Author of the publication

Identity, location, disease and more: inferring your secrets from android public resources.

, , , , , , , and . ACM Conference on Computer and Communications Security, page 1017-1028. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatial distribution of soil heavy metal pollution estimated by different interpolation methods: Accuracy and uncertainty analysis, , , , , , and . Chemosphere, (2011)Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones., , , , , and . NDSS, The Internet Society, (2011)Solving the App-Level Classification Problem of P2P Traffic Via Optimized Support Vector Machines., , , and . ISDA (2), page 534-539. IEEE Computer Society, (2006)Sedic: privacy-aware data intensive computing on hybrid clouds., , , , and . ACM Conference on Computer and Communications Security, page 515-526. ACM, (2011)HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps., , , , , , and . WISEC, page 122-133. ACM, (2017)Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android., , , , and . IEEE Symposium on Security and Privacy, page 915-930. IEEE Computer Society, (2015)The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations., , , , and . IEEE Symposium on Security and Privacy, page 409-423. IEEE Computer Society, (2014)Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness., , , , , , and . CoRR, (2017)Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References., , , , , , , , and . CCS, page 1248-1259. ACM, (2015)Ghost Installer in the Shadow: Security Analysis of App Installation on Android., , , , , , , , , and . DSN, page 403-414. IEEE Computer Society, (2017)