Author of the publication

SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices.

, and . ACM Conference on Computer and Communications Security, page 1713-1714. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The developer is the enemy., and . NSPW, page 89-97. ACM, (2008)SOMA: mutual approval for included content in web pages., , , and . ACM Conference on Computer and Communications Security, page 89-98. ACM, (2008)Self-Signed Executables: Restricting Replacement of Program Binaries by Malware., and . HotSec, USENIX Association, (2007)UBCIS: Ultimate Benchmark for Container Image Scanning., , and . CSET @ USENIX Security Symposium, USENIX Association, (2020)A control point for reducing root abuse of file-system privileges., and . ACM Conference on Computer and Communications Security, page 224-236. ACM, (2010)SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices., and . ACM Conference on Computer and Communications Security, page 1713-1714. ACM, (2015)A Generic Attack on Checksumming-Based Software Tamper Resistance., , and . S&P, page 127-138. IEEE Computer Society, (2005)