Author of the publication

Unauthorized origin crossing on mobile platforms: threats and mitigation.

, , , and . ACM Conference on Computer and Communications Security, page 635-646. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning., , , , , and . CCS, page 281-295. ACM, (2023)InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations., , , and . NDSS, The Internet Society, (2013)Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds., , , , , , and . SP, page 465-481. IEEE, (2020)RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection., , , , , , , and . CCS, page 1837-1852. ACM, (2020)Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search., , , , , , , , , and 2 other author(s). IEEE Symposium on Security and Privacy, page 707-723. IEEE Computer Society, (2016)Towards Privacy-Preserving Social-Media SDKs on Android., , , and . USENIX Security Symposium, USENIX Association, (2024)Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service., , , , , , and . CCS, page 1541-1552. ACM, (2016)Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications., , , , , , and . USENIX Security Symposium, page 1307-1324. USENIX Association, (2021)How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion., , , , and . USENIX Security Symposium, page 863-880. USENIX Association, (2022)Cloud repository as a malicious service: challenge, identification and implication., , , , , , and . Cybersecur., 1 (1): 14 (2018)