Author of the publication

Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation.

, , , , , , , , , and . SRDS, page 1-10. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis., , , , , , , , , and 3 other author(s). EuroS&P, page 560-575. IEEE, (2019)Toward Exposing Timing-Based Probing Attacks in Web Applications., , , , and . Sensors, 17 (3): 464 (2017)Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning., , , , , and . Comput. Secur., (2015)PRO-ORAM: Practical Read-Only Oblivious RAM., , and . RAID, page 197-211. USENIX Association, (2019)Detecting injected behaviors in HTML5-based Android applications., , , and . J. High Speed Networks, 22 (1): 15-34 (2016)Robust P2P Primitives Using SGX Enclaves., , , , , and . ICDCS, page 1185-1186. IEEE, (2020)Toward Exposing Timing-Based Probing Attacks in Web Applications., , , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 499-510. Springer, (2016)A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications., , , , , and . IIKI, page 497-505. IEEE Computer Society, (2016)Automatic permission inference for hybrid mobile apps., , , , and . J. High Speed Networks, 22 (1): 55-64 (2016)Robust Detection of Android UI Similarity., , , , , and . ICC, page 1-6. IEEE, (2018)