Cited By
View all- Zhang YLiu TWang YQi YJi KTang JWang XLi XZuo Z(2024)HardTaint: Production-Run Dynamic Taint Analysis via Selective Hardware TracingProceedings of the ACM on Programming Languages10.1145/36897688:OOPSLA2(1615-1640)Online publication date: 8-Oct-2024
- Moiz AAlalfi M(2022)A survey of security vulnerabilities in Android automotive appsProceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems10.1145/3524489.3527300(17-24)Online publication date: 16-May-2022
- Kollnig KBinns RDewitte PVan Kleek MWang GOmeiza DWebb HShadbolt NChiasson S(2021)A fait accompli? an empirical study into the absence of consent to third-party tracking in android appsProceedings of the Seventeenth USENIX Conference on Usable Privacy and Security10.5555/3563572.3563582(181-195)Online publication date: 9-Aug-2021
- Show More Cited By