Author of the publication

Understanding and Detecting Remote Infection on Linux-based IoT Devices.

, , , , , , and . AsiaCCS, page 873-887. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SAID: State-aware Defense Against Injection Attacks on In-vehicle Network., , , , , , , , and . USENIX Security Symposium, page 1921-1938. USENIX Association, (2022)SWAPP: A New Programmable Playground for Web Application Security., , and . USENIX Security Symposium, page 2029-2046. USENIX Association, (2022)The Service Worker Hiding in Your Browser: The Next Web Attack Target?, , , , and . RAID, page 312-323. ACM, (2021)Automatic Synthesis of Network Security Services: A First Step., , , and . ICCCN, page 1-10. IEEE, (2023)CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks., , , and . CNS, page 73-81. IEEE, (2019)Towards Understanding Crypto-Asset Risks on Ethereum Caused by Key Leakage on the Internet., , , , and . WWW (Companion Volume), page 875-878. ACM, (2024)Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches., , , , , , , , , and . NDSS, The Internet Society, (2020)BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition., , , , and . WISEC, page 119-124. ACM, (2022)Practical Speech Re-use Prevention in Voice-driven Services., , , , and . RAID, page 282-295. ACM, (2021)NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering., , , , , , and . ICNP, page 1-12. IEEE, (2019)