Author of the publication

Ghost Installer in the Shadow: Security Analysis of App Installation on Android.

, , , , , , , , , and . DSN, page 403-414. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps., , , , , , and . WISEC, page 122-133. ACM, (2017)Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness., , , , , , and . CoRR, (2017)Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References., , , , , , , , and . ACM Conference on Computer and Communications Security, page 1248-1259. ACM, (2015)Ghost Installer in the Shadow: Security Analysis of App Installation on Android., , , , , , , , , and . DSN, page 403-414. IEEE Computer Society, (2017)ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 273-290. USENIX Association, (2018)The Effects of Wireless Computing in Collaborative Learning Environments., , , and . Int. J. Hum. Comput. Interaction, 13 (2): 257-276 (2001)Analyzing and improving Linux kernel memory protection: a model checking approach., , and . ACSAC, page 271-280. ACM, (2010)Fast, scalable detection of "Piggybacked" mobile applications., , , , and . CODASPY, page 185-196. ACM, (2013)Defeating return-oriented rootkits with "Return-Less" kernels., , , , and . EuroSys, page 195-208. ACM, (2010)RiskRanker: scalable and accurate zero-day android malware detection., , , , and . MobiSys, page 281-294. ACM, (2012)