Author of the publication

Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy.

, , , , , , , and . NDSS, The Internet Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework., , , , , , and . NDSS, The Internet Society, (2015)CLAPP: characterizing loops in Android applications., , , , and . ESEC/SIGSOFT FSE, page 687-697. ACM, (2015)On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users., , , , , , and . DIMVA, volume 9148 of Lecture Notes in Computer Science, page 282-303. Springer, (2015)Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications., , , , and . NDSS, The Internet Society, (2014)Minus-Two: Multimedia, Sound Spatialization and 3D Representation for Cognitively Impaired Children., , and . ICCHP, volume 3118 of Lecture Notes in Computer Science, page 1054-1061. Springer, (2004)HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security., , , , , and . USENIX Security Symposium, page 99-116. USENIX Association, (2018)Broken Fingers: On the Usage of the Fingerprint API in Android., , , , , , and . NDSS, The Internet Society, (2018)Identifying and Mitigating Trust Violations in the Mobile Ecosystem.. University of California, Santa Barbara, USA, (2018)base-search.net (ftcdlib:qt60k610h0).Autonomamente: Using Goal Attainment Scales to Evaluate the Impact of a Multimodal Domotic System to Support Autonomous Life of People with Cognitive Impairment., , , and . ICCHP (1), volume 6179 of Lecture Notes in Computer Science, page 324-331. Springer, (2010)Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information., , , , and . ACSAC, page 16-27. ACM, (2017)