Author of the publication

Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.

, , , , and . USENIX Security Symposium, page 17-32. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Retrofitting Applications with Provenance-Based Security Monitoring., , , , , , and . CoRR, (2016)Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats., , , , and . NDSS, The Internet Society, (2020)Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems., , , and . NDSS, The Internet Society, (2023)Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control., , and . EuroS&P, page 487-501. IEEE, (2022)Valve: Securing Function Workflows on Serverless Computing Platforms., , , , , and . WWW, page 939-950. ACM / IW3C2, (2020)Transparent Web Service Auditing via Network Provenance Functions., , , , , , , and . WWW, page 887-895. ACM, (2017)Characterizing Everyday Misuse of Smart Home Devices., , , , , and . SP, page 2835-2849. IEEE, (2023)Ellipsis: Towards Efficient System Auditing for Real-Time Systems., , , , , and . CoRR, (2022)Skill Squatting Attacks on Amazon Alexa., , , , , , and . USENIX Security Symposium, page 33-47. USENIX Association, (2018)Making USB Great Again with USBFILTER., , , , and . USENIX Security Symposium, page 415-430. USENIX Association, (2016)