Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
2023 article
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis
2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, pp. 489–505.
2023 article
It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security
2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, pp. 1527–1544.
2022 article
Reflections on a Decade of Mobile Security Research
PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), pp. 2–2.
2022 journal article
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations
IEEE SECURITY & PRIVACY, 20(2), 96–100.
2021 article
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021).
2020 article
Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), pp. 1056–1070.
2020 article
LeakyPick: IoT Audio Spy Detector
36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), pp. 694–705.
2019 article
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware
PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), pp. 25–36.
2019 article
ARF: Identifying Re-Delegation Vulnerabilities in Android System Services
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 151–162.
2019 article
Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 140–150.
2019 article
HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 128–139.
2019 article
Hestia: Simple Least Privilege Network Policies for Smart Homes
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 215–220.
2019 article
Selected Papers From the 2018 USENIX Security Symposium
IEEE SECURITY & PRIVACY, Vol. 17, pp. 7–8.
2019 article
Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors
PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), pp. 57–68.
2018 article
PivotWall: SDN-Based Information Flow Control
PROCEEDINGS OF THE SYMPOSIUM ON SDN RESEARCH (SOSR'18).
2017 journal article
The Use of Functional Data Analysis to Evaluate Activity in a Spontaneous Model of Degenerative Joint Disease Associated Pain in Cats
PLOS ONE, 12(1), e0169576.
Ed(s): J. Harezlak
2016 article
A Study of Grayware on Google Play
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), pp. 224–233.
2016 journal article
A Study of Security Isolation Techniques
ACM COMPUTING SURVEYS, 49(3).
2016 conference paper
Practical DIFC enforcement on android
Proceedings of the 25th USENIX Security Symposium, 1119–1136.
2016 conference paper
Preventing kernel code-reuse attacks through disclosure resistant code diversification
2016 ieee conference on communications and network security (cns), 189–197.
2016 journal article
droid: Assessment and Evaluation of Android Application Analysis Tools
ACM COMPUTING SURVEYS, 49(3).
2015 article
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, pp. 303–313.
2015 article
Automatic Server Hang Bug Diagnosis: Feasible Reality or Pipe Dream?
2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, pp. 127–132.
2014 article
Guest Editors' Introduction: Special Issue on Security and Privacy in Mobile Platforms
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Vol. 11, pp. 209–210.
2014 journal article
TaintDroid: An Information Flow Tracking System for Real-Time Privacy Monitoring on Smartphones
COMMUNICATIONS OF THE ACM, 57(3), 99–106.
2014 journal article
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 32(2).
2012 journal article
Semantically rich application-centric security in Android
SECURITY AND COMMUNICATION NETWORKS, 5(6), 658–673.
2011 chapter
Defending Users against Smartphone Apps: Techniques and Future Directions
In Information Systems Security (pp. 49–70).
2010 journal article
malnets: large-scale malicious networks via compromised wireless access points
Security and Communication Networks, 3(2-3), 102–113.
2009 journal article
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks
Wireless Networks, 15(4), 525–539.
2007 journal article
TARP: Ticket-based address resolution protocol
Computer Networks, 51(15), 4322–4337.
2006 chapter
Password Exhaustion: Predicting the End of Password Usefulness
In Information Systems Security (pp. 37–55).
2006 chapter
Privacy Preserving Web-Based Email
In Information Systems Security (pp. 116–131).