From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy., , , , и . IEEE Trans. Software Eng., 44 (9): 834-854 (2018)CydiOS: A Model-Based Testing Framework for iOS Apps., , , , , , , и . ISSTA, стр. 1-13. ACM, (2023)On Tracking Information Flows through JNI in Android Applications., , , и . DSN, стр. 180-191. IEEE Computer Society, (2014)RAZOR: A Framework for Post-deployment Software Debloating., , , , , и . USENIX Security Symposium, стр. 1733-1750. USENIX Association, (2019)VulHunter: Toward Discovering Vulnerabilities in Android Applications., , , и . IEEE Micro, 35 (1): 44-53 (2015)Reducing Software's Attack surface with Code Debloating.. Georgia Institute of Technology, Atlanta, GA, USA, (2021)base-search.net (ftgeorgiatech:oai:smartech.gatech.edu:1853/64787).Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks., , , , , , и . USENIX Security Symposium, стр. 393-410. USENIX Association, (2018)Revisiting the Description-to-Behavior Fidelity in Android Applications., , , и . SANER, стр. 415-426. IEEE Computer Society, (2016)Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop., , , и . IEEE Symposium on Security and Privacy, стр. 1041-1057. IEEE Computer Society, (2017)RootGuard: Protecting Rooted Android Phones., , и . Computer, 47 (6): 32-40 (2014)