Collin Mulliner
Collin Mulliner
MUlliNER.ORG
Verified email at mulliner.org - Homepage
Title
Cited by
Cited by
Year
{UNVEIL}: A large-scale, automated approach to detecting ransomware
A Kharaz, S Arshad, C Mulliner, W Robertson, E Kirda
25th {USENIX} Security Symposium ({USENIX} Security 16), 757-772, 2016
256*2016
Vulnerability analysis and attacks on NFC-enabled mobile phones
C Mulliner
2009 International Conference on Availability, Reliability and Security, 695-700, 2009
2122009
Android hacker's handbook
JJ Drake, Z Lanier, C Mulliner, PO Fora, SA Ridley, G Wicherski
John Wiley & Sons, 2014
1462014
Rise of the iBots: Owning a telco network
C Mulliner, JP Seifert
2010 5th International Conference on Malicious and Unwanted Software, 71-80, 2010
1192010
SMS-based one-time passwords: attacks and defense
C Mulliner, R Borgaonkar, P Stewin, JP Seifert
International Conference on Detection of Intrusions and Malware, and …, 2013
1072013
Fuzzing the Phone in your Phone
C Mulliner, C Miller
Black Hat USA 25, 31, 2009
1042009
SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale.
C Mulliner, N Golde, JP Seifert
USENIX Security Symposium 168, 2011
882011
Patchdroid: Scalable third-party security patches for android devices
C Mulliner, J Oberheide, W Robertson, E Kirda
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
662013
Injecting SMS messages into smart phones for security analysis
C Mulliner, C Miller
USENIX Workshop on Offensive Technologies (WOOT) 29, 2009
652009
Using labeling to prevent cross-service attacks against smart phones
C Mulliner, G Vigna, D Dagon, W Lee
International Conference on Detection of Intrusions and Malware, and …, 2006
652006
Vulnerability analysis of mms user agents
C Mulliner, G Vigna
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 77-88, 2006
612006
Security of smart phones
CR Mulliner
University of California, Santa Barbara, 2006
582006
Poster: Honeydroid-creating a smartphone honeypot
C Mulliner, S Liebergeld, M Lange
IEEE Symposium on Security and Privacy 2, 2011
442011
Virtualswindle: An automated attack against in-app billing on android
C Mulliner, W Robertson, E Kirda
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
382014
CuriousDroid: automated user interface interaction for android application analysis sandboxes
P Carter, C Mulliner, M Lindorfer, W Robertson, E Kirda
International Conference on Financial Cryptography and Data Security, 231-249, 2016
372016
Privexec: Private execution as an operating system service
K Onarlioglu, C Mulliner, W Robertson, E Kirda
2013 IEEE Symposium on Security and Privacy, 206-220, 2013
332013
Attacking NFC mobile phones
C Mulliner
EUSecWest 2008, 2008
272008
Read It Twice! A Mass-Storage-Based TOCTTOU Attack.
C Mulliner, B Michéle
WOOT, 105-112, 2012
252012
Privacy leaks in mobile phone internet access
C Mulliner
2010 14th International Conference on Intelligence in Next Generation …, 2010
232010
Taming Mr Hayes: Mitigating signaling based attacks on smartphones
C Mulliner, S Liebergeld, M Lange, JP Seifert
IEEE/IFIP international conference on dependable systems and networks (DSN …, 2012
202012
The system can't perform the operation now. Try again later.
Articles 1–20