From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services., , , и . NDSS, The Internet Society, (2019)Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games., и . USENIX Security Symposium, стр. 3093-3110. USENIX Association, (2022)A Measurement Study of Wechat Mini-Apps., , , , и . SIGMETRICS (Abstracts), стр. 19-20. ACM, (2021)Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating., , , и . RAID, стр. 17-31. ACM, (2023)PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals., , , и . AsiaCCS, стр. 521-533. ACM, (2022)SMARTGEN: Exposing Server URLs of Mobile Apps With Selective Symbolic Execution., и . WWW, стр. 867-876. ACM, (2017)Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps., , , , , , и . ICSE, стр. 63:1-63:13. ACM, (2024)An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps., , , , и . World Wide Web, 21 (1): 127-150 (2018)Detecting and Measuring Misconfigured Manifests in Android Apps., , , , , и . CCS, стр. 3063-3077. ACM, (2022)IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing., , , , , , , , , и . NDSS, The Internet Society, (2018)