From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem., , , , , , и . USENIX Security Symposium, стр. 2115-2132. USENIX Association, (2023)Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API., , и . EuroS&P, стр. 832-846. IEEE, (2023)Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem., , , и . TMA, стр. 1-10. IEEE, (2023)PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes., , , , , и . ESORICS (1), том 12972 из Lecture Notes in Computer Science, стр. 86-109. Springer, (2021)Measuring eWhoring., , , и . Internet Measurement Conference, стр. 463-477. ACM, (2019)Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild., , , , , , и . IEEE Trans. Dependable Secur. Comput., 21 (4): 1801-1816 (июля 2024)Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting., , , , , , , и . IEEE Trans. Netw. Serv. Manag., 18 (2): 1334-1349 (2021)Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls., , , , , , , , и . CoRR, (2023)Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods., , , , , , , и . StudentWorkshop@CoNEXT, стр. 26-28. ACM, (2022)In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes., , , , , , , , , и 1 other автор(ы). IMC, стр. 437-456. ACM, (2023)