Author of the publication

Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising.

, , , , and . ACM Conference on Computer and Communications Security, page 129-140. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables., , and . ACSAC, page 301-310. IEEE Computer Society, (2008)Worm Detection, Early Warning and Response Based on Local Victim Information., , , , , and . ACSAC, page 136-145. IEEE Computer Society, (2004)From Zygote to Morula: Fortifying Weakened ASLR on Android., , , , and . IEEE Symposium on Security and Privacy, page 424-439. IEEE Computer Society, (2014)On the Incoherencies in Web Browser Access Control Policies., , , and . IEEE Symposium on Security and Privacy, page 463-478. IEEE Computer Society, (2010)BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection., , , and . USENIX Security Symposium, page 139-154. USENIX Association, (2008)Mining Audit Data to Build Intrusion Detection Models., , and . KDD, page 66-72. AAAI Press, (1998)Dynamic Trust Management., , , , , , and . IEEE Computer, 42 (2): 44-52 (2009)Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting., , , , , , , , and . NDSS, The Internet Society, (2015)Preventing Use-after-free with Dangling Pointers Nullification., , , , , , and . NDSS, The Internet Society, (2015)Exploiting and Protecting Dynamic Code Generation., , , , and . NDSS, The Internet Society, (2015)