Author of the publication

Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.

, , , , , , , , and . SP, page 2397-2412. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos., , , , , , and . IEEE Secur. Priv., 15 (2): 42-49 (2017)Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale., , , , , , and . CoRR, (2022)Learning Security Classifiers with Verified Global Robustness Properties., , , , , and . CCS, page 477-494. ACM, (2021)Understanding iOS-based Crowdturfing Through Hidden UI Analysis., , , , , , and . USENIX Security Symposium, page 765-781. USENIX Association, (2019)Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks., , , , , and . NDSS, The Internet Society, (2021)OS-Aware Vulnerability Prioritization via Differential Severity Analysis., , , and . USENIX Security Symposium, page 395-412. USENIX Association, (2022)Characterizing Long-tail SEO Spam on Cloud Web Hosting Services., , , , , and . WWW, page 321-332. ACM, (2016)Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service., , , , , , and . CCS, page 1541-1552. ACM, (2016)RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection., , , , , , , and . CCS, page 1837-1852. ACM, (2020)Analyzing Ground-Truth Data of Mobile Gambling Scams., , , , , , and . SP, page 2176-2193. IEEE, (2022)