Author of the publication

Android Malware Forensics: Reconstruction of Malicious Events.

, , and . ICDCS Workshops, page 552-558. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems., , , , and . ACM Trans. Embedded Comput. Syst., 16 (2): 61:1-61:22 (2017)NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries., , , , , , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 301-320. Springer, (2017)Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps., , , , , , and . NDSS, The Internet Society, (2017)Cross-Architecture Binary Semantics Understanding via Similar Code Comparison., , , and . SANER, page 57-67. IEEE Computer Society, (2016)Security analysis of third-party in-app payment in mobile applications., , , and . J. Inf. Secur. Appl., (2019)Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments., , , , , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 17-37. Springer, (2021)Burn After Reading: Expunging Execution Footprints of Android Apps., , , and . NSS, volume 11058 of Lecture Notes in Computer Science, page 46-63. Springer, (2018)SSG: Sensor Security Guard for Android Smartphones., , , , and . CollaborateCom, volume 163 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 221-233. Springer, (2015)Digital Forensic Analysis on Runtime Instruction Flow., , , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 168-178. Springer, (2010)Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices., , , , , and . IoT S&P@CCS, page 13-18. ACM, (2017)