Author of the publication

"Those things are written by lawyers, and programmers are reading that." Mapping the Communication Gap Between Software Developers and Privacy Experts.

, , , , , , and . Proc. Priv. Enhancing Technol., 2024 (1): 151-170 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices., , , and . IEEE Commun. Surv. Tutorials, 20 (1): 465-488 (2018)No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices., , , , and . CoRR, (2016)Malicious cryptocurrency miners: Status and Outlook., , , and . CoRR, (2019)Less is More: A privacy-respecting Android malware classifier using federated learning., , and . Proc. Priv. Enhancing Technol., 2021 (4): 96-116 (2021)Instructions Unclear: Undefined Behaviour in Cellular Network Specifications., , , , , and . USENIX Security Symposium, page 3475-3492. USENIX Association, (2023)Feature Reduction to Speed Up Malware Classification., , and . NordSec, volume 7161 of Lecture Notes in Computer Science, page 176-188. Springer, (2011)Android applications: Data leaks via advertising libraries., and . ISITA, page 314-317. IEEE, (2014)SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices., , , and . CoRR, (2016)A Comparison of the Classification of Disparate Malware Collected in Different Time Periods., , , and . J. Networks, 7 (6): 946-955 (2012)Mining permission patterns for contrasting clean and malicious android applications., , and . Future Gener. Comput. Syst., (2014)