Author of the publication

Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks.

, , , , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound., , , and . CCS, page 429-440. ACM, (2014)No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis., , , and . IEEE Symposium on Security and Privacy, page 414-432. IEEE Computer Society, (2016)Knowing your enemy: understanding and detecting malicious web advertising., , , , and . CCS, page 674-686. ACM, (2012)Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations., , , , and . AsiaCCS, page 651-662. ACM, (2016)Android on PC: On the Security of End-user Android Emulators., , , , , , and . CCS, page 1566-1580. ACM, (2021)Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems., , , , , and . USENIX Security Symposium, page 5503-5520. USENIX Association, (2023)Towards Evaluating and Training Verifiably Robust Neural Networks., , , , , and . CVPR, page 4308-4317. Computer Vision Foundation / IEEE, (2021)LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework., , , , and . RAID, page 364-379. ACM, (2022)Towards automatic reverse engineering of software security configurations., , , and . CCS, page 245-256. ACM, (2008)Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection., , , and . CoRR, (2019)