Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps., , , , , , and . WISEC, page 122-133. ACM, (2017)Attacking Android smartphone systems without permissions., , , and . PST, page 147-156. IEEE, (2016)Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References., , , , , , , , and . CCS, page 1248-1259. ACM, (2015)Ghost Installer in the Shadow: Security Analysis of App Installation on Android., , , , , , , , , and . DSN, page 403-414. IEEE Computer Society, (2017)PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation., , , , and . USENIX Security Symposium, page 789-806. USENIX Association, (2020)ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 273-290. USENIX Association, (2018)Valve: Securing Function Workflows on Serverless Computing Platforms., , , , , and . WWW, page 939-950. ACM / IW3C2, (2020)Hazard Ratio in Clinical Trials, , , and . Antimicrob. Agents Chemother., 48 (8): 2787-2792 (2004)Defeating return-oriented rootkits with "Return-Less" kernels., , , , and . EuroSys, page 195-208. ACM, (2010)Perturbation Theory for Quantum Information., and . CoRR, (2021)