Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies., and . WISEC, page 289-290. ACM, (2018)ProXray: Protocol Model Learning and Guided Firmware Analysis., , , , and . IEEE Trans. Software Eng., 47 (9): 1907-1928 (2021)Taming the Costs of Trustworthy Provenance through Policy Reduction., , , , , and . ACM Trans. Internet Techn., 17 (4): 34:1-34:21 (2017)A Practical Intel SGX Setting for Linux Containers in the Cloud., , , , and . CODASPY, page 255-266. ACM, (2019)Basebads: Automated security analysis of baseband firmware: poster., and . WiSec, page 318-319. ACM, (2019)BigMAC: Fine-Grained Policy Analysis of Android Firmware., , , , and . USENIX Security Symposium, page 271-287. USENIX Association, (2020)CPAC: securing critical infrastructure with cyber-physical access control., , , , and . ACSAC, page 139-152. ACM, (2016)FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution., , , , and . CCS, page 2245-2262. ACM, (2017)ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 273-290. USENIX Association, (2018)A Hybrid Approach to Secure Function Evaluation using SGX., , , , , , , and . AsiaCCS, page 100-113. ACM, (2019)