Author of the publication

MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.

, , , , , , and . ACM Conference on Computer and Communications Security, page 1714-1730. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records., , , , and . EuroS&P Workshops, page 544-549. IEEE, (2020)Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis., , , , , , and . NDSS, The Internet Society, (2017)No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis., , , , , , and . AsiaCCS, page 309-321. ACM, (2022)Tabbed Out: Subverting the Android Custom Tab Security Model., , , and . SP, page 4591-4609. IEEE, (2024)Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps., , , , , and . MSR, page 322-333. IEEE, (2023)Take a bite - Finding the worm in the Apple., , , and . ICICS, page 1-5. IEEE, (2013)Skin sheriff: a machine learning solution for detecting explicit images., , and . SFCS@ASIACCS, page 45-56. ACM, (2014)Cross-platform malware: write once, infect everywhere., , , and . ACM Conference on Computer and Communications Security, page 1425-1428. ACM, (2013)IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis., , , and . CCS, page 681-695. ACM, (2023)Are You Sure You Want To Do Coordinated Vulnerability Disclosure?, , , , and . EuroS&P Workshops, page 307-314. IEEE, (2024)