Author of the publication

Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services.

, , , and . USENIX Security Symposium, page 687-702. USENIX Association, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms., , and . WOOT, USENIX Association, (2007)Rippler: Delay injection for service dependency detection., , , and . INFOCOM, page 2157-2165. IEEE, (2014)Intrusion Detection and Correlation - Challenges and Solutions, , and . Advances in Information Security Springer, (2005)Analyzing and Detecting Malicious Flash Advertisements., , , and . ACSAC, page 363-372. IEEE Computer Society, (2009)Vulnerability Analysis of MMS User Agents., and . ACSAC, page 77-88. IEEE Computer Society, (2006)Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing., and . ACSAC, page 168-178. IEEE Computer Society, (2004)Client-side cross-site scripting protection., , , and . Computers & Security, 28 (7): 592-604 (2009)Framing Dependencies Introduced by Underground Commoditization., , , , , , , , , and . WEIS, (2015)Tracking Memory Writes for Malware Classification and Code Reuse Identification., , , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 134-143. Springer, (2012)Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner., , , and . USENIX Security Symposium, page 523-538. USENIX Association, (2012)