Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AuDroid: Preventing Attacks on Audio Channels in Mobile Devices., , , and . CoRR, (2016)Security-as-a-Service for Microservices-Based Cloud Applications., , and . CloudCom, page 50-57. IEEE Computer Society, (2015)Pileus: protecting user resources from vulnerable cloud services., , , and . ACSAC, page 52-64. ACM, (2016)AuDroid: Preventing Attacks on Audio Channels in Mobile Devices., , , and . ACSAC, page 181-190. ACM, (2015)Inevitable Failure: The Flawed Trust Assumption in the Cloud., , and . CCSW, page 141-150. ACM, (2014)Design and Implementation of Dual AIK Signing Scheme in Virtual TPM., , and . PAAP, page 183-187. IEEE Computer Society, (2010)Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps., , , and . USENIX Security Symposium, page 1151-1167. USENIX Association, (2019)Aware: Controlling App Access to I/O Devices on Mobile Platforms., , , , and . CoRR, (2016)Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference., , , and . USENIX Security Symposium, page 6007-6024. USENIX Association, (2023)Security Namespace: Making Linux Security Frameworks Available to Containers., , , , , and . USENIX Security Symposium, page 1423-1439. USENIX Association, (2018)