Author of the publication

Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild.

, , , , , , , , and . IMC, page 457-477. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Industry Interview Study of Software Signing for Supply Chain Security., , , , and . CoRR, (2024)Sigstore: Software Signing for Everybody., , and . CCS, page 2353-2367. ACM, (2022)SCORED '23: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses., , and . CCS, page 3671-3672. ACM, (2023)Speranza: Usable, Privacy-friendly Software Signing., , , and . CCS, page 3388-3402. ACM, (2023)Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device Firmware., , , , , and . CCWC, page 467-473. IEEE, (2024)SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties., , , and . SCORED@CCS, page 15-24. ACM, (2022)Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild., , , , , , , , and . IMC, page 457-477. ACM, (2023)PolyPasswordHasher: Improving Password Storage Security., and . login Usenix Mag., (2014)Commit Signatures for Centralized Version Control Systems., , , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 359-373. Springer, (2019)in-toto: Providing farm-to-table guarantees for bits and bytes., , , , and . USENIX Security Symposium, page 1393-1410. USENIX Association, (2019)