Collin Mulliner
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [c19]Sebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner, Edgar R. Weippl:
USBlock: Blocking USB-Based Keypress Injection Attacks. DBSec 2018: 278-295 - 2017
- [j2]Collin Mulliner, William K. Robertson, Engin Kirda:
On the misuse of graphical user interface elements to implement security controls. it - Information Technology 59(2): 59 (2017) - [e1]William Enck, Collin Mulliner:
11th USENIX Workshop on Offensive Technologies, WOOT 2017, Vancouver, BC, Canada, August 14-15, 2017. USENIX Association 2017 [contents] - 2016
- [c18]Patrick Carter, Collin Mulliner, Martina Lindorfer, William K. Robertson, Engin Kirda:
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. Financial Cryptography 2016: 231-249 - [c17]Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero:
Trellis: Privilege Separation for Multi-user Applications Made Easy. RAID 2016: 437-456 - [c16]Matthias Neugschwandtner, Collin Mulliner, William K. Robertson, Engin Kirda:
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices. TRUST 2016: 60-81 - [c15]Amin Kharraz, Sajjad Arshad, Collin Mulliner, William K. Robertson, Engin Kirda:
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. USENIX Security Symposium 2016: 757-772 - 2015
- [c14]Ahmet Talha Ozcan, Can Gemicioglu, Kaan Onarlioglu, Michael Weissbacher, Collin Mulliner, William K. Robertson, Engin Kirda:
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications. Financial Cryptography 2015: 355-369 - 2014
- [c13]Collin Mulliner, William K. Robertson, Engin Kirda:
VirtualSwindle: an automated attack against in-app billing on android. AsiaCCS 2014: 459-470 - [c12]Collin Mulliner, William K. Robertson, Engin Kirda:
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. IEEE Symposium on Security and Privacy 2014: 149-162 - 2013
- [c11]Collin Mulliner, Jon Oberheide, William K. Robertson, Engin Kirda:
PatchDroid: scalable third-party security patches for Android devices. ACSAC 2013: 259-268 - [c10]Collin Mulliner, Ravishankar Borgaonkar, Patrick Stewin, Jean-Pierre Seifert:
SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper). DIMVA 2013: 150-159 - [c9]Kaan Onarlioglu, Collin Mulliner, William K. Robertson, Engin Kirda:
PrivExec: Private Execution as an Operating System Service. IEEE Symposium on Security and Privacy 2013: 206-220 - 2012
- [b1]Collin Mulliner:
On the Impact of the Cellular Modem on the Security of Mobile Phones. Berlin Institute of Technology 2012 - [j1]Collin Mulliner:
Persönliche Datenspuren bei der mobilen Internetnutzung. Datenschutz und Datensicherheit 36(3): 180-184 (2012) - [c8]Collin Mulliner, Steffen Liebergeld, Matthias Lange, Jean-Pierre Seifert:
Taming Mr Hayes: Mitigating signaling based attacks on smartphones. DSN 2012: 1-12 - [c7]Collin Mulliner, Benjamin Michéle:
Read It Twice! A Mass-Storage-Based TOCTTOU Attack. WOOT 2012: 105-112 - [i1]
- 2011
- [c6]Patrick Stewin, Jean-Pierre Seifert, Collin Mulliner:
Poster: Towards detecting DMA malware. ACM Conference on Computer and Communications Security 2011: 857-860 - [c5]Collin Mulliner, Nico Golde, Jean-Pierre Seifert:
SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale. USENIX Security Symposium 2011 - 2010
- [c4]Collin Mulliner, Jean-Pierre Seifert:
Rise of the iBots: Owning a telco network. MALWARE 2010: 71-80
2000 – 2009
- 2009
- [c3]Collin Mulliner:
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones. ARES 2009: 695-700 - 2006
- [c2]
- [c1]Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee:
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108
Coauthor Index
last updated on 2019-02-14 22:51 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint