Author of the publication

Understanding the Security Risks of Docker Hub.

, , , , , , , , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 257-276. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physical Logic Bombs in 3D Printers via Emerging 4D Techniques., , , , , , , and . ACSAC, page 732-747. ACM, (2021)De-SAG: On the De-Anonymization of Structure-Attribute Graph Data., , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (4): 594-607 (2019)UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware., , , , , , , and . USENIX Security Symposium, page 3421-3438. USENIX Association, (2023)De-Health: All Your Online Health Information Are Belong to Us., , , , , , , , and . ICDE, page 1609-1620. IEEE, (2020)SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems, , , , , and . (2019)cite arxiv:1901.07846Comment: The experimental results were not up to our expectation.Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks., , , , , , , , , and . CCS, page 516-534. ACM, (2021)MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets., , , and . CCS, page 1338-1356. ACM, (2021)Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks., , and . NDSS, The Internet Society, (2022)A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware., , , , , , , , , and 1 other author(s). ISSTA, page 442-454. ACM, (2022)IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware., , , , , , , , , and . ASE, page 805-816. IEEE, (2021)