Benjamin Andow

According to our database1, Benjamin Andow authored at least 13 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2022
Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Cardpliance: PCI DSS Compliance of Android Applications.
Proceedings of the 29th USENIX Security Symposium, 2020

Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play.
Proceedings of the 28th USENIX Security Symposium, 2019

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2017
UiRef: analysis of sensitive user inputs in Android applications.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

2016
A Study of Security Isolation Techniques.
ACM Comput. Surv., 2016

Practical DIFC Enforcement on Android.
Proceedings of the 25th USENIX Security Symposium, 2016

A Study of Grayware on Google Play.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

2015
A Distributed Android Security Framework.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015


  Loading...