Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DroidEagle: seamless detection of visually similar Android apps., , and . WISEC, page 9:1-9:12. ACM, (2015)Exploiting non-uniform program execution time to evade record/replay forensic analysis., , and . Computers & Security, (2020)Blender: Self-randomizing Address Space Layout for Android Apps., , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 457-480. Springer, (2016)Securing the Device Drivers of Your Embedded Systems: Framework and Prototype., , , and . ARES, page 71:1-71:10. ACM, (2019)Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android., , , , and . IEEE Trans. Information Forensics and Security, 12 (5): 1103-1112 (2017)Towards Memory Safe Enclave Programming with Rust-SGX., , , , , , , , , and . CCS, page 2333-2350. ACM, (2019)Memory-Safety Challenge Considered Solved? An In-Depth Study with All Rust CVEs., , , , and . ACM Trans. Softw. Eng. Methodol., 31 (1): 3:1-3:25 (2022)DroidRay: a security evaluation system for customized android firmwares., , and . AsiaCCS, page 471-482. ACM, (2014)Design and implementation of an Android host-based intrusion prevention system., , , and . ACSAC, page 226-235. ACM, (2014)Topology-theoretic approach to address attribute linkage attacks in differential privacy., , , and . Comput. Secur., (2022)