Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices., , , , and . CoRR, (2016)Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices., , , and . IEEE Commun. Surv. Tutorials, 20 (1): 465-488 (2018)Malicious cryptocurrency miners: Status and Outlook., , , and . CoRR, (2019)Less is More: A privacy-respecting Android malware classifier using federated learning., , and . Proc. Priv. Enhancing Technol., 2021 (4): 96-116 (2021)Instructions Unclear: Undefined Behaviour in Cellular Network Specifications., , , , , and . USENIX Security Symposium, page 3475-3492. USENIX Association, (2023)Feature Reduction to Speed Up Malware Classification., , and . NordSec, volume 7161 of Lecture Notes in Computer Science, page 176-188. Springer, (2011)Android applications: Data leaks via advertising libraries., and . ISITA, page 314-317. IEEE, (2014)SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices., , , and . CoRR, (2016)A Comparison of the Classification of Disparate Malware Collected in Different Time Periods., , , and . J. Networks, 7 (6): 946-955 (2012)Mining permission patterns for contrasting clean and malicious android applications., , and . Future Gener. Comput. Syst., (2014)