Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage., , , , and . USENIX Security Symposium, page 3521-3538. USENIX Association, (2022)MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors., , , , , , , and . ESEC/SIGSOFT FSE, page 2162-2166. ACM, (2023)Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses., , , , , and . SP, page 482-499. IEEE, (2020)Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques., , , , , and . SP, page 614-631. IEEE, (2022)A Study of Data Store-based Home Automation., , , , and . CODASPY, page 73-84. ACM, (2019)Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation., , , , and . USENIX Security Symposium, page 1263-1280. USENIX Association, (2018)Helion: Enabling Natural Testing of Smart Homes., , , , , and . ESEC/SIGSOFT FSE, page 2147-2151. ACM, (2023)Preventing accidental data disclosure in modern operating systems., and . ACM Conference on Computer and Communications Security, page 1029-1042. ACM, (2013)ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware., , , , , , and . CODASPY, page 25-36. ACM, (2019)Practical DIFC Enforcement on Android., , , and . USENIX Security Symposium, page 1119-1136. USENIX Association, (2016)