Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link., , , , , , and . USENIX Security Symposium, page 37-54. USENIX Association, (2019)Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols., , , and . DSN Workshops, page 80-87. IEEE, (2022)Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol., , and . GetMobile, 23 (1): 30-33 (2019)OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network., , and . WISEC, page 374-376. ACM, (2021)A practical and secure social media facility for internet-deprived populations., , , , , , and . GHTC, page 1-9. IEEE, (2017)TPy: A Lightweight Framework for Agile Distributed Network Experiments., , and . WiNTECH@MOBICOM, page 38-45. ACM, (2018)PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop., , , , and . USENIX Security Symposium, page 3577-3594. USENIX Association, (2021)AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop., , , , and . WISEC, page 371-373. ACM, (2021)Network Message Field Type Classification and Recognition for Unknown Binary Protocols., , , and . CoRR, (2023)Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System., , , and . CoRR, (2021)