Author of the publication

Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem.

, , , , , , and . USENIX Security Symposium, page 2115-2132. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Android Permissions Remystified: A Field Study on Contextual Integrity., , , , , and . USENIX Security Symposium, page 499-514. USENIX Association, (2015)Contextualizing Privacy Decisions for Better Prediction (and Protection)., , , , , , , , and . CHI, page 268. ACM, (2018)An Experience Sampling Study of User Reactions to Browser Warnings in the Field., , , , , and . CHI, page 512. ACM, (2018)It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions., , and . SP, page 375-390. IEEE Computer Society, (2009)50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System., , , , , and . USENIX Security Symposium, page 603-620. USENIX Association, (2019)Security and Privacy Failures in Popular 2FA Apps., , , and . USENIX Security Symposium, page 2079-2096. USENIX Association, (2023)The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study., , , and . WEIS, (2007)Markets for zero-day exploits: ethics and implications., , and . NSPW, page 41-46. ACM, (2013)When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources., , , , and . SOUPS, page 1:1-1:14. ACM, (2013)Crying Wolf: An Empirical Study of SSL Warning Effectiveness., , , , and . USENIX Security Symposium, page 399-416. USENIX Association, (2009)