Author of the publication

Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.

, , , , and . USENIX Security Symposium, page 17-32. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Skill Squatting Attacks on Amazon Alexa., , , , , , and . USENIX Security Symposium, page 33-47. USENIX Association, (2018)Making USB Great Again with USBFILTER., , , , and . USENIX Security Symposium, page 415-430. USENIX Association, (2016)NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage., , , , , , and . NDSS, The Internet Society, (2019)Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution., , , , , , and . NDSS, The Internet Society, (2020)Fear and Logging in the Internet of Things., , , and . NDSS, The Internet Society, (2018)Runtime Analysis of Whole-System Provenance., , , , , , , and . CCS, page 1601-1616. ACM, (2018)Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks., , , , , and . CCS, page 3337-3351. ACM, (2021)Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations., , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 166-185. Springer, (2022)A Provenance Model for the European Union General Data Protection Regulation., , and . IPAW, volume 11017 of Lecture Notes in Computer Science, page 45-57. Springer, (2018)Tactical Provenance Analysis for Endpoint Detection and Response Systems., , and . SP, page 1172-1189. IEEE, (2020)
OSZAR »