Author of the publication

Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.

, , , , , , , , , and . MSR, page 14-24. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites., , , and . NDSS, The Internet Society, (2020)User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts., , , , , and . EuroS&P, page 323-337. IEEE, (2018)Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (11): 2026-2033 (2010)Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks., , , and . ACSAC, page 309-318. ACM, (2012)API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis., , , and . J. Inf. Process., (2019)Stealth Loader: Trace-Free Program Loading for API Obfuscation., , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 217-237. Springer, (2017)Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries., , , and . CHI, page 187:1-187:17. ACM, (2023)Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services., , , , and . J. Inf. Process., (2020)API Chaser: Anti-analysis Resistant Malware Analyzer., , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 123-143. Springer, (2013)A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects., , , and . ACSAC, page 349-364. ACM, (2021)