Author of the publication

Demystifying Hidden Privacy Settings in Mobile Apps.

, , , , , , , , , , , and . IEEE Symposium on Security and Privacy, page 570-586. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews., , , , , , , , and . CCS, page 829-844. ACM, (2017)Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems., , , , , and . NDSS, The Internet Society, (2022)Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms., , , , , , , , and . SP, page 2397-2412. IEEE, (2022)Demystifying Hidden Privacy Settings in Mobile Apps., , , , , , , , , and 2 other author(s). IEEE Symposium on Security and Privacy, page 570-586. IEEE, (2019)Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning., , , , , , , and . USENIX Security Symposium, page 3529-3545. USENIX Association, (2023)Dynamic multi-objective cooperative coevolutionary scheduling for mobile underwater wireless sensor networks., , , , , and . Comput. Ind. Eng., (2021)Ghost Installer in the Shadow: Security Analysis of App Installation on Android., , , , , , , , , and . DSN, page 403-414. IEEE Computer Society, (2017)RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems., , , , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 101-117. Springer, (2019)Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests., , , , , , , and . USENIX Security Symposium, page 17-34. USENIX Association, (2022)When Evil Calls: Targeted Adversarial Voice over IP Network., , , , , , and . CCS, page 2009-2023. ACM, (2022)