Остановите войну!
for scientists:
default search action
Sam Malek
Publications
- 2021
- [j23]Hamid Bagheri, Jianghao Wang, Jarod Aerts, Negar Ghorbani, Sam Malek:
Flair: efficient analysis of Android inter-component vulnerabilities in response to incremental changes. Empir. Softw. Eng. 26(3): 54 (2021) - 2019
- [j22]Mahmoud Hammad, Hamid Bagheri, Sam Malek:
DelDroid: An automated approach for determination and enforcement of least-privilege architecture in android. J. Syst. Softw. 149: 83-100 (2019) - [p1]Sam Malek, Hamid Bagheri, Joshua Garcia, Alireza Sadeghi:
Security and Software Engineering. Handbook of Software Engineering 2019: 445-489 - 2018
- [j21]Hamid Bagheri, Eunsuk Kang, Sam Malek, Daniel Jackson:
A formal approach for detection of security flaws in the android permission system. Formal Aspects Comput. 30(5): 525-544 (2018) - [c78]Alireza Sadeghi, Reyhaneh Jabbarvand, Negar Ghorbani, Hamid Bagheri, Sam Malek:
A temporal permission analysis and enforcement framework for Android. ICSE 2018: 846-857 - [c76]Hamid Bagheri, Jianghao Wang, Jarod Aerts, Sam Malek:
Efficient, Evolutionary Security Analysis of Interacting Android Apps. ICSME 2018: 357-368 - 2017
- [j18]Alireza Sadeghi, Hamid Bagheri, Joshua Garcia, Sam Malek:
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software. IEEE Trans. Software Eng. 43(6): 492-530 (2017) - [c74]Mahmoud Hammad, Hamid Bagheri, Sam Malek:
Determination and Enforcement of Least-Privilege Architecture in Android. ICSA 2017: 59-68 - 2016
- [j17]Hamid Bagheri, Joshua Garcia, Alireza Sadeghi, Sam Malek, Nenad Medvidovic:
Software architectural principles in contemporary mobile software: from conception to practice. J. Syst. Softw. 119: 31-44 (2016) - [c68]Hamid Bagheri, Alireza Sadeghi, Reyhaneh Jabbarvand Behrouz, Sam Malek:
Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android. DSN 2016: 514-525 - [c67]Bradley R. Schmerl, Jeff Gennari, Alireza Sadeghi, Hamid Bagheri, Sam Malek, Javier Cámara, David Garlan:
Architecture Modeling and Analysis of Security in Android Systems. ECSA 2016: 274-290 - [c66]Nariman Mirzaei, Joshua Garcia, Hamid Bagheri, Alireza Sadeghi, Sam Malek:
Reducing combinatorics in GUI testing of android applications. ICSE 2016: 559-570 - [c65]Reyhaneh Jabbarvand Behrouz, Alireza Sadeghi, Hamid Bagheri, Sam Malek:
Energy-aware test-suite minimization for Android apps. ISSTA 2016: 425-436 - [c64]Hamid Bagheri, Sam Malek:
Titanium: efficient analysis of evolving alloy specifications. SIGSOFT FSE 2016: 27-38 - 2015
- [j15]Hamid Bagheri, Alireza Sadeghi, Joshua Garcia, Sam Malek:
COVERT: Compositional Analysis of Android Inter-App Permission Leakage. IEEE Trans. Software Eng. 41(9): 866-886 (2015) - [c62]Hamid Bagheri, Eunsuk Kang, Sam Malek, Daniel Jackson:
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification. FM 2015: 73-89 - [c60]Alireza Sadeghi, Hamid Bagheri, Sam Malek:
Analysis of Android Inter-App Security Vulnerabilities Using COVERT. ICSE (2) 2015: 725-728 - [c59]Nariman Mirzaei, Hamid Bagheri, Riyadh Mahmood, Sam Malek:
SIG-Droid: Automated system input generation for Android applications. ISSRE 2015: 461-471 - [c58]Ehsan Kouroshfar, Mehdi Mirakhorli, Hamid Bagheri, Lu Xiao, Sam Malek, Yuanfang Cai:
A Study on the Role of Software Architecture in the Evolution and Quality of Software. MSR 2015: 246-257 - 2014
- [c55]Sam Malek, Hamid Bagheri, Alireza Sadeghi:
Automated detection and mitigation of inter-application security vulnerabilities in Android (invited talk). DeMobile@SIGSOFT FSE 2014: 17-18
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint