Author of the publication

Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.

, , , , and . USENIX Security Symposium, USENIX Association, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam., , , , and . IEEE Internet Comput., 15 (3): 28-34 (2011)Exploiting social networking sites for spam., , , , and . ACM Conference on Computer and Communications Security, page 693-695. ACM, (2010)Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications., , , , , , and . NDSS, The Internet Society, (2012)An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata., , , , and . Electron. Mark., 24 (2): 113-124 (2014)Cheap and automated socio-technical attacks based on social networking sites., , , and . AISec, page 61-64. ACM, (2010)Appinspect: large-scale evaluation of social networking apps., , , and . COSN, page 143-154. ACM, (2013)Tor HTTP Usage and Information Leakage., , and . Communications and Multimedia Security, volume 6109 of Lecture Notes in Computer Science, page 245-255. Springer, (2010)Covert computation: hiding code in code for obfuscation purposes., , , , , , and . AsiaCCS, page 529-534. ACM, (2013)SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting., , , , , and . ARES, page 255-261. IEEE Computer Society, (2013)Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems., , , and . ARES, page 174-179. IEEE Computer Society, (2015)