Author of the publication

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.

, , , , , , , and . ACM Conference on Computer and Communications Security, page 31-43. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS., , , , , , , and . ACM Conference on Computer and Communications Security, page 31-43. ACM, (2015)Robust and Consistent Clustering Recovery via SDP Approaches., , and . DSW, page 46-50. IEEE, (2018)Optimal Bidding of Energy Storage: A Surrogate Method with Combined Spatial-Temporal Entropy., , , , , and . CoRR, (2021)TENSILE: A Tensor granularity dynamic GPU memory scheduler method towards multiple dynamic workloads system., , , , , and . CoRR, (2021)Information Aggregation for Constrained Online Control., , , , and . SIGMETRICS (Abstracts), page 7-8. ACM, (2021)Self-Organized Dynamic Caching Space Sharing in Virtualized Wireless Networks., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2016)Bounded-Regret MPC via Perturbation Analysis: Prediction Error, Constraints, and Nonlinearity., , , , and . NeurIPS, (2022)Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services., , , , , , and . CCS, page 978-989. ACM, (2014)ORC: An Online Competitive Algorithm for Recommendation and Charging Schedule in Electric Vehicle Charging Network., , , and . e-Energy, page 144-155. ACM, (2020)Detecting telecommunication fraud by understanding the contents of a call., , , , and . Cybersecurity, 1 (1): 8 (2018)