Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the Brains and Brawn of Illicit Streaming App., , , , , , and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 194-214. Springer, (2021)SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector., , , , and . DSN, page 150-162. IEEE, (2022)Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic., , , , , and . AsiaCCS, page 47-59. ACM, (2020)Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users., , , , , , , , and . DSN, page 222-233. IEEE, (2019)Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing., , , , , and . USENIX Security Symposium, page 4499-4515. USENIX Association, (2023)Demystifying Android Non-SDK APls: Measurement and Understanding., , , , and . ICSE, page 647-658. ACM, (2022)Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices., , , , , , , and . WWW, page 524-532. ACM, (2022)BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals., , , , and . NDSS, The Internet Society, (2019)Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs., , , , , and . NDSS, The Internet Society, (2023)IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing., , , , , , , , , and . NDSS, The Internet Society, (2018)