Author of the publication

Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones.

, , , , and . ACSAC, page 529-543. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study of Mnemonic Sentence-based Password Generation Strategies., , , , and . ACM Conference on Computer and Communications Security, page 1216-1229. ACM, (2016)5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol., , , , and . ACM Conference on Computer and Communications Security, page 669-684. ACM, (2019)Insecure connection bootstrapping in cellular networks: the root of all evil., , , , and . WiSec, page 1-11. ACM, (2019)Toward practical authorization-dependent user obligation systems., , , , and . AsiaCCS, page 180-191. ACM, (2010)All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations., , , , , , , , , and . CCS, page 1100-1117. ACM, (2021)On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees., , and . CCS, page 1388-1404. ACM, (2021)On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols., , , , and . CCS, page 603-615. ACM, (2016)Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs., , , , and . DSN, page 627-638. IEEE Computer Society, (2017)Failure Feedback for User Obligation Systems., , , , and . SocialCom/PASSAT, page 713-720. IEEE Computer Society, (2010)How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security.. SACMAT, page 221. ACM, (2018)