Author of the publication

Vulnerable Path Attack and its Detection.

, , , and . KSII Trans. Internet Inf. Syst., 11 (4): 2149-2170 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone., , , , , , and . CNS, page 100-108. IEEE, (2022)Analyzing Security Property of Android Application Implementation Using Formal Method.. ICECCS, page 214-217. IEEE Computer Society, (2015)Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols., , , and . SecureComm, volume 238 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 469-488. Springer, (2017)Deep Review Sharing., , , , , , , and . SANER, page 61-72. IEEE, (2019)Towards Model Checking Android Applications., , , , , , , and . IEEE Trans. Software Eng., 44 (6): 595-612 (2018)LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking., , , , , , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 299-318. Springer, (2019)Systematic Comprehension for Developer Reply in Mobile System Forum., , , , , , and . SANER, page 242-252. IEEE, (2019)Vulnerable Path Attack and its Detection., , , and . KSII Trans. Internet Inf. Syst., 11 (4): 2149-2170 (2017)All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android., , , , , , and . ICECCS, page 60-69. IEEE Computer Society, (2015)Automatic Construction of Callback Model for Android Application., , , , , and . ICECCS, page 231-234. IEEE Computer Society, (2016)