Author of the publication

Once Root Always a Threat: Analyzing the Security Threats of Android Permission System.

, , , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 354-369. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transplantation Attack: Analysis and Prediction., , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 367-374. Springer, (2014)TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)A Hybrid System Call Profiling Approach for Container Protection., , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (3): 1068-1083 (May 2024)DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5., , , , , and . Comput. Secur., (2019)TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors., , , , , and . SenSys, page 271-284. ACM, (2020)SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions., , , , , and . MSN, page 387-394. IEEE, (2020)A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network., , , , and . MSN, page 818-824. IEEE, (2021)CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms., , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (1): 254-269 (January 2024)WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps., , , , and . ICISC, volume 8949 of Lecture Notes in Computer Science, page 255-268. Springer, (2014)MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring., , , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 78-91. Springer, (2012)