Follow
Collin Mulliner
Collin Mulliner
MUlliNER.ORG
Verified email at mulliner.org - Homepage
Title
Cited by
Cited by
Year
{UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware
A Kharaz, S Arshad, C Mulliner, W Robertson, E Kirda
25th USENIX security symposium (USENIX Security 16), 757-772, 2016
5072016
Vulnerability analysis and attacks on NFC-enabled mobile phones
C Mulliner
2009 International Conference on Availability, Reliability and Security, 695-700, 2009
2472009
Android hacker's handbook
JJ Drake, Z Lanier, C Mulliner, PO Fora, SA Ridley, G Wicherski
John Wiley & Sons, 2014
1802014
SMS-Based One-Time Passwords: Attacks and Defense: (Short Paper)
C Mulliner, R Borgaonkar, P Stewin, JP Seifert
Detection of Intrusions and Malware, and Vulnerability Assessment: 10th …, 2013
1622013
Rise of the iBots: Owning a telco network
C Mulliner, JP Seifert
2010 5th International Conference on Malicious and Unwanted Software, 71-80, 2010
1322010
Fuzzing the Phone in your Phone
C Mulliner, C Miller
Black Hat USA 25, 31, 2009
1252009
{SMS} of Death: From Analyzing to Attacking Mobile Phones on a Large Scale
C Mulliner, N Golde, JP Seifert
20th USENIX Security Symposium (USENIX Security 11), 2011
1172011
Patchdroid: Scalable third-party security patches for android devices
C Mulliner, J Oberheide, W Robertson, E Kirda
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
902013
Using labeling to prevent cross-service attacks against smart phones
C Mulliner, G Vigna, D Dagon, W Lee
Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006
712006
Injecting SMS Messages into Smart Phones for Security Analysis.
C Mulliner, C Miller
WOOT 9, 5-5, 2009
702009
Security of smart phones
CR Mulliner
University of California, Santa Barbara, 2006
672006
Device fingerprinting at a merchant location
OSC Quigley, C Mulliner
US Patent 9,805,370, 2017
662017
Vulnerability analysis of mms user agents
C Mulliner, G Vigna
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 77-88, 2006
622006
Curiousdroid: automated user interface interaction for android application analysis sandboxes
P Carter, C Mulliner, M Lindorfer, W Robertson, E Kirda
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
562017
Poster: Honeydroid-creating a smartphone honeypot
C Mulliner, S Liebergeld, M Lange
IEEE Symposium on Security and Privacy 2, 48, 2011
532011
Virtualswindle: An automated attack against in-app billing on android
C Mulliner, W Robertson, E Kirda
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
512014
Privexec: Private execution as an operating system service
K Onarlioglu, C Mulliner, W Robertson, E Kirda
2013 IEEE Symposium on Security and Privacy, 206-220, 2013
352013
Attacking NFC mobile phones
C Mulliner
EUSecWest 2008, 2008
312008
Read It Twice! A Mass-Storage-Based TOCTTOU Attack.
C Mulliner, B Michéle
WOOT, 105-112, 2012
292012
Privacy leaks in mobile phone internet access
C Mulliner
2010 14th International Conference on Intelligence in Next Generation …, 2010
292010
The system can't perform the operation now. Try again later.
Articles 1–20