Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
2024 article
Fixing Insecure Cellular System Information Broadcasts For Good
PROCEEDINGS OF 27TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2024, pp. 693–708.
2024 article
On SMS Phishing Tactics and Infrastructure
45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, pp. 1–16.
2024 article
Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2024, Vol. 14828, pp. 350–369.
2024 article
VFCFinder: Pairing Security Advisories and Patches
PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, pp. 780–794.
2023 article
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis
2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, pp. 489–505.
Event: IEEE Computer Society
2023 article
SecretBench: A Dataset of Software Secrets
2023 IEEE/ACM 20TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, pp. 347–351.
2023 article
Towards Simultaneous Attacks on Multiple Cellular Networks
2023 IEEE SECURITY AND PRIVACY WORKSHOPS, SPW, pp. 394–405.
2023 article
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, pp. 1635–1647.
2022 article
What are the Practices for Secret Management in Software Artifacts?
2022 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2022), pp. 69–76.
2021 article
Characterizing the Security of Endogenous and Exogenous Desktop Application Network Flows
PASSIVE AND ACTIVE MEASUREMENT, PAM 2021, Vol. 12671, pp. 531–546.
2019 article
Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 140–150.
Event: ACM
2019 article
HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 128–139.
Event: ACM
2019 article
Hestia: Simple Least Privilege Network Policies for Smart Homes
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 215–220.
Event: ACM
2019 article
Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors
PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), pp. 57–68.
2018 article
A Large Scale Investigation of Obfuscation Use in Google Play
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), pp. 222–235.
2018 journal article
Characterizing the Security of the SMS Ecosystem with Public Gateways
ACM TRANSACTIONS ON PRIVACY AND SECURITY, 22(1).
2017 conference paper
Authenticall: Efficient identity and content authentication for phone calls
Proceedings of the 26th Usenix Security Symposium (USENIX Security '17), 575–592.
2017 article
FinTechSec: Addressing the Security Challenges of Digital Financial Services
IEEE SECURITY & PRIVACY, Vol. 15, pp. 85–89.
2012 journal article
An open virtual testbed for industrial control system security research
International Journal of Information Security, 11(4), 215–229.
2012 journal article
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
International Journal of Critical Infrastructure Protection, 5(3-4), 154–174.
2011 journal article
A control system testbed to validate critical infrastructure protection concepts
International Journal of Critical Infrastructure Protection, 4(2), 88–103.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.