From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Taming Information-Stealing Smartphone Applications (on Android)., , , и . TRUST, том 6740 из Lecture Notes in Computer Science, стр. 93-107. Springer, (2011)AppShell: Making data protection practical for lost or stolen Android devices., , и . NOMS, стр. 502-508. IEEE, (2016)CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages., , , и . IEEE Access, (2018)A Comprehensive Study on ARM Disassembly Tools., , , , , , , , и . IEEE Trans. Software Eng., 49 (4): 1683-1703 (апреля 2023)Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum., , , , , , и . RAID, стр. 47-60. USENIX Association, (2019)Demystifying Diehard Android Apps., , , , , , и . ASE, стр. 187-198. IEEE, (2020)FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution., , , , , , , , , и . ASE, стр. 792-804. IEEE, (2021)Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay., , , , , , и . ACM Conference on Computer and Communications Security, стр. 1883-1897. ACM, (2019)Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 1939-1956. USENIX Association, (2022)POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming., , , , и . NDSS, The Internet Society, (2021)