Author of the publication

Watching your call: Breaking VoLTE Privacy in LTE/5G Networks.

, , , , and . Proc. Priv. Enhancing Technol., 2023 (2): 282-297 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spinner: Semi-Automatic Detection of Pinning without Hostname Verification., , and . ACSAC, page 176-188. ACM, (2017)Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps., , , and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 579-597. Springer, (2017)Privacy-Friendly Energy-Metering via Homomorphic Encryption., and . STM, volume 6710 of Lecture Notes in Computer Science, page 226-238. Springer, (2010)Beneath the Bonnet: A Breakdown of Diagnostic Security., and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 305-324. Springer, (2018)MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware., , and . CCS, page 515-529. ACM, (2022)Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (1): 56-81 (2021)LeiA: A Lightweight Authentication Protocol for CAN., and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 283-300. Springer, (2016)Grey-box Analysis and Fuzzing of Automotive Electronic Components via Control-Flow Graph Extraction., and . CSCS, page 9:1-9:11. ACM, (2020)A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes., , , , , and . CCS, page 1741-1758. ACM, (2019)Completeness of Formal Hashes in the Standard Model., and . IACR Cryptology ePrint Archive, (2006)