Author of the publication

Identity, location, disease and more: inferring your secrets from android public resources.

, , , , , , , and . ACM Conference on Computer and Communications Security, page 1017-1028. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity, location, disease and more: inferring your secrets from android public resources., , , , , , , and . ACM Conference on Computer and Communications Security, page 1017-1028. ACM, (2013)Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX., , , , , , , and . CCS, page 2421-2434. ACM, (2017)Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android., , , , , , , , , and . RAID, page 261-275. USENIX Association, (2019)Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward., , , , and . ACM Conference on Computer and Communications Security, page 837-849. ACM, (2015)Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating., , , , and . IEEE Symposium on Security and Privacy, page 393-408. IEEE Computer Society, (2014)Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps., , , , and . NDSS, The Internet Society, (2017)Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation., , , , , , , and . NDSS, The Internet Society, (2018)A Versatile Nodal Energy Consumption Monitoring Method for Wireless Sensor Network Testbed., , , , , and . ICPADS, page 388-395. IEEE Computer Society, (2011)