Author of the publication

CHEX: statically vetting Android apps for component hijacking vulnerabilities.

, , , , and . CCS, page 229-240. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hotspot-based traceback for mobile ad hoc networks., and . Workshop on Wireless Security, page 43-54. ACM, (2005)Heterogeneous networking: a new survivability paradigm., , , , and . NSPW, page 33-39. ACM, (2001)Understanding the prevalence and use of alternative plans in malware with network games., , , and . ACSAC, page 1-10. ACM, (2011)Using artificial anomalies to detect unknown and known network intrusions., , , , and . Knowl. Inf. Syst., 6 (5): 507-527 (2004)Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising., , , , and . ACM Conference on Computer and Communications Security, page 129-140. ACM, (2014)Beheading hydras: performing effective botnet takedowns., , , , and . ACM Conference on Computer and Communications Security, page 121-132. ACM, (2013)RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking., , , , , , , and . CCS, page 377-390. ACM, (2017)An assessment of VoIP covert channel threats., and . SecureComm, page 371-380. IEEE, (2007)RecProv: Towards Provenance-Aware User Space Record and Replay., , and . IPAW, volume 9672 of Lecture Notes in Computer Science, page 3-15. Springer, (2016)Measuring and Preventing Supply Chain Attacks on Package Managers., , , , , and . CoRR, (2020)