default search action
BibTeX records: Yousra Aafer
@inproceedings{DBLP:conf/eurosp/VagavoluAN24, author = {Dheeraj Vagavolu and Yousra Aafer and Meiyappan Nagappan}, title = {(Deep) Learning of Android Access Control Recommendation from Static Execution Paths}, booktitle = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2024, Vienna, Austria, July 8-12, 2024}, pages = {758--772}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/EuroSP60621.2024.00047}, doi = {10.1109/EUROSP60621.2024.00047}, timestamp = {Thu, 05 Sep 2024 16:02:09 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/VagavoluAN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-01269, author = {Noble Saji Mathews and Yelizaveta Brus and Yousra Aafer and Meiyappan Nagappan and Shane McIntosh}, title = {LLbezpeky: Leveraging Large Language Models for Vulnerability Detection}, journal = {CoRR}, volume = {abs/2401.01269}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.01269}, doi = {10.48550/ARXIV.2401.01269}, eprinttype = {arXiv}, eprint = {2401.01269}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-01269.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YeZSAZ23, author = {Yapeng Ye and Zhuo Zhang and Qingkai Shi and Yousra Aafer and Xiangyu Zhang}, title = {{D-ARM:} Disassembling {ARM} Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2391--2408}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179307}, doi = {10.1109/SP46215.2023.10179307}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/YeZSAZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VyasWAA23, author = {Parjanya Vyas and Asim Waheed and Yousra Aafer and N. Asokan}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Auditing Framework APIs via Inferred App-side Security Specifications}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {6061--6077}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/vyas}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/VyasWAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-10233, author = {Kishanthan Thangarajah and Noble Saji Mathews and Michael Pu and Meiyappan Nagappan and Yousra Aafer and Sridhar Chimalakonda}, title = {Statically Detecting Buffer Overflow in Cross-language Android Applications Written in Java and {C/C++}}, journal = {CoRR}, volume = {abs/2305.10233}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.10233}, doi = {10.48550/ARXIV.2305.10233}, eprinttype = {arXiv}, eprint = {2305.10233}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-10233.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/El-Rewini0A22, author = {Zeinab El{-}Rewini and Zhuo Zhang and Yousra Aafer}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Poirot: Probabilistically Recommending Protections for the Android Framework}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {937--950}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560710}, doi = {10.1145/3548606.3560710}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/El-Rewini0A22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0046WNA0XP22, author = {Fei Wang and Jianliang Wu and Yuhong Nan and Yousra Aafer and Xiangyu Zhang and Dongyan Xu and Mathias Payer}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {ProFactory: Improving IoT Security via Formalized Protocol Customization}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3879--3896}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/wang-fei}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/0046WNA0XP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/El-RewiniA21, author = {Zeinab El{-}Rewini and Yousra Aafer}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Dissecting Residual APIs in Custom Android ROMs}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1598--1611}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485374}, doi = {10.1145/3460120.3485374}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/El-RewiniA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangYTALZ21, author = {Zhuo Zhang and Wei You and Guanhong Tao and Yousra Aafer and Xuwei Liu and Xiangyu Zhang}, title = {StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {659--676}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00109}, doi = {10.1109/SP40001.2021.00109}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhangYTALZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangYYTLKAZ21, author = {Zhuo Zhang and Yapeng Ye and Wei You and Guanhong Tao and Wen{-}Chuan Lee and Yonghwi Kwon and Yousra Aafer and Xiangyu Zhang}, title = {{OSPREY:} Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {813--832}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00051}, doi = {10.1109/SP40001.2021.00051}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhangYYTLKAZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AaferYSS0Y21, author = {Yousra Aafer and Wei You and Yi Sun and Yu Shi and Xiangyu Zhang and Heng Yin}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2759--2776}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/aafer}, timestamp = {Thu, 01 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AaferYSS0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChoiKA0X20, author = {Hongjun Choi and Sayali Kate and Yousra Aafer and Xiangyu Zhang and Dongyan Xu}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {263--278}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417249}, doi = {10.1145/3372297.3417249}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChoiKA0X20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/KimZPWYA020, author = {I Luk Kim and Yunhui Zheng and Hogun Park and Weihang Wang and Wei You and Yousra Aafer and Xiangyu Zhang}, editor = {Gregg Rothermel and Doo{-}Hwan Bae}, title = {Finding client-side business flow tampering vulnerabilities}, booktitle = {{ICSE} '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June - 19 July, 2020}, pages = {222--233}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377811.3380355}, doi = {10.1145/3377811.3380355}, timestamp = {Tue, 28 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/KimZPWYA020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChoiKA0X20, author = {Hongjun Choi and Sayali Kate and Yousra Aafer and Xiangyu Zhang and Dongyan Xu}, editor = {Manuel Egele and Leyla Bilge}, title = {Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {349--364}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/choi}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChoiKA0X20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/You0KAPSHZ20, author = {Wei You and Zhuo Zhang and Yonghwi Kwon and Yousra Aafer and Fei Peng and Yu Shi and Carson Harmon and Xiangyu Zhang}, title = {{PMP:} Cost-effective Forced Execution with Probabilistic Memory Pre-planning}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1121--1138}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00035}, doi = {10.1109/SP40000.2020.00035}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/You0KAPSHZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuLTMAZ19, author = {Yingqi Liu and Wen{-}Chuan Lee and Guanhong Tao and Shiqing Ma and Yousra Aafer and Xiangyu Zhang}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {{ABS:} Scanning Neural Networks for Back-doors by Artificial Brain Stimulation}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1265--1282}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363216}, doi = {10.1145/3319535.3363216}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuLTMAZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChoiLAFTZXX18, author = {Hongjun Choi and Wen{-}Chuan Lee and Yousra Aafer and Fan Fei and Zhan Tu and Xiangyu Zhang and Dongyan Xu and Xinyan Deng}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Detecting Attacks Against Robotic Vehicles: {A} Control Invariant Approach}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {801--816}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243752}, doi = {10.1145/3243734.3243752}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChoiLAFTZXX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AaferTHZL18, author = {Yousra Aafer and Guanhong Tao and Jianjun Huang and Xiangyu Zhang and Ninghui Li}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Precise Android {API} Protection Mapping Derivation and Reasoning}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1151--1164}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243842}, doi = {10.1145/3243734.3243842}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AaferTHZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/TangZPAM0Z18, author = {Zhenhao Tang and Juan Zhai and Minxue Pan and Yousra Aafer and Shiqing Ma and Xiangyu Zhang and Jianhua Zhao}, editor = {Marianne Huchard and Christian K{\"{a}}stner and Gordon Fraser}, title = {Dual-force: understanding WebView malware via cross-language forced execution}, booktitle = {Proceedings of the 33rd {ACM/IEEE} International Conference on Automated Software Engineering, {ASE} 2018, Montpellier, France, September 3-7, 2018}, pages = {714--725}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3238147.3238221}, doi = {10.1145/3238147.3238221}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/TangZPAM0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AaferHS0LT18, author = {Yousra Aafer and Jianjun Huang and Yi Sun and Xiangyu Zhang and Ninghui Li and Chen Tian}, title = {AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_08-1\_Aafer\_paper.pdf}, timestamp = {Wed, 31 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/AaferHS0LT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiuMALZW018, author = {Yingqi Liu and Shiqing Ma and Yousra Aafer and Wen{-}Chuan Lee and Juan Zhai and Weihang Wang and Xiangyu Zhang}, title = {Trojaning Attack on Neural Networks}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03A-5\_Liu\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LiuMALZW018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KimWKZAMZ18, author = {I Luk Kim and Weihang Wang and Yonghwi Kwon and Yunhui Zheng and Yousra Aafer and Weijie Meng and Xiangyu Zhang}, editor = {Pierre{-}Antoine Champin and Fabien Gandon and Mounia Lalmas and Panagiotis G. Ipeirotis}, title = {AdBudgetKiller: Online Advertising Budget Draining Attack}, booktitle = {Proceedings of the 2018 World Wide Web Conference on World Wide Web, {WWW} 2018, Lyon, France, April 23-27, 2018}, pages = {297--307}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3178876.3186096}, doi = {10.1145/3178876.3186096}, timestamp = {Tue, 28 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/KimWKZAMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenLEAZ17, author = {Haining Chen and Ninghui Li and William Enck and Yousra Aafer and Xiangyu Zhang}, title = {Analysis of SEAndroid Policies: Combining {MAC} and {DAC} in Android}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {553--565}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134638}, doi = {10.1145/3134600.3134638}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChenLEAZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/WangKZAKLLMZE17, author = {Weihang Wang and Yonghwi Kwon and Yunhui Zheng and Yousra Aafer and I Luk Kim and Wen{-}Chuan Lee and Yingqi Liu and Weijie Meng and Xiangyu Zhang and Patrick Eugster}, editor = {Grigore Rosu and Massimiliano Di Penta and Tien N. Nguyen}, title = {{PAD:} programming third-party web advertisement censorship}, booktitle = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November 03, 2017}, pages = {240--251}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ASE.2017.8115637}, doi = {10.1109/ASE.2017.8115637}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/WangKZAKLLMZE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/HuangAPZT17, author = {Jianjun Huang and Yousra Aafer and David Mitchel Perry and Xiangyu Zhang and Chen Tian}, editor = {Grigore Rosu and Massimiliano Di Penta and Tien N. Nguyen}, title = {{UI} driven Android application reduction}, booktitle = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November 03, 2017}, pages = {286--296}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ASE.2017.8115642}, doi = {10.1109/ASE.2017.8115642}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/HuangAPZT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/MaAXLZLZ17, author = {Shiqing Ma and Yousra Aafer and Zhaogui Xu and Wen{-}Chuan Lee and Juan Zhai and Yingqi Liu and Xiangyu Zhang}, editor = {Eric Bodden and Wilhelm Sch{\"{a}}fer and Arie van Deursen and Andrea Zisman}, title = {{LAMP:} data provenance for graph based machine learning algorithms through derivative computation}, booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017}, pages = {786--797}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3106237.3106291}, doi = {10.1145/3106237.3106291}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/MaAXLZLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhangAYD16, author = {Xiao Zhang and Yousra Aafer and Kailiang Ying and Wenliang Du}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Hey, You, Get Off of My Image: Detecting Data Residue in Android Images}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {401--421}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_20}, doi = {10.1007/978-3-319-45744-4\_20}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ZhangAYD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhangYAQD16, author = {Xiao Zhang and Kailiang Ying and Yousra Aafer and Zhenshen Qiu and Wenliang Du}, title = {Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/life-after-app-installation-data-still-alive-data-residue-attacks-android.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ZhangYAQD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AaferZD16, author = {Yousra Aafer and Xiao Zhang and Wenliang Du}, editor = {Thorsten Holz and Stefan Savage}, title = {Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1153--1168}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aafer}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/AaferZD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AaferZZZCWZDG15, author = {Yousra Aafer and Nan Zhang and Zhongwen Zhang and Xiao Zhang and Kai Chen and XiaoFeng Wang and Xiao{-}yong Zhou and Wenliang Du and Michael Grace}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Hare Hunting in the Wild Android: {A} Study on the Threat of Hanging Attribute References}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1248--1259}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813648}, doi = {10.1145/2810103.2813648}, timestamp = {Sun, 22 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AaferZZZCWZDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RatazziAAHWD14, author = {E. Paul Ratazzi and Yousra Aafer and Amit Ahlawat and Hao Hao and Yifei Wang and Wenliang Du}, title = {A Systematic Security Evaluation of Android's Multi-User Framework}, journal = {CoRR}, volume = {abs/1410.7752}, year = {2014}, url = {http://arxiv.org/abs/1410.7752}, eprinttype = {arXiv}, eprint = {1410.7752}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/RatazziAAHWD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AaferDY13, author = {Yousra Aafer and Wenliang Du and Heng Yin}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {86--103}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_6}, doi = {10.1007/978-3-319-04283-1\_6}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/AaferDY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.