Author of the publication

Brahmastra: Driving Apps to Test the Security of Third-Party Components.

, , , , , , , , and . USENIX Security Symposium, page 1021-1036. USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era., , , , , , and . HotOS, USENIX Association, (2007)Revisiting Smart Dust with RFID Sensor Networks., , , , and . HotNets, page 37-42. ACM SIGCOMM, (2008)Interference Cancellation: Better Receivers for a New Wireless MAC., , , and . HotNets, ACM SIGCOMM, (2007)Improving the Reliability of Internet Paths with One-hop Source Routing., , , , and . OSDI, page 183-198. USENIX Association, (2004)Increasing Effective Link Bandwidth by Supressing Replicated Data., and . USENIX Annual Technical Conference, USENIX Association, (1998)MetaSync: File Synchronization Across Multiple Untrusted Storage Services., , , , , and . USENIX Annual Technical Conference, page 83-95. USENIX Association, (2015)Dewdrop: An Energy-Aware Runtime for Computational RFID., , and . NSDI, USENIX Association, (2011)Understanding BGP misconfiguration., , and . SIGCOMM, page 3-16. ACM, (2002)Source selectable path diversity via routing deflections., and . SIGCOMM, page 159-170. ACM, (2006)Short paper: enhancing mobile application permissions with runtime feedback and constraints., , and . SPSM@CCS, page 45-50. ACM, (2012)