Collin Mulliner
According to our database1,
Collin Mulliner
authored at least 24 papers
between 2006 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
2017
it Inf. Technol., 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes.
Proceedings of the Financial Cryptography and Data Security, 2016
2015
Proceedings of the Financial Cryptography and Data Security, 2015
2014
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
PhD thesis, 2012
Tiny Trans. Comput. Sci., 2012
Datenschutz und Datensicherheit, 2012
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
2009
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2006
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006