Author of the publication

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android.

, , , and . WISEC, page 49-60. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android., , , and . WISEC, page 49-60. ACM, (2016)SCAnDroid: Automated Side-Channel Analysis of Android APIs., , and . WISEC, page 224-235. ACM, (2018)Cache-Access Pattern Attack on Disaligned AES T-Tables., and . COSADE, volume 7864 of Lecture Notes in Computer Science, page 200-214. Springer, (2013)Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices., , , and . IEEE Commun. Surv. Tutorials, 20 (1): 465-488 (2018)SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices., , , and . CoRR, (2016)Adding Controllable Linkability to Pairing-Based Group Signatures for Free., , and . ISC, volume 8783 of Lecture Notes in Computer Science, page 388-400. Springer, (2014)On the Applicability of Time-Driven Cache Attacks on Mobile Devices., and . NSS, volume 7873 of Lecture Notes in Computer Science, page 656-662. Springer, (2013)Automated Binary Analysis on iOS: A Case Study on Cryptographic Misuse in iOS Applications., , and . WISEC, page 236-247. ACM, (2018)Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches., , and . USENIX Security Symposium, page 897-912. USENIX Association, (2015)PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices.. SPSM@CCS, page 51-62. ACM, (2014)