Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities., , , , , and . NDSS, The Internet Society, (2023)Stolen Risks of Models with Security Properties., , , , , and . CCS, page 756-770. ACM, (2023)Measuring the Practical Effect of DNS Root Server Instances: A China-Wide Case Study., , , , and . PAM, volume 13210 of Lecture Notes in Computer Science, page 247-263. Springer, (2022)Continuous Intrusion: Characterizing the Security of Continuous Integration Services., , , , , and . SP, page 1561-1577. IEEE, (2023)Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China., , , , , , , , , and . CCS, page 521-534. ACM, (2020)Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 3201-3217. USENIX Association, (2021)Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO., , , , , , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 263-284. Springer, (2021)Detecting and Measuring Security Risks of Hosting-Based Dangling Domains., , , , , , , , and . SIGMETRICS (Abstracts), page 87-88. ACM, (2023)Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider., , , , , , , , , and 1 other author(s). IMC, page 659-673. ACM, (2024)Exploit the Last Straw That Breaks Android Systems., , , , , , , and . SP, page 2230-2247. IEEE, (2022)