Author of the publication

Leaky Birds: Exploiting Mobile Application Traffic for Surveillance.

, , , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 367-384. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shopping for privacy: Purchase details leaked to PayPal., , , and . Electronic Commerce Research and Applications, (2016)Web-based Attacks to Discover and Control Local IoT Devices., , , , and . IoT S&P@SIGCOMM, page 29-35. ACM, (2018)Improving Privacy Through Fast Passive Wi-Fi Scanning., , , , and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 37-52. Springer, (2019)Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites., , , , , , and . PACMHCI, 3 (CSCW): 81:1-81:32 (2019)The Web Never Forgets: Persistent Tracking Mechanisms in the Wild., , , , , and . ACM Conference on Computer and Communications Security, page 674-689. ACM, (2014)FPDetective: dusting the web for fingerprinters., , , , , , and . ACM Conference on Computer and Communications Security, page 1129-1140. ACM, (2013)Purchase Details Leaked to PayPal., , , and . Financial Cryptography, volume 8975 of Lecture Notes in Computer Science, page 217-226. Springer, (2015)How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services., , , , and . ACM Conference on Computer and Communications Security, page 2021-2036. ACM, (2017)The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors., , , and . ACM Conference on Computer and Communications Security, page 1515-1532. ACM, (2018)Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices., , , , , , , , and . CCS, page 131-147. ACM, (2019)