Author of the publication

I can be You: Questioning the use of Keystroke Dynamics as Biometrics.

, , and . NDSS, The Internet Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active malware analysis using stochastic games., , , and . AAMAS, page 29-36. IFAAMAS, (2012)Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild., , , and . WISEC, page 212-223. ACM, (2018)On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps., , , and . CoRR, (2022)ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge., , and . CODASPY, page 107-118. ACM, (2022)Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks., , , , , and . USENIX Security Symposium, page 2689-2706. USENIX Association, (2023)FA3: Fine-Grained Android Application Analysis., , and . HotMobile, page 74-80. ACM, (2023)Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel., , , and . ISC, volume 12472 of Lecture Notes in Computer Science, page 178-195. Springer, (2020)Towards Mining Comprehensive Android Sandboxes., , , , and . ICECCS, page 51-60. IEEE Computer Society, (2018)On-Demand Time Blurring to Support Side-Channel Defense., , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 210-228. Springer, (2017)Denial-of-Service Attacks on Host-Based Generic Unpackers., , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 241-253. Springer, (2009)