Pin skimmer: Inferring pins through the camera and microphone L Simon, R Anderson Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013 | 158 | 2013 |
Fuzzbench: an open fuzzer benchmarking platform and service J Metzman, L Szekeres, L Simon, R Sprabery, A Arya Proceedings of the 29th ACM joint meeting on European software engineering …, 2021 | 155 | 2021 |
What you get is what you C: Controlling side effects in mainstream C compilers L Simon, D Chisnall, R Anderson 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 1-15, 2018 | 91 | 2018 |
Fuzzfactory: domain-specific fuzzing with waypoints R Padhye, C Lemieux, K Sen, L Simon, H Vijayakumar Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-29, 2019 | 81 | 2019 |
SOK: Making sense of censorship resistance systems S Khattak, MT Elahi, L Simon, CM Swanson, SJ Murdoch, I Goldberg Water Treatment Technology 2016 (4), 37-61, 2016 | 69 | 2016 |
Hearing your touch: A new acoustic side channel on smartphones I Shumailov, L Simon, J Yan, R Anderson arXiv preprint arXiv:1903.11137, 2019 | 60 | 2019 |
Don’t interrupt me while i type: Inferring text entered through gesture typing on android keyboards L Simon, W Xu, R Anderson Privacy Enhancing Technologies Symposium Advisory Board, 2016 | 44 | 2016 |
Security analysis of android factory resets L Simon, R Anderson 4th Mobile Security Technologies Workshop (MoST), 2015 | 29 | 2015 |
Horizontal privilege escalation in trusted applications D Suciu, S McLaughlin, L Simon, R Sion 29th USENIX Security Symposium (USENIX Security 20), 2020 | 28 | 2020 |
Speed adjustment algorithm for an RFID reader and conveyor belt system performing dynamic framed slotted aloha L Simon, P Saengudomlert, U Ketprom 2008 IEEE International Conference on RFID, 199-206, 2008 | 14 | 2008 |
Security analysis of consumer-grade anti-theft solutions provided by android mobile anti-virus apps L Simon, R Anderson 4th Mobile Security Technologies Workshop (MoST), 2015 | 13 | 2015 |
Systemization of pluggable transports for censorship resistance S Khattak, L Simon, SJ Murdoch arXiv preprint arXiv:1412.7448, 2014 | 11 | 2014 |
Improving fuzzing through controlled compilation L Simon, A Verma 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 34-52, 2020 | 7 | 2020 |
Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager PC Amusuo, KA Robinson, S Torres-Arias, L Simon, JC Davis arXiv preprint arXiv:2310.14117, 2023 | 3 | 2023 |
Human and Avicennia marina Mangrove Populations: with Special Reference to Qatar O Pernot, MH Abu-Dieyeh, L Simon, J Al-Khyatt, M Al-Ghouti The Arab World Geographer 20 (2-3), 208-236, 2017 | 3 | 2017 |
SCORED'22: ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses S Torres-Arias, M Melara, L Simon Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 1 | 2022 |
Exploring new attack vectors for the exploitation of smartphones L Simon University of Cambridge, Computer Laboratory, 2017 | 1 | 2017 |
Ecosystem services and mangroves in Qatar: preservation issues O Pernot, L Simon, J Al-Khyatt, M Al-Ghouti, MH Abu-Dieyeh Qscience Proceedings 2015 (5), 37, 2015 | 1 | 2015 |
SCORED'23: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses M Melara, S Torres-Arias, L Simon Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | | 2023 |
Erasing Secrets from RAM L Simon Real World Crypto Conference (RWC'17), 2017 | | 2017 |