Collin Mulliner

According to our database1, Collin Mulliner authored at least 24 papers between 2006 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
USBlock: Blocking USB-Based Keypress Injection Attacks.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2017
On the misuse of graphical user interface elements to implement security controls.
it Inf. Technol., 2017

2016
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware.
Proceedings of the 25th USENIX Security Symposium, 2016

Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices.
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016

Trellis: Privilege Separation for Multi-user Applications Made Easy.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

VirtualSwindle: an automated attack against in-app billing on android.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
PrivExec: Private Execution as an Operating System Service.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

PatchDroid: scalable third-party security patches for Android devices.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
On the Impact of the Cellular Modem on the Security of Mobile Phones.
PhD thesis, 2012

Fake Emulation Environment to Prevent Malware from Executing.
Tiny Trans. Comput. Sci., 2012

Persönliche Datenspuren bei der mobilen Internetnutzung.
Datenschutz und Datensicherheit, 2012

Read It Twice! A Mass-Storage-Based TOCTTOU Attack.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

Taming Mr Hayes: Mitigating signaling based attacks on smartphones.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale.
Proceedings of the 20th USENIX Security Symposium, 2011

Poster: Towards detecting DMA malware.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Rise of the iBots: Owning a telco network.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

2009
Injecting SMS Messages into Smart Phones for Security Analysis.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009

Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones.
Proceedings of the The Forth International Conference on Availability, 2009

2006
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

Vulnerability Analysis of MMS User Agents.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006


  Loading...