Author of the publication

Cheetah: just-in-time taint analysis for Android apps.

, , , , , and . ICSE (Companion Volume), page 39-42. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collective intelligence for the common good: cultivating the seeds for an intentional collaborative enterprise., , , and . AI Soc., 33 (1): 1-13 (2018)How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool., , , , and . IEEE Trans. Software Eng., 45 (9): 877-897 (2019)Can Language Models Employ the Socratic Method? Experiments with Code Debugging., , , and . CoRR, (2023)An Exploratory Analysis on Cybersecurity Ecosystem Utilizing the NICE Framework., , , and . NCS, page 1-7. IEEE, (2018)Paradise unplugged: identifying barriers for female participation on stack overflow., , , and . SIGSOFT FSE, page 846-857. ACM, (2016)Towards Ethical Data-Driven Software: Filling the Gaps in Ethics Research & Practice., and . SEthics@ICSE, page 18-25. IEEE, (2021)A Business-Rules Approach for Departmental Advising., , , , , , and . FLAIRS, page 305-309. AAAI Press, (2002)Identifying successful strategies for resolving static analysis notifications.. ICSE (Companion Volume), page 662-664. ACM, (2016)A Case Study of Software Security Red Teams at Microsoft., , and . VL/HCC, page 1-10. IEEE, (2020)Flower: Navigating program flow in the IDE., , and . VL/HCC, page 19-23. IEEE Computer Society, (2017)