Author of the publication

RoppDroid: Robust permission re-delegation prevention in Android inter-component communication.

, , , , and . Comput. Secur., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experience: Model-Based, Feedback-Driven, Greybox Web Fuzzing with BackREST., , , , , and . ECOOP, volume 222 of LIPIcs, page 29:1-29:30. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Nodest: feedback-driven static analysis of Node.js applications., , and . ESEC/SIGSOFT FSE, page 455-465. ACM, (2019)SAFE-PDF: Robust Detection of JavaScript PDF Malware Using Abstract Interpretation., , , and . CoRR, (2018)Unacceptable Behavior: Robust PDF Malware Detection Using Abstract Interpretation., , , and . PLAS@CCS, page 19-30. ACM, (2019)Macaron: A Logic-based Framework for Software Supply Chain Security Assurance., , , , , and . SCORED@CCS, page 29-37. ACM, (2023)Trade-offs in managing risk and technical debt in industrial research labs: an experience report., , , , , , and . TechDebt@ICSE, page 98-102. ACM, (2020)Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications., , , and . CoRR, (2020)Automatic Root Cause Quantification for Missing Edges in JavaScript Call Graphs (Artifact)., , , and . Dagstuhl Artifacts Ser., 8 (2): 07:1-07:5 (2022)Automatic Root Cause Quantification for Missing Edges in JavaScript Call Graphs (Extended Version)., , , and . CoRR, (2022)The role of program analysis in security vulnerability detection: Then and now., , , , and . Comput. Secur., (December 2023)