Author of the publication

ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.

, , , , , , , , , , and . USENIX Security Symposium, page 273-290. USENIX Association, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies., and . WISEC, page 289-290. ACM, (2018)ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1577-1595 (March 2023)FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware., , , , , , , , and . NDSS, The Internet Society, (2022)CPAC: securing critical infrastructure with cyber-physical access control., , , , and . ACSAC, page 139-152. ACM, (2016)FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution., , , , and . CCS, page 2245-2262. ACM, (2017)ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 273-290. USENIX Association, (2018)A Hybrid Approach to Secure Function Evaluation using SGX., , , , , , , and . AsiaCCS, page 100-113. ACM, (2019)LBM: A Security Framework for Peripherals within the Linux Kernel., , , , , and . IEEE Symposium on Security and Privacy, page 967-984. IEEE, (2019)Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers., , , , , , and . IEEE Symposium on Security and Privacy, page 1000-1014. IEEE, (2019)A Practical Intel SGX Setting for Linux Containers in the Cloud., , , , and . CODASPY, page 255-266. ACM, (2019)