Author of the publication

Keystroke Timing Analysis of on-the-fly Web Apps.

, , , and . ACNS, volume 7954 of Lecture Notes in Computer Science, page 405-413. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild., , , and . WISEC, page 212-223. ACM, (2018)Active malware analysis using stochastic games., , , and . AAMAS, page 29-36. IFAAMAS, (2012)On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps., , , and . CoRR, (2022)Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel., , , and . ISC, volume 12472 of Lecture Notes in Computer Science, page 178-195. Springer, (2020)Towards Mining Comprehensive Android Sandboxes., , , , and . ICECCS, page 51-60. IEEE Computer Society, (2018)On-Demand Time Blurring to Support Side-Channel Defense., , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 210-228. Springer, (2017)Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables., , , , and . TrustCom, page 37-44. IEEE Computer Society, (2011)Denial-of-Service Attacks on Host-Based Generic Unpackers., , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 241-253. Springer, (2009)HuMan: Creating memorable fingerprints of mobile users., , , , , and . PerCom Workshops, page 479-482. IEEE Computer Society, (2012)Stack Layout Randomization with Minimal Rewriting of Android Binaries., , , , , , , and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 229-245. Springer, (2015)