Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards detecting device fingerprinting on iOS with API function hooking., , and . EICC, page 78-84. ACM, (2023)AutoStreams: Fully Automatic parallelization of Legacy Embedded Applications with Soft-Core MPSoCs., and . ReConFig, page 1-7. IEEE, (2018)Raising Security Awareness on Mobile Systems through Gamification., , and . EICC, page 1:1-1:6. ACM, (2020)Automated, Dynamic Android App Vulnerability and Privacy Leak Analysis: Design Considerations, Required Components and Available Tools., and . EICC, page 1-6. ACM, (2021)Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws., and . CRiSIS, volume 13857 of Lecture Notes in Computer Science, page 1-17. Springer, (2022)Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices., , and . ICISSP, page 368-375. SCITEPRESS, (2021)DaVinci: Android App Analysis Beyond Frida via Dynamic System Call Instrumentation., and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 473-489. Springer, (2020)Automatically Parallelizing Embedded Legacy Software on Soft-Core SoCs.. Darmstadt University of Technology, Germany, (2019)Tracing Cryptographic Agility in Android and iOS Apps., , , and . ICISSP, page 38-45. SciTePress, (2023)Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective., , , and . ICISSP, page 378-387. SCITEPRESS, (2022)