From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Inevitable Failure: The Flawed Trust Assumption in the Cloud., , и . CCSW, стр. 141-150. ACM, (2014)Pileus: protecting user resources from vulnerable cloud services., , , и . ACSAC, стр. 52-64. ACM, (2016)AuDroid: Preventing Attacks on Audio Channels in Mobile Devices., , , и . ACSAC, стр. 181-190. ACM, (2015)PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems., , , , , , , , и . USENIX Security Symposium, стр. 2579-2596. USENIX Association, (2021)AuDroid: Preventing Attacks on Audio Channels in Mobile Devices., , , и . CoRR, (2016)Regulating Access to System Sensors in Cooperating Programs., , , и . CoRR, (2018)IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems., , и . ARES, стр. 45:1-45:6. ACM, (2019)On Risk in Access Control Enforcement., , , и . SACMAT, стр. 31-42. ACM, (2017)A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications., , , , и . IEEE Commun. Surv. Tutorials, 23 (2): 1125-1159 (2021)PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage., , , , , , , и . CoRR, (2023)