From post

The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations.

, , , , и . IEEE Symposium on Security and Privacy, стр. 409-423. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Spatial distribution of soil heavy metal pollution estimated by different interpolation methods: Accuracy and uncertainty analysis, , , , , , и . Chemosphere, (2011)Solving the App-Level Classification Problem of P2P Traffic Via Optimized Support Vector Machines., , , и . ISDA (2), стр. 534-539. IEEE Computer Society, (2006)Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones., , , , , и . NDSS, The Internet Society, (2011)Effective and Efficient Malware Detection at the End Host., , , , , и . USENIX Security Symposium, стр. 351-366. USENIX Association, (2009)Screenmilker: How to Milk Your Android Screen for Secrets., , , и . NDSS, The Internet Society, (2014)Identity, location, disease and more: inferring your secrets from android public resources., , , , , , , и . ACM Conference on Computer and Communications Security, стр. 1017-1028. ACM, (2013)Learning your identity and disease from research papers: information leaks in genome wide association study., , , , и . ACM Conference on Computer and Communications Security, стр. 534-544. ACM, (2009)Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness., , , , , , и . CoRR, (2017)Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References., , , , , , , , и . CCS, стр. 1248-1259. ACM, (2015)Ghost Installer in the Shadow: Security Analysis of App Installation on Android., , , , , , , , , и . DSN, стр. 403-414. IEEE Computer Society, (2017)