Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis., , , , , , and . NDSS, The Internet Society, (2017)Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps., , , , , and . MSR, page 322-333. IEEE, (2023)TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records., , , , and . EuroS&P Workshops, page 544-549. IEEE, (2020)No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis., , , , , , and . AsiaCCS, page 309-321. ACM, (2022)Take a bite - Finding the worm in the Apple., , , and . ICICS, page 1-5. IEEE, (2013)Skin sheriff: a machine learning solution for detecting explicit images., , and . SFCS@ASIACCS, page 45-56. ACM, (2014)Cross-platform malware: write once, infect everywhere., , , and . ACM Conference on Computer and Communications Security, page 1425-1428. ACM, (2013)IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis., , , and . CCS, page 681-695. ACM, (2023)A comparative analysis of certificate pinning in Android & iOS., , , , , , , , , and . IMC, page 605-618. ACM, (2022)Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem., , , , , , , and . IEEE Trans. Software Eng., 49 (4): 2964-2979 (April 2023)