From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages., , , и . IEEE Access, (2018)Taming Information-Stealing Smartphone Applications (on Android)., , , и . TRUST, том 6740 из Lecture Notes in Computer Science, стр. 93-107. Springer, (2011)AppShell: Making data protection practical for lost or stolen Android devices., , и . NOMS, стр. 502-508. IEEE, (2016)Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum., , , , , , и . RAID, стр. 47-60. USENIX Association, (2019)EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM., , , , , , , и . ASPLOS, стр. 846-858. ACM, (2022)A Comprehensive Study on ARM Disassembly Tools., , , , , , , , и . IEEE Trans. Software Eng., 49 (4): 1683-1703 (апреля 2023)POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming., , , , и . NDSS, The Internet Society, (2021)Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets., , , и . NDSS, The Internet Society, (2012)Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 1939-1956. USENIX Association, (2022)An empirical study on ARM disassembly tools., , , , , и . ISSTA, стр. 401-414. ACM, (2020)