Author of the publication

A framework for empirical evaluation of malware detection resilience against behavior obfuscation.

, , , , , and . MALWARE, page 40-47. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Repackman: a tool for automatic repackaging of Android apps., , and . A-Mobile@ASE, page 25-28. ACM, (2018)Towards Accurate Labeling of Android Apps for Reliable Malware Detection.. CODASPY, page 269-280. ACM, (2021)Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection., , and . ACM Trans. Priv. Secur., 24 (4): 25:1-25:35 (2021)GoldRusher: A miner for rapid identification of hidden code.. SANER, page 517-521. IEEE Computer Society, (2018)Don't Pick the Cherry: An Evaluation Methodology for Android Malware Detection Methods., , and . CoRR, (2019)A framework for empirical evaluation of malware detection resilience against behavior obfuscation., , , , , and . MALWARE, page 40-47. IEEE Computer Society, (2015)Towards Accurate Labeling of Android Apps for Reliable Malware Detection.. CoRR, (2020)Metadata recovery from obfuscated programs using machine learning., and . SSPREW@ACSAC, page 1:1-1:11. ACM, (2016)Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models., , and . ESSoS, volume 10953 of Lecture Notes in Computer Science, page 108-115. Springer, (2018)Poking the bear: lessons learned from probing three Android malware datasets., and . A-Mobile@ASE, page 19-24. ACM, (2018)