Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves., , , , and . AsiaCCS, page 73-85. ACM, (2019)English shellcode., , , and . ACM Conference on Computer and Communications Security, page 524-533. ACM, (2009)Jetset: Targeted Firmware Rehosting for Embedded Systems., , , , , , and . USENIX Security Symposium, page 321-338. USENIX Association, (2021)Empirical Measurement of Systemic 2FA Usability., , , , , , and . USENIX Security Symposium, page 127-143. USENIX Association, (2020)Security Challenges in an Increasingly Tangled Web., , , , , , and . WWW, page 677-684. ACM, (2017)Tracking Certificate Misissuance in the Wild., , , , , , , , , and . IEEE Symposium on Security and Privacy, page 785-798. IEEE Computer Society, (2018)Tracing your roots: exploring the TLS trust anchor ecosystem., , , , and . Internet Measurement Conference, page 179-194. ACM, (2021)Multi-stage replay with crosscut., , , , , , , and . VEE, page 13-24. ACM, (2010)Measuring Identity Confusion with Uniform Resource Locators., , , , , , , , and . CHI, page 1-12. ACM, (2020)Understanding the Mirai Botnet., , , , , , , , , and 9 other author(s). USENIX Security Symposium, page 1093-1110. USENIX Association, (2017)