Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Invetter: Locating Insecure Input Validations in Android Services., , , , , , , and . ACM Conference on Computer and Communications Security, page 1165-1178. ACM, (2018)An Investigation of the Android Kernel Patch Ecosystem., , , and . USENIX Security Symposium, page 3649-3666. USENIX Association, (2021)LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution., , , , , and . USENIX Security Symposium, page 125-142. USENIX Association, (2022)SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel., , , , and . USENIX Security Symposium, page 3201-3217. USENIX Association, (2022)Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets., and . USENIX Security Symposium, page 1581-1598. USENIX Association, (2018)Stalling Live Migrations on the Cloud., , , , , and . WOOT, USENIX Association, (2017)Packet Header Obfuscation Using MIMO., , , , , , , and . IEEE/ACM Trans. Netw., 28 (4): 1712-1725 (2020)Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework., , , , and . NDSS, The Internet Society, (2016)Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries., , , , , , and . NDSS, The Internet Society, (2019)AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking., , , , , and . CoRR, (2018)