37 results on '"Yousra Aafer"'
Search Results
2. (Deep) Learning of Android Access Control Recommendation from Static Execution Paths.
3. Auditing Framework APIs via Inferred App-side Security Specifications.
4. D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.
5. LLbezpeky: Leveraging Large Language Models for Vulnerability Detection.
6. ProFactory: Improving IoT Security via Formalized Protocol Customization.
7. Poirot: Probabilistically Recommending Protections for the Android Framework.
8. Statically Detecting Buffer Overflow in Cross-language Android Applications Written in Java and C/C++.
9. Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.
10. OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
11. StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting.
12. Dissecting Residual APIs in Custom Android ROMs.
13. Finding client-side business flow tampering vulnerabilities.
14. PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning.
15. Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles.
16. Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles.
17. ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation.
18. AdBudgetKiller: Online Advertising Budget Draining Attack.
19. Dual-force: understanding WebView malware via cross-language forced execution.
20. Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach.
21. Precise Android API Protection Mapping Derivation and Reasoning.
22. LAMP: data provenance for graph based machine learning algorithms through derivative computation.
23. UI driven Android application reduction.
24. PAD: programming third-party web advertisement censorship.
25. Analysis of SEAndroid Policies: Combining MAC and DAC in Android.
26. Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis.
27. Hey, You, Get Off of My Image: Detecting Data Residue in Android Images.
28. AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection.
29. Trojaning Attack on Neural Networks.
30. Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
31. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android.
32. Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android.
33. A Systematic Security Evaluation of Android's Multi-User Framework.
34. AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection
35. Trojaning Attack on Neural Networks
36. Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android
37. The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.