Author of the publication

An empirical assessment of security risks of global Android banking apps.

, , , , , , , and . ICSE, page 1310-1322. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Battery-Aware Mobile Data Service., , , , , , , and . IEEE Trans. Mob. Comput., 16 (6): 1544-1558 (2017)Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique., , , , , , and . IEEE Trans. Inf. Forensics Secur., 12 (7): 1529-1544 (2017)Are our clone detectors good enough? An empirical study of code effects by obfuscation., , , , , and . Cybersecur., 6 (1): 14 (December 2023)SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization., , , , , , , , , and 2 other author(s). WWW, page 2733-2744. ACM / IW3C2, (2021)Contextual Weisfeiler-Lehman graph kernel for malware detection., , , , and . IJCNN, page 4701-4708. IEEE, (2016)MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform., , , , , , and . ICECCS, page 61-70. IEEE, (2019)Semantic modelling of Android malware for effective malware comprehension, detection, and classification., , , , , and . ISSTA, page 306-317. ACM, (2016)TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps., , , , , , , and . SciSec, volume 13580 of Lecture Notes in Computer Science, page 541-556. Springer, (2022)FMDiv: Functional Module Division on Binary Malware for Accurate Malicious Code Localization., , , , , , and . CSCWD, page 947-952. IEEE, (2023)DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models., , , , , and . AAAI, page 21850-21858. AAAI Press, (2024)