BibTeX records: Yousra Aafer

download as .bib file

@inproceedings{DBLP:conf/ndss/AaferHS0LT18,
  author    = {Yousra Aafer and
               Jianjun Huang and
               Yi Sun and
               Xiangyu Zhang and
               Ninghui Li and
               Chen Tian},
  title     = {AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency
               Detection},
  booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  year      = {2018},
  crossref  = {DBLP:conf/ndss/2018},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018\_08-1\_Aafer\_paper.pdf},
  timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/AaferHS0LT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiuMALZW018,
  author    = {Yingqi Liu and
               Shiqing Ma and
               Yousra Aafer and
               Wen{-}Chuan Lee and
               Juan Zhai and
               Weihang Wang and
               Xiangyu Zhang},
  title     = {Trojaning Attack on Neural Networks},
  booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  year      = {2018},
  crossref  = {DBLP:conf/ndss/2018},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018\_03A-5\_Liu\_paper.pdf},
  timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/LiuMALZW018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KimWKZAMZ18,
  author    = {I Luk Kim and
               Weihang Wang and
               Yonghwi Kwon and
               Yunhui Zheng and
               Yousra Aafer and
               Weijie Meng and
               Xiangyu Zhang},
  title     = {AdBudgetKiller: Online Advertising Budget Draining Attack},
  booktitle = {Proceedings of the 2018 World Wide Web Conference on World Wide Web,
               {WWW} 2018, Lyon, France, April 23-27, 2018},
  pages     = {297--307},
  year      = {2018},
  crossref  = {DBLP:conf/www/2018},
  url       = {http://doi.acm.org/10.1145/3178876.3186096},
  doi       = {10.1145/3178876.3186096},
  timestamp = {Thu, 05 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/www/KimWKZAMZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenLEAZ17,
  author    = {Haining Chen and
               Ninghui Li and
               William Enck and
               Yousra Aafer and
               Xiangyu Zhang},
  title     = {Analysis of SEAndroid Policies: Combining {MAC} and {DAC} in Android},
  booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference,
               Orlando, FL, USA, December 4-8, 2017},
  pages     = {553--565},
  year      = {2017},
  crossref  = {DBLP:conf/acsac/2017},
  url       = {http://doi.acm.org/10.1145/3134600.3134638},
  doi       = {10.1145/3134600.3134638},
  timestamp = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/ChenLEAZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/WangKZAKLLMZE17,
  author    = {Weihang Wang and
               Yonghwi Kwon and
               Yunhui Zheng and
               Yousra Aafer and
               I Luk Kim and
               Wen{-}Chuan Lee and
               Yingqi Liu and
               Weijie Meng and
               Xiangyu Zhang and
               Patrick Eugster},
  title     = {{PAD:} programming third-party web advertisement censorship},
  booktitle = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated
               Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November
               03, 2017},
  pages     = {240--251},
  year      = {2017},
  crossref  = {DBLP:conf/kbse/2017},
  url       = {https://doi.org/10.1109/ASE.2017.8115637},
  doi       = {10.1109/ASE.2017.8115637},
  timestamp = {Thu, 05 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/kbse/WangKZAKLLMZE17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/HuangAPZT17,
  author    = {Jianjun Huang and
               Yousra Aafer and
               David Mitchel Perry and
               Xiangyu Zhang and
               Chen Tian},
  title     = {{UI} driven Android application reduction},
  booktitle = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated
               Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November
               03, 2017},
  pages     = {286--296},
  year      = {2017},
  crossref  = {DBLP:conf/kbse/2017},
  url       = {https://doi.org/10.1109/ASE.2017.8115642},
  doi       = {10.1109/ASE.2017.8115642},
  timestamp = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/kbse/HuangAPZT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/MaAXLZLZ17,
  author    = {Shiqing Ma and
               Yousra Aafer and
               Zhaogui Xu and
               Wen{-}Chuan Lee and
               Juan Zhai and
               Yingqi Liu and
               Xiangyu Zhang},
  title     = {{LAMP:} data provenance for graph based machine learning algorithms
               through derivative computation},
  booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
               Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
  pages     = {786--797},
  year      = {2017},
  crossref  = {DBLP:conf/sigsoft/2017},
  url       = {http://doi.acm.org/10.1145/3106237.3106291},
  doi       = {10.1145/3106237.3106291},
  timestamp = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sigsoft/MaAXLZLZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangAYD16,
  author    = {Xiao Zhang and
               Yousra Aafer and
               Kailiang Ying and
               Wenliang Du},
  title     = {Hey, You, Get Off of My Image: Detecting Data Residue in Android Images},
  booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
               in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
               Part {I}},
  pages     = {401--421},
  year      = {2016},
  crossref  = {DBLP:conf/esorics/2016-1},
  url       = {https://doi.org/10.1007/978-3-319-45744-4\_20},
  doi       = {10.1007/978-3-319-45744-4\_20},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/ZhangAYD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhangYAQD16,
  author    = {Xiao Zhang and
               Kailiang Ying and
               Yousra Aafer and
               Zhenshen Qiu and
               Wenliang Du},
  title     = {Life after App Uninstallation: Are the Data Still Alive? Data Residue
               Attacks on Android},
  booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
               2016, San Diego, California, USA, February 21-24, 2016},
  year      = {2016},
  crossref  = {DBLP:conf/ndss/2016},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/life-after-app-installation-data-still-alive-data-residue-attacks-android.pdf},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/ZhangYAQD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AaferZD16,
  author    = {Yousra Aafer and
               Xiao Zhang and
               Wenliang Du},
  title     = {Harvesting Inconsistent Security Configurations in Custom Android
               ROMs via Differential Analysis},
  booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016.},
  pages     = {1153--1168},
  year      = {2016},
  crossref  = {DBLP:conf/uss/2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aafer},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/AaferZD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AaferZZZCWZDG15,
  author    = {Yousra Aafer and
               Nan Zhang and
               Zhongwen Zhang and
               Xiao Zhang and
               Kai Chen and
               XiaoFeng Wang and
               Xiao{-}yong Zhou and
               Wenliang Du and
               Michael Grace},
  title     = {Hare Hunting in the Wild Android: {A} Study on the Threat of Hanging
               Attribute References},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {1248--1259},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {http://doi.acm.org/10.1145/2810103.2813648},
  doi       = {10.1145/2810103.2813648},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AaferZZZCWZDG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RatazziAAHWD14,
  author    = {Paul Ratazzi and
               Yousra Aafer and
               Amit Ahlawat and
               Hao Hao and
               Yifei Wang and
               Wenliang Du},
  title     = {A Systematic Security Evaluation of Android's Multi-User Framework},
  journal   = {CoRR},
  volume    = {abs/1410.7752},
  year      = {2014},
  url       = {http://arxiv.org/abs/1410.7752},
  archivePrefix = {arXiv},
  eprint    = {1410.7752},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/RatazziAAHWD14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AaferDY13,
  author    = {Yousra Aafer and
               Wenliang Du and
               Heng Yin},
  title     = {DroidAPIMiner: Mining API-Level Features for Robust Malware Detection
               in Android},
  booktitle = {Security and Privacy in Communication Networks - 9th International
               {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
               25-28, 2013, Revised Selected Papers},
  pages     = {86--103},
  year      = {2013},
  crossref  = {DBLP:conf/securecomm/2013},
  url       = {https://doi.org/10.1007/978-3-319-04283-1\_6},
  doi       = {10.1007/978-3-319-04283-1\_6},
  timestamp = {Mon, 05 Jun 2017 12:43:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/AaferDY13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2018,
  title     = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  publisher = {The Internet Society},
  year      = {2018},
  url       = {https://www.ndss-symposium.org/ndss2018/},
  timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/www/2018,
  editor    = {Pierre{-}Antoine Champin and
               Fabien L. Gandon and
               Mounia Lalmas and
               Panagiotis G. Ipeirotis},
  title     = {Proceedings of the 2018 World Wide Web Conference on World Wide Web,
               {WWW} 2018, Lyon, France, April 23-27, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://doi.acm.org/10.1145/3178876},
  doi       = {10.1145/3178876},
  timestamp = {Mon, 16 Apr 2018 07:45:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/www/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2017,
  title     = {Proceedings of the 33rd Annual Computer Security Applications Conference,
               Orlando, FL, USA, December 4-8, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3134600},
  doi       = {10.1145/3134600},
  isbn      = {978-1-4503-5345-8},
  timestamp = {Thu, 07 Dec 2017 13:06:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/kbse/2017,
  editor    = {Grigore Rosu and
               Massimiliano Di Penta and
               Tien N. Nguyen},
  title     = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated
               Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November
               03, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8106906},
  isbn      = {978-1-5386-2684-9},
  timestamp = {Thu, 30 Nov 2017 15:06:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/kbse/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigsoft/2017,
  editor    = {Eric Bodden and
               Wilhelm Sch{\"{a}}fer and
               Arie van Deursen and
               Andrea Zisman},
  title     = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
               Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3106237},
  isbn      = {978-1-4503-5105-8},
  timestamp = {Wed, 16 Aug 2017 07:56:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sigsoft/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016-1,
  editor    = {Ioannis G. Askoxylakis and
               Sotiris Ioannidis and
               Sokratis K. Katsikas and
               Catherine A. Meadows},
  title     = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
               in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9878},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45744-4},
  doi       = {10.1007/978-3-319-45744-4},
  isbn      = {978-3-319-45743-7},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2016,
  title     = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
               2016, San Diego, California, USA, February 21-24, 2016},
  publisher = {The Internet Society},
  year      = {2016},
  url       = {https://www.ndss-symposium.org/ndss2016/},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2016,
  editor    = {Thorsten Holz and
               Stefan Savage},
  title     = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016},
  publisher = {{USENIX} Association},
  year      = {2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015,
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2810103},
  isbn      = {978-1-4503-3832-5},
  timestamp = {Wed, 11 Apr 2018 11:09:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2013,
  editor    = {Tanveer A. Zia and
               Albert Y. Zomaya and
               Vijay Varadharajan and
               Zhuoqing Morley Mao},
  title     = {Security and Privacy in Communication Networks - 9th International
               {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
               25-28, 2013, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {127},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-04283-1},
  doi       = {10.1007/978-3-319-04283-1},
  isbn      = {978-3-319-04282-4},
  timestamp = {Mon, 05 Jun 2017 12:43:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier