Author of the publication

Why eve and mallory love android: an analysis of android SSL (in)security

, , , , , and . Proceedings of the 2012 ACM conference on Computer and communications security, page 50--61. New York, NY, USA, ACM, (2012)
DOI: 10.1145/2382196.2382205

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hey, You, Get Off of My Clipboard, , , , and . Financial Cryptography and Data Security, volume 7859 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs, , , and . CHI '20: CHI Conference on Human Factors in Computing Systems,Honolulu, HI, USA, April 25-30, 2020, page 1--13. ACM, (2020)Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications, , , , , , and . In 41st IEEE Symposium on Security and Privacy, IEEE S&P 2020, May 18-20, 2020, (May 2020)POSTER: Android + Open Wi-Fis = Broken SSL?, , , and . (2013)Poster: A Large Scale Investigation of Obfuscation Use in Google Play, , , , , and . In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019, (February 2019)Poster: Project Leine - A Virtualized Study Infrastructure, , , , and . In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019, (February 2019)Poster: Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies, , , , , and . In Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, (August 2018)How Internet Resources Might Be Helping You Develop Faster but Less Securely., , , , , and . IEEE Secur. Priv., 15 (2): 50-60 (2017)(Un)informed Consent: Studying GDPR Consent Notices in the Field., , , , and . ACM Conference on Computer and Communications Security, page 973-990. ACM, (2019)To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections, , , , and . 24th USENIX Security Symposium (USENIX Security 15), page 239--254. Washington, D.C., USENIX Association, (August 2015)