Author of the publication

Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps.

, , , , and . SP, page 1106-1120. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Black Widow: Blackbox Data-driven Web Scanning., , and . SP, page 1125-1142. IEEE, (2021)Security Validation of Business Processes via Model-Checking., , , and . ESSoS, volume 6542 of Lecture Notes in Computer Science, page 29-42. Springer, (2011)Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps., , , , and . SP, page 1106-1120. IEEE, (2020)The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies., and . SP, page 1590-1607. IEEE, (2022)AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning., , , , and . CCS, page 2005-2021. ACM, (2019)SoK: State of the Krawlers - Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements., and . USENIX Security Symposium, USENIX Association, (2024)Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms., and . NDSS, The Internet Society, (2020)The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web., , and . SP, page 2744-2760. IEEE, (2023)SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems., , and . SP (Workshops), page 48-54. IEEE, (2020)Fidelius: Protecting User Secrets from Compromised Browsers., , , , , , , , , and 4 other author(s). IEEE Symposium on Security and Privacy, page 264-280. IEEE, (2019)