Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Masquerade: Simulating a Thousand Victims., , , and . login Usenix Mag., (2008)To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads., , , , and . USENIX Security Symposium, page 171-184. USENIX Association, (2008)Designing Toxic Content Classification for a Diversity of Perspectives., , , , , , , and . SOUPS @ USENIX Security Symposium, page 299-318. USENIX Association, (2021)The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves., , , , and . AsiaCCS, page 73-85. ACM, (2019)English shellcode., , , and . ACM Conference on Computer and Communications Security, page 524-533. ACM, (2009)Emerging Threats in Internet of Things Voice Services., , , , , , and . IEEE Secur. Priv., 17 (4): 18-24 (2019)Measuring Identity Confusion with Uniform Resource Locators., , , , , , , , and . CHI, page 1-12. ACM, (2020)Empirical Measurement of Systemic 2FA Usability., , , , , , and . USENIX Security Symposium, page 127-143. USENIX Association, (2020)Jetset: Targeted Firmware Rehosting for Embedded Systems., , , , , , and . USENIX Security Symposium, page 321-338. USENIX Association, (2021)Multi-stage replay with crosscut., , , , , , , and . VEE, page 13-24. ACM, (2010)