEEE Computer Society, (2014)RootGuard: Protecting Rooted Android Phones., , and . Computer, 47 (6): 32-40 (2014)