Author of the publication

How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication.

, , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 405-421. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries., , , , and . USENIX Security Symposium, page 583-600. USENIX Association, (2016)Drammer: Deterministic Rowhammer Attacks on Mobile Platforms., , , , , , , , and . ACM Conference on Computer and Communications Security, page 1675-1689. ACM, (2016)DroydSeuss: A Mobile Banking Trojan Tracker (Short Paper)., , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 250-259. Springer, (2016)Memory Errors: The Past, the Present, and the Future., , , and . RAID, volume 7462 of Lecture Notes in Computer Science, page 86-106. Springer, (2012)The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later., , , , , and . ACM Conference on Computer and Communications Security, page 1675-1689. ACM, (2017)How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication., , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 405-421. Springer, (2016)Practical Context-Sensitive CFI., , , , , , , and . ACM Conference on Computer and Communications Security, page 927-940. ACM, (2015)A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level., , , , , , , , , and . IEEE Symposium on Security and Privacy, page 934-953. IEEE Computer Society, (2016)Enter Sandbox: Android Sandbox Comparison., , , , , , and . CoRR, (2014)GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM., , , , , , , and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 92-113. Springer, (2018)