Follow
Collin Mulliner
Collin Mulliner
MUlliNER.ORG
Verified email at mulliner.org - Homepage
Title
Cited by
Cited by
Year
{UNVEIL}: A {Large-Scale}, Automated Approach to Detecting Ransomware
A Kharaz, S Arshad, C Mulliner, W Robertson, E Kirda
25th USENIX security symposium (USENIX Security 16), 757-772, 2016
3872016
Vulnerability analysis and attacks on NFC-enabled mobile phones
C Mulliner
2009 International Conference on Availability, Reliability and Security, 695-700, 2009
2372009
Android hacker's handbook
JJ Drake, Z Lanier, C Mulliner, PO Fora, SA Ridley, G Wicherski
John Wiley & Sons, 2014
1742014
SMS-based one-time passwords: attacks and defense
C Mulliner, R Borgaonkar, P Stewin, JP Seifert
International Conference on Detection of Intrusions and Malware, and …, 2013
1412013
Rise of the iBots: Owning a telco network
C Mulliner, JP Seifert
2010 5th International Conference on Malicious and Unwanted Software, 71-80, 2010
1342010
Fuzzing the Phone in your Phone
C Mulliner, C Miller
Black Hat USA 25, 31, 2009
1232009
{SMS} of Death: From Analyzing to Attacking Mobile Phones on a Large Scale
C Mulliner, N Golde, JP Seifert
20th USENIX Security Symposium (USENIX Security 11), 2011
1092011
Patchdroid: Scalable third-party security patches for android devices
C Mulliner, J Oberheide, W Robertson, E Kirda
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
842013
Using labeling to prevent cross-service attacks against smart phones
C Mulliner, G Vigna, D Dagon, W Lee
International Conference on Detection of Intrusions and Malware, and …, 2006
722006
Injecting SMS messages into smart phones for security analysis
C Mulliner, C Miller
USENIX Workshop on Offensive Technologies (WOOT) 29, 2009
682009
Vulnerability analysis of mms user agents
C Mulliner, G Vigna
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 77-88, 2006
672006
Security of smart phones
CR Mulliner
University of California, Santa Barbara, 2006
642006
Curiousdroid: automated user interface interaction for android application analysis sandboxes
P Carter, C Mulliner, M Lindorfer, W Robertson, E Kirda
International Conference on Financial Cryptography and Data Security, 231-249, 2016
482016
Virtualswindle: An automated attack against in-app billing on android
C Mulliner, W Robertson, E Kirda
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
462014
Poster: Honeydroid-creating a smartphone honeypot
C Mulliner, S Liebergeld, M Lange
IEEE Symposium on Security and Privacy 2, 2011
412011
Device fingerprinting at a merchant location
OSC Quigley, C Mulliner
US Patent 9,805,370, 2017
402017
Privexec: Private execution as an operating system service
K Onarlioglu, C Mulliner, W Robertson, E Kirda
2013 IEEE Symposium on Security and Privacy, 206-220, 2013
352013
Attacking NFC mobile phones
C Mulliner
EUSecWest 2008, 2008
322008
Read It Twice! A Mass-Storage-Based TOCTTOU Attack.
C Mulliner, B Michéle
WOOT, 105-112, 2012
312012
Taming Mr Hayes: Mitigating signaling based attacks on smartphones
C Mulliner, S Liebergeld, M Lange, JP Seifert
IEEE/IFIP international conference on dependable systems and networks (DSN …, 2012
272012
The system can't perform the operation now. Try again later.
Articles 1–20