Author of the publication

AndRadar: Fast Discovery of Android Applications in Alternative Markets.

, , , , , , , , and . DIMVA, volume 8550 of Lecture Notes in Computer Science, page 51-71. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis., , , , , , and . NDSS, The Internet Society, (2017)No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis., , , , , , and . AsiaCCS, page 309-321. ACM, (2022)Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps., , , , , and . MSR, page 322-333. IEEE, (2023)TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records., , , , and . EuroS&P Workshops, page 544-549. IEEE, (2020)IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis., , , and . CCS, page 681-695. ACM, (2023)Take a bite - Finding the worm in the Apple., , , and . ICICS, page 1-5. IEEE, (2013)Cross-platform malware: write once, infect everywhere., , , and . ACM Conference on Computer and Communications Security, page 1425-1428. ACM, (2013)Skin sheriff: a machine learning solution for detecting explicit images., , and . SFCS@ASIACCS, page 45-56. ACM, (2014)A comparative analysis of certificate pinning in Android & iOS., , , , , , , , , and . IMC, page 605-618. ACM, (2022)Are You Sure You Want To Do Coordinated Vulnerability Disclosure?, , , , and . EuroS&P Workshops, page 307-314. IEEE, (2024)