From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploiting open functionality in SMS-capable cellular networks., , , и . J. Comput. Secur., 16 (6): 713-742 (2008)AppsPlayground: automatic security analysis of smartphone applications., , и . CODASPY, стр. 209-220. ACM, (2013)Understanding Android Security., , и . IEEE Secur. Priv., 7 (1): 50-57 (2009)Configuration management at massive scale: system design and experience., , , , , , , , , и . IEEE J. Sel. Areas Commun., 27 (3): 323-335 (2009)MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy., , , , , , , и . SACMAT, стр. 121-132. ACM, (2023)WHYPER: Towards Automating Risk Assessment of Mobile Applications., , , , и . USENIX Security Symposium, стр. 527-542. USENIX Association, (2013)ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions., , , , , , , , и . USENIX Security Symposium, стр. 6983-7000. USENIX Association, (2023)Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things., , и . WiSec, стр. 140-150. ACM, (2019)ARF: identifying re-delegation vulnerabilities in Android system services., и . WiSec, стр. 151-161. ACM, (2019)Abusing cloud-based browsers for fun and profit., , , , , и . ACSAC, стр. 219-228. ACM, (2012)