Author of the publication

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.

, , , , , , , and . USENIX Security Symposium, page 659-674. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distilling critical attack graph surface iteratively through minimum-cost SAT solving., , , , and . ACSAC, page 31-40. ACM, (2011)A Novel Top-k Query Scheme in Unstructured P2P Networks., , and . CIT (2), page 16-21. IEEE Computer Society, (2009)978-0-7695-3836-5.Mining Hot Clusters of Similar Anomalies for System Management., , , and . PRICAI, volume 6230 of Lecture Notes in Computer Science, page 359-371. Springer, (2010)SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS., , , , and . WPES@CCS, page 75-86. ACM, (2017)Fuzzing SMT solvers via two-dimensional input space exploration., , , , , and . ISSTA, page 322-335. ACM, (2021)Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic., , , , , , and . DSN, page 76-87. IEEE, (2020)Exploiting Insurance Telematics for Fun and Profit., , , , , , , and . CoRR, (2016)Exploratory and Confirmatory Factor Analysis of the Chinese Young Children's Video-Gaming Questionnaire., , , and . HCI (28), volume 12789 of Lecture Notes in Computer Science, page 266-278. Springer, (2021)The Factorial Structure and Underlying Contributors of Parents' Behavioral Involvement in Children's Video Game Use., , , , and . HCI (28), volume 12789 of Lecture Notes in Computer Science, page 196-209. Springer, (2021)From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App., , , and . CCS, page 1236-1247. ACM, (2015)