Author of the publication

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.

, , , , , , , and . ACM Conference on Computer and Communications Security, page 31-43. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

iDEA: Static Analysis on the Security of Apple Kernel Drivers., , , and . ACM Conference on Computer and Communications Security, page 1185-1202. ACM, (2020)Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews., , , , , , , , and . CCS, page 829-844. ACM, (2017)OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS., , , , and . NDSS, The Internet Society, (2018)Look Before You Leap: Safe Model-Based Reinforcement Learning with Human Intervention., , , , , and . CoRL, volume 164 of Proceedings of Machine Learning Research, page 332-341. PMLR, (2021)Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf., , , , , , and . IEEE Symposium on Security and Privacy, page 655-674. IEEE Computer Society, (2016)Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12., , , , and . CoRR, (2017)An Optimal Resource Allocator of Elastic Training for Deep Learning Jobs on Cloud., , , , , and . CoRR, (2021)Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay., , , , , , and . ACM Conference on Computer and Communications Security, page 1883-1897. ACM, (2019)POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming., , , , and . NDSS, The Internet Society, (2021)Learning ECOC Code Matrix for Multiclass Classification with Application to Glaucoma Diagnosis., , , , , , , , and . J. Medical Syst., 40 (4): 78:1-78:10 (2016)