Follow
Collin Mulliner
Collin Mulliner
MUlliNER.ORG
Verified email at mulliner.org - Homepage
Title
Cited by
Cited by
Year
{UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware
A Kharaz, S Arshad, C Mulliner, W Robertson, E Kirda
25th USENIX security symposium (USENIX Security 16), 757-772, 2016
5612016
Vulnerability analysis and attacks on NFC-enabled mobile phones
C Mulliner
2009 International Conference on Availability, Reliability and Security, 695-700, 2009
2512009
Android hacker's handbook
JJ Drake, Z Lanier, C Mulliner, PO Fora, SA Ridley, G Wicherski
John Wiley & Sons, 2014
1852014
SMS-Based One-Time Passwords: Attacks and Defense: (Short Paper)
C Mulliner, R Borgaonkar, P Stewin, JP Seifert
Detection of Intrusions and Malware, and Vulnerability Assessment: 10th …, 2013
1732013
Rise of the iBots: Owning a telco network
C Mulliner, JP Seifert
2010 5th International Conference on Malicious and Unwanted Software, 71-80, 2010
1312010
Fuzzing the Phone in your Phone
C Mulliner, C Miller
Black Hat USA 25, 31, 2009
1302009
{SMS} of Death: From Analyzing to Attacking Mobile Phones on a Large Scale
C Mulliner, N Golde, JP Seifert
20th USENIX Security Symposium (USENIX Security 11), 2011
1282011
Patchdroid: Scalable third-party security patches for android devices
C Mulliner, J Oberheide, W Robertson, E Kirda
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
902013
Using labeling to prevent cross-service attacks against smart phones
C Mulliner, G Vigna, D Dagon, W Lee
Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006
722006
Injecting SMS Messages into Smart Phones for Security Analysis.
C Mulliner, C Miller
WOOT 9, 5-5, 2009
712009
Device fingerprinting at a merchant location
OSC Quigley, C Mulliner
US Patent 9,805,370, 2017
702017
Security of smart phones
CR Mulliner
University of California, Santa Barbara, 2006
682006
Vulnerability analysis of mms user agents
C Mulliner, G Vigna
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 77-88, 2006
632006
Curiousdroid: automated user interface interaction for android application analysis sandboxes
P Carter, C Mulliner, M Lindorfer, W Robertson, E Kirda
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
572017
Virtualswindle: An automated attack against in-app billing on android
C Mulliner, W Robertson, E Kirda
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
532014
Poster: Honeydroid-creating a smartphone honeypot
C Mulliner, S Liebergeld, M Lange
IEEE Symposium on Security and Privacy 2, 48, 2011
422011
Privexec: Private execution as an operating system service
K Onarlioglu, C Mulliner, W Robertson, E Kirda
2013 IEEE Symposium on Security and Privacy, 206-220, 2013
362013
Usblock: Blocking usb-based keypress injection attacks
S Neuner, AG Voyiatzis, S Fotopoulos, C Mulliner, ER Weippl
Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 …, 2018
322018
Attacking NFC mobile phones
C Mulliner
EUSecWest, London, UK, 2008
322008
Read It Twice! A Mass-Storage-Based TOCTTOU Attack.
C Mulliner, B Michéle
WOOT, 105-112, 2012
302012
The system can't perform the operation now. Try again later.
Articles 1–20