Author of the publication

Watching the Watchers: Practical Video Identification Attack in LTE Networks.

, , , , , , and . USENIX Security Symposium, page 1307-1324. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RICC: Robust Collective Classification of Sybil Accounts., , and . WWW, page 2329-2339. ACM, (2023)FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities., , , and . USENIX Security Symposium, page 197-214. USENIX Association, (2022)Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer., , , and . USENIX Security Symposium, page 2613-2630. USENIX Association, (2020)What Mobile Ads Know About Mobile Users., , and . NDSS, The Internet Society, (2016)The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites., and . NDSS, The Internet Society, (2013)The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud., , and . NDSS, The Internet Society, (2021)Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services., , , , and . WWW, page 2225-2235. ACM, (2019)Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning., , and . WWW, page 743-754. ACM, (2022)Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem., , , , , , and . AsiaCCS, page 407-420. ACM, (2021)Pharewell to Phishing., , , and . SSS, volume 5340 of Lecture Notes in Computer Science, page 233-245. Springer, (2008)