Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Static analysis of android apps: A systematic literature review., , , , , , , and . Inf. Softw. Technol., (2017)An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities., , , and . CoRR, (2022)On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps., and . CoRR, (2021)ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware., , , , , , and . CODASPY, page 25-36. ACM, (2019)Security Aspects of Cryptocurrency Wallets - A Systematic Literature Review., , and . ACM Comput. Surv., 56 (1): 4:1-4:31 (January 2024)Confuzzion: A Java Virtual Machine Fuzzer for Type Confusion Vulnerabilities., , , , and . QRS, page 586-597. IEEE, (2021)RAICC: Revealing Atypical Inter-Component Communication in Android Apps., , , and . ICSE, page 1398-1409. IEEE, (2021)Model Driven Mutation Applied to Adaptative Systems Testing., , , , , and . ICST Workshops, page 408-413. IEEE Computer Society, (2011)Musti: Dynamic Prevention of Invalid Object Initialization Attacks., , and . IEEE Trans. Inf. Forensics Secur., 14 (8): 2167-2178 (2019)On The (In)Effectiveness of Static Logic Bomb Detection for Android Apps., and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3822-3836 (2022)