Author of the publication

Automated reverse engineering of role-based access control policies of web applications.

, , , , and . J. Syst. Softw., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting common web application vulnerabilities from input validation and sanitization code patterns., and . ASE, page 310-313. ACM, (2012)Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications., and . Software Engineering Research and Practice, page 522-528. CSREA Press, (2010)Out of sight, out of mind? How vulnerable dependencies affect open-source projects., , , , , , and . Empir. Softw. Eng., 26 (4): 59 (2021)Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities., , , and . APSEC (1), page 363-370. IEEE Computer Society, (2013)978-1-4799-2143-0.SmartFuzz: An Automated Smart Fuzzing Approach for Testing SmartThings Apps., , , , , , and . APSEC, page 365-374. IEEE, (2020)Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for Android Apps., , , , , and . ASE, page 186:1-186:6. ACM, (2022)Fine-Grained In-Context Permission Classification for Android Apps Using Control-Flow Graph Embedding., , , , , and . ASE, page 1225-1237. IEEE, (2023)Defeating SQL Injection., and . Computer, 46 (3): 69-77 (2013)DronLomaly: Runtime Detection of Anomalous Drone Behaviors via Log Analysis and Deep Learning., , , , , and . APSEC, page 119-128. IEEE, (2022)Empirical Evaluation of Minority Oversampling Techniques in the Context of Android Malware Detection., , and . APSEC, page 349-359. IEEE, (2021)