Collin Mulliner
Collin Mulliner
Verified email at - Homepage
Cited by
Cited by
{UNVEIL}: A large-scale, automated approach to detecting ransomware
A Kharaz, S Arshad, C Mulliner, W Robertson, E Kirda
25th {USENIX} Security Symposium ({USENIX} Security 16), 757-772, 2016
Vulnerability analysis and attacks on NFC-enabled mobile phones
C Mulliner
2009 International Conference on Availability, Reliability and Security, 695-700, 2009
Android hacker's handbook
JJ Drake, Z Lanier, C Mulliner, PO Fora, SA Ridley, G Wicherski
John Wiley & Sons, 2014
Rise of the iBots: Owning a telco network
C Mulliner, JP Seifert
2010 5th International Conference on Malicious and Unwanted Software, 71-80, 2010
SMS-based one-time passwords: attacks and defense
C Mulliner, R Borgaonkar, P Stewin, JP Seifert
International Conference on Detection of Intrusions and Malware, and …, 2013
Fuzzing the Phone in your Phone
C Mulliner, C Miller
Black Hat USA 25, 31, 2009
SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale.
C Mulliner, N Golde, JP Seifert
USENIX Security Symposium 168, 2011
Patchdroid: Scalable third-party security patches for android devices
C Mulliner, J Oberheide, W Robertson, E Kirda
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
Using labeling to prevent cross-service attacks against smart phones
C Mulliner, G Vigna, D Dagon, W Lee
International Conference on Detection of Intrusions and Malware, and …, 2006
Injecting SMS messages into smart phones for security analysis
C Mulliner, C Miller
USENIX Workshop on Offensive Technologies (WOOT) 29, 2009
Vulnerability analysis of mms user agents
C Mulliner, G Vigna
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 77-88, 2006
Security of smart phones
CR Mulliner
University of California, Santa Barbara, 2006
Curiousdroid: automated user interface interaction for android application analysis sandboxes
P Carter, C Mulliner, M Lindorfer, W Robertson, E Kirda
International Conference on Financial Cryptography and Data Security, 231-249, 2016
Virtualswindle: An automated attack against in-app billing on android
C Mulliner, W Robertson, E Kirda
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Poster: Honeydroid-creating a smartphone honeypot
C Mulliner, S Liebergeld, M Lange
IEEE Symposium on Security and Privacy 2, 2011
Privexec: Private execution as an operating system service
K Onarlioglu, C Mulliner, W Robertson, E Kirda
2013 IEEE Symposium on Security and Privacy, 206-220, 2013
Attacking NFC mobile phones
C Mulliner
25th Chaos Communication Congress, Berlin, Germany (Dec. 2008). Retrieved …, 2008
Read It Twice! A Mass-Storage-Based TOCTTOU Attack.
C Mulliner, B Michéle
WOOT, 105-112, 2012
Privacy leaks in mobile phone internet access
C Mulliner
2010 14th International Conference on Intelligence in Next Generation …, 2010
Device fingerprinting at a merchant location
OSC Quigley, C Mulliner
US Patent 9,805,370, 2017
The system can't perform the operation now. Try again later.
Articles 1–20