Michael Backes [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Up-To-Crash: Evaluating Third-Party Library Updatability on Android IEEEEuroS&P-2019 - Stockholm, Sweden
Fidelius: Protecting User Secrets from Compromised Browsers IEEESymposium-2019 - San Francisco, US
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy IEEESymposium-2019 - San Francisco, US
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys Asiacrypt2018-2018 - Brisbane, Australia
Dissecting Privacy Risks in Biomedical Data IEEEEuropeanSymposiumS&P-2018 - London, United Kingdom
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure IEEEEuropeanSymposiumS&P-2018 - London, United Kingdom
Didn’t You Hear Me? – Towards More Successful Web Vulnerability Notifications. NDSS-2018 - san diego,usa
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers CSET-2017 - vancouver,canada
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange EuroSP-2017 - paris,france
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning EuroSP-2017 - paris,france
Efficient and Flexible Discovery of PHP Application Vulnerabilities EuroSP-2017 - paris,france
ARTist: The Android Runtime Instrumentation and Security Toolkit EuroSP-2017 - paris,france
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code NDSS-2017 - california,usa
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying NDSS-2017 - california,usa
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses USENIX-2016 - austin,usa
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification USENIX-2016 - austin,usa
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis USENIX-2016 - austin,usa
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles USENIX-2016 - austin,usa
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms against Structural Attacks PETS-2016 - darmstadt,germany
Detecting Hardware-Assisted Virtualized Systems Dimva-2016 - Donostia-San Sebastián, Spain
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization NDSS-2016 - california,usa
Boxify: Full-fledged App Sandboxing for Stock Android SecuritySymposium-2015 - washington,USA
Scippa: System-Centric IPC Provenance on Android ACSAC-2014 - new orleans,usa
Android Security Framework: Extensible Multi-Layered Access Control on Android ACSAC-2014 - new orleans,usa
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection CCS-2014 - Scottsdale,USA
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code CCS-2014 - Scottsdale,USA
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing usenix-2014 - san diego,usa
BackRef: Accountability in Anonymous Communication Networks ACNS-2014 - Lausanne, Switzerland
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP ACNS-2014 - Lausanne, Switzerland
AnoA: A Framework For Analyzing Anonymous Communication Protocols CSF-2013 - Louisiana,USA
Verified Security of Merkle-Damgaard 25th IEEE Computer Security Foundations Symposium-2012 - Cambridge, MA, USA
Provably Secure and Practical Onion Routing 25th IEEE Computer Security Foundations Symposium-2012 - Cambridge, MA, USA
Acoustic Side-Channel Attacks On Printers 19th USENIX Security Symposium-2010 - Washington DC, USA Security