Author of the publication

Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem.

, , , , , , and . USENIX Security Symposium, page 2115-2132. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User-level secure deletion on log-structured file systems., , , and . AsiaCCS, page 63-64. ACM, (2012)Proximity Tracing in an Ecosystem of Surveillance Capitalism., and . WPES@CCS, page 191-203. ACM, (2020)The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services., , , , , , , and . CoRR, (2024)Improving Tor using a TCP-over-DTLS Tunnel., and . USENIX Security Symposium, page 119-134. USENIX Association, (2009)Secure Data Deletion.. ETH Zurich, Zürich, Switzerland, (2014)base-search.net (ftethz:oai:www.research-collection.ethz.ch:20.500.11850/99993).Secure Deletion on Log-structured File Systems, , , and . CoRR, (2011)Plinko: polling with a physical implementation of a noisy channel., , and . WPES, page 109-112. ACM, (2009)Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem., , , , , , and . USENIX Security Symposium, page 2115-2132. USENIX Association, (2023)Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences., , , , , , , and . SOUPS, page 145-162. USENIX Association, (2017)Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods., , , , , , , and . StudentWorkshop@CoNEXT, page 26-28. ACM, (2022)