Author of the publication

DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android.

, , , , and . SKM, volume 1549 of Communications in Computer and Information Science, page 23-36. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks., , , and . Telecommun. Syst., 52 (4): 2397-2406 (2013)Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer., , , , , , and . DSN, page 261-273. IEEE, (2023)Secure Pre-authentication Schemes for Fast Handoff in Proxy Mobile IPv6.. J. Inform. and Commun. Convergence Engineering, (2016)MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts., , , , , , and . HICSS, page 1-10. ScholarSpace, (2021)Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks., , , , and . EuroS&P, page 704-706. IEEE, (2021)Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling., , , , , , and . ACSAC, page 278-288. ACM, (2018)A Secure Distributed Ledger for Transactive Energy: The Electron Volt Exchange (EVE) Blockchain., , , , , and . CoRR, (2020)A Novel Pre-Authentication Scheme Based on Fast Channel Switching in IEEE 802.11 WLANs., , , and . EURASIP J. Wirel. Commun. Netw., (2012)DyPolDroid: Protecting Against Permission-Abuse Attacks in Android., , , , , , and . Inf. Syst. Frontiers, 25 (2): 529-548 (April 2023)SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality., , , and . SACMAT, page 79-90. ACM, (2023)