Author of the publication

Scrutinizing Implementations of Smart Home Integrations.

, , , , , , and . IEEE Trans. Software Eng., 47 (12): 2667-2683 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment., , , and . ACM Conference on Computer and Communications Security, page 225-240. ACM, (2019)Transparent Protection of Commodity OS Kernels Using Hardware Virtualization., , , , , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 162-180. Springer, (2010)Robust Detection of Android UI Similarity., , , , , and . ICC, page 1-6. IEEE, (2018)Darwin: an approach for debugging evolving programs., , , and . ESEC/SIGSOFT FSE, page 33-42. ACM, (2009)WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics., , , , , and . NDSS, The Internet Society, (2021)Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation., , , and . USENIX Security Symposium, USENIX Association, (2007)FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation., , , , , , and . USENIX Security Symposium, page 2567-2584. USENIX Association, (2022)Alcatraz: An Isolated Environment for Experimenting with Untrusted Software, , , and . ACM Transactions on Information and System Security (TISSEC), (2009)LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking., , , , , , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 299-318. Springer, (2019)Detecting Phishing Websites via Aggregation Analysis of Page Layouts., , , , , , and . IIKI, volume 129 of Procedia Computer Science, page 224-230. Elsevier, (2017)