Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explicit Secrecy: A Policy for Taint Tracking., , , and . EuroS&P, page 15-30. IEEE, (2016)Securing Cross-App Interactions in IoT Platforms., , and . CSF, page 319-334. IEEE, (2019)Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis., , and . ICSA, page 191-200. IEEE, (2019)Language Support for Secure Software Development with Enclaves., , , and . CSF, page 1-16. IEEE, (2021)SandTrap: Securing JavaScript-driven Trigger-Action Platforms., , , , and . USENIX Security Symposium, page 2899-2916. USENIX Association, (2021)Unveiling the Invisible: Detection and Evaluation of Prototype Pollution Gadgets with Dynamic Taint Analysis., , and . WWW, page 1800-1811. ACM, (2024)Information-Flow Control for Database-Backed Applications., , , , and . EuroS&P, page 79-94. IEEE, (2019)Friendly Fire: Cross-app Interactions in IoT Platforms., , , and . ACM Trans. Priv. Secur., 24 (3): 16:1-16:40 (2021)SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web., and . NDSS, The Internet Society, (2021)InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis., , and . ACM Conference on Computer and Communications Security, page 1853-1869. ACM, (2020)