Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud repository as a malicious service: challenge, identification and implication., , , , , , and . Cybersecur., 1 (1): 14 (2018)Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications., , , , , , and . USENIX Security Symposium, page 1307-1324. USENIX Association, (2021)How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion., , , , and . USENIX Security Symposium, page 863-880. USENIX Association, (2022)P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies., , , , , and . CCS, page 1647-1661. ACM, (2022)Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT., , , and . CCS, page 3285-3299. ACM, (2022)Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation., , , , , , , and . USENIX Security Symposium, page 1183-1200. USENIX Association, (2020)Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain., , , , and . USENIX Security Symposium, page 3403-3420. USENIX Association, (2023)Understanding Malicious Cross-library Data Harvesting on Android., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 4133-4150. USENIX Association, (2021)Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating., , , , and . IEEE Symposium on Security and Privacy, page 393-408. IEEE Computer Society, (2014)Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos., , , , , , and . IEEE Secur. Priv., 15 (2): 42-49 (2017)