From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks., , , , и . RAID, стр. 397-411. USENIX Association, (2020)Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps., , , , , , , и . USENIX Security Symposium, стр. 6665-6682. USENIX Association, (2023)Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs., , , , , , , и . USENIX Security Symposium, USENIX Association, (2024)On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices., , , и . NDSS, The Internet Society, (2021)Understanding Malicious Cross-library Data Harvesting on Android., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 4133-4150. USENIX Association, (2021)SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis., , , , , , и . Proc. ACM Softw. Eng., 1 (FSE): 249-270 (2024)Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems., , , , , и . NDSS, The Internet Society, (2022)Security Evaluation of Smart Contracts based on Code and Transaction - A Survey., , , и . ICSS, стр. 41-48. IEEE, (2022)SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis., , , и . ISSTA, стр. 980-991. ACM, (2023)MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning., , , , , и . USENIX Security Symposium, USENIX Association, (2024)