Author of the publication

On the Feasibility of Large-Scale Infections of iOS Devices.

, , , , , and . USENIX Security Symposium, page 79-93. USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic., , , , , and . DSN, page 598-609. IEEE Computer Society, (2014)Displacement and Strain Measurement up to 1000 °C Using a Hollow Coaxial Cable Fabry-Perot Resonator., , , and . Sensors, 18 (5): 1304 (2018)Adaptive-Push Peer-to-Peer Video Streaming System Based on Dynamic Unstructured Topology., , , and . IAS, page 697-700. IEEE Computer Society, (2009)Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse., , , , , , , and . ACM Conference on Computer and Communications Security, page 569-586. ACM, (2017)Measuring Network Reputation in the Ad-Bidding Process., , , , and . DIMVA, volume 10327 of Lecture Notes in Computer Science, page 388-409. Springer, (2017)Enhancing Gradient-based Attacks with Symbolic Intervals., , , and . CoRR, (2019)Truly Distributed Coaxial Cable Sensing Based on Random Inhomogeneities., , , and . IEEE Trans. Instrumentation and Measurement, 68 (11): 4600-4607 (2019)Training Robust Tree Ensembles for Security., , , , and . CoRR, (2019)Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet., , , , , , and . DIMVA, volume 9721 of Lecture Notes in Computer Science, page 231-254. Springer, (2016)Neutaint: Efficient Dynamic Taint Analysis with Neural Networks., , , and . CoRR, (2019)