Author of the publication

LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.

, , , , , , , and . USENIX Security Symposium, page 339-356. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minus-Two: Multimedia, Sound Spatialization and 3D Representation for Cognitively Impaired Children., , and . ICCHP, volume 3118 of Lecture Notes in Computer Science, page 1054-1061. Springer, (2004)PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles., , , , and . SP, page 1826-1844. IEEE, (2022)AoT - Attack on Things: A security analysis of IoT firmware updates., , and . EuroS&P, page 1047-1064. IEEE, (2023)BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments., , , , , , , , , and . NDSS, The Internet Society, (2017)Broken Fingers: On the Usage of the Fingerprint API in Android., , , , , , and . NDSS, The Internet Society, (2018)SARA: Secure Android Remote Authorization., , , , and . USENIX Security Symposium, page 1561-1578. USENIX Association, (2022)Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery., , , , , and . USENIX Security Symposium, page 5845-5861. USENIX Association, (2023)ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions., , , , , , , , and . USENIX Security Symposium, page 6983-7000. USENIX Association, (2023)HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security., , , , , and . USENIX Security Symposium, page 99-116. USENIX Association, (2018)Making Sense of Constellations: Methodologies for Understanding Starlink's Scheduling Algorithms., , , , and . CoNEXT (Companion), page 37-43. ACM, (2023)