Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resolving the Predicament of Android Custom Permissions., , , and . NDSS, The Internet Society, (2018)See No Evil: Phishing for Permissions with False Transparency., , and . USENIX Security Symposium, page 415-432. USENIX Association, (2020)For Your Eyes Only., , and . MCS@MobiCom, page 28-35. ACM, (2015)Autonomous and distributed recruitment and data collection framework for opportunistic sensing., , and . MobiCom, page 407-410. ACM, (2012)Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android., , and . ACM Conference on Computer and Communications Security, page 104-115. ACM, (2016)Demo: SaveAlert: design for a sensor-driven CrowdWatch danger detection system., , and . MobiSys, page 362-363. ACM, (2014)Participant recruitment and data collection framework for opportunistic sensing: a comparative analysis., , and . CHANTS@MobiCom, page 25-30. ACM, (2013)Evaluating User Behavior in Smartphone Security: A Psychometric Perspective., , , , , and . SOUPS, page 509-524. USENIX Association, (2023)Practical least privilege for cross-origin interactions on mobile operating systems. University of Illinois Urbana-Champaign, USA, (2019)Smart LaBLEs: Proximity, Autoconfiguration, and a Constant Supply of Gatorade(TM)., , , and . SEC, page 142-154. IEEE Computer Society, (2016)