Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
2023 article
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis
2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, pp. 489โ505.
2023 article
SecretBench: A Dataset of Software Secrets
2023 IEEE/ACM 20TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, pp. 347โ351.
2023 article
Towards Simultaneous Attacks on Multiple Cellular Networks
2023 IEEE SECURITY AND PRIVACY WORKSHOPS, SPW, pp. 394โ405.
2023 article
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, pp. 1635โ1647.
2022 article
What are the Practices for Secret Management in Software Artifacts?
2022 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2022), pp. 69โ76.
2021 article
Characterizing the Security of Endogenous and Exogenous Desktop Application Network Flows
PASSIVE AND ACTIVE MEASUREMENT, PAM 2021, Vol. 12671, pp. 531โ546.
2019 article
Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 140โ150.
2019 journal article
Characterizing the Security of the SMS Ecosystem with Public Gateways
ACM TRANSACTIONS ON PRIVACY AND SECURITY, 22(1).
2019 article
HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 128โ139.
2019 article
Hestia: Simple Least Privilege Network Policies for Smart Homes
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 215โ220.
2019 article
Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors
PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), pp. 57โ68.
2018 article
A Large Scale Investigation of Obfuscation Use in Google Play
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), pp. 222โ235.
2017 conference paper
Authenticall: Efficient identity and content authentication for phone calls
Proceedings of the 26th Usenix Security Symposium (USENIX Security '17), 575โ592.
2017 article
FinTechSec: Addressing the Security Challenges of Digital Financial Services
IEEE SECURITY & PRIVACY, Vol. 15, pp. 85โ89.
2012 journal article
An open virtual testbed for industrial control system security research
International Journal of Information Security, 11(4), 215โ229.
2012 journal article
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
International Journal of Critical Infrastructure Protection, 5(3-4), 154โ174.
2011 journal article
A control system testbed to validate critical infrastructure protection concepts
International Journal of Critical Infrastructure Protection, 4(2), 88โ103.