Bohatei: Flexible and elastic {DDoS} defense SK Fayaz, Y Tobioka, V Sekar, M Bailey 24th USENIX security symposium (USENIX Security 15), 817-832, 2015 | 457* | 2015 |
Continuous authentication for voice assistants H Feng, K Fawaz, KG Shin Proceedings of the 23rd Annual International Conference on Mobile Computing …, 2017 | 342 | 2017 |
Understanding and defending the binder attack surface in android H Feng, KG Shin Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 19 | 2016 |
{LinkDroid}: Reducing Unregulated Aggregation of App Usage Behaviors H Feng, K Fawaz, KG Shin 24th USENIX Security Symposium (USENIX Security 15), 769-783, 2015 | 18 | 2015 |
BinderCracker: Assessing the robustness of android system services H Feng, KG Shin arXiv preprint arXiv:1604.06964, 2016 | 12 | 2016 |
Wearable technology brings security to Alexa and Siri H Feng, K Fawaz, KG Shin GetMobile: Mobile Computing and Communications 22 (1), 35-38, 2018 | 3 | 2018 |
POSTER: Positioning attack on proximity-based people discovery H Feng, KG Shin Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 3 | 2014 |
Regulating and Securing the Interfaces Across Mobile Apps, OS and Users H Feng | 1 | 2017 |
Masquerade of mobile applications: Introducing unlinkability in a practical way H Feng, KG Shin 2016 14th Annual Conference on Privacy, Security and Trust (PST), 54-61, 2016 | | 2016 |