Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem., , , and . TMA, page 1-10. IEEE, (2023)Measuring eWhoring., , , and . Internet Measurement Conference, page 463-477. ACM, (2019)PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes., , , , , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 86-109. Springer, (2021)Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting., , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1334-1349 (2021)Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls., , , , , , , , and . CoRR, (2023)In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes., , , , , , , , , and 1 other author(s). IMC, page 437-456. ACM, (2023)Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods., , , , , , , and . StudentWorkshop@CoNEXT, page 26-28. ACM, (2022)After You, Please: Browser Extensions Order Attacks and Countermeasures., , and . CoRR, (2019)After you, please: browser extensions order attacks and countermeasures., , and . Int. J. Inf. Sec., 19 (6): 623-638 (2020)Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API., , and . EuroS&P, page 832-846. IEEE, (2023)