Author of the publication

SoK: Lessons Learned from Android Security Research for Appified Software Platforms.

, , , , , and . IEEE Symposium on Security and Privacy, page 433-451. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Stitch in Time: Supporting Android Developers in WritingSecure Code., , , , , and . ACM Conference on Computer and Communications Security, page 1065-1077. ACM, (2017)Your Secrets Are Safe: How Browsers' Explanations Impact Misconceptions About Private Browsing Mode., , , , , and . WWW, page 217-226. ACM, (2018)To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections., , , , and . USENIX Security Symposium, page 239-254. USENIX Association, (2015)Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security., , , , , , and . IEEE Symposium on Security and Privacy, page 121-136. IEEE Computer Society, (2017)You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users., , and . SecDev, page 3-8. IEEE Computer Society, (2016)Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android., , , , and . ACM Conference on Computer and Communications Security, page 2187-2200. ACM, (2017)SoK: Lessons Learned from Android Security Research for Appified Software Platforms., , , , , and . IEEE Symposium on Security and Privacy, page 433-451. IEEE Computer Society, (2016)A Large Scale Investigation of Obfuscation Use in Google Play., , , , , and . ACSAC, page 222-235. ACM, (2018)VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits., , , , , , , and . ACM Conference on Computer and Communications Security, page 426-437. ACM, (2015)On the ecological validity of a password study., , , and . SOUPS, page 13:1-13:13. ACM, (2013)