Author of the publication

CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis.

, , , , , , and . IET Inf. Secur., 17 (4): 582-597 (July 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeepCatra: Learning flow- and graph-based behaviours for Android malware detection., , , , and . IET Inf. Secur., 17 (1): 118-130 (January 2023)ABSLearn: a GNN-based framework for aliasing and buffer-size information retrieval., , , , , and . Pattern Anal. Appl., 26 (3): 1171-1189 (August 2023)μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1461-1475 (March 2023)Program-mandering: Quantitative Privilege Separation., , , , , , and . CCS, page 1023-1040. ACM, (2019)From Debugging-Information Based Binary-Level Type Inference to CFG Generation., and . CODASPY, page 366-376. ACM, (2018)CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis., , , , , , and . IET Inf. Secur., 17 (4): 582-597 (July 2023)CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis., , , , , and . CoRR, (2021)BinPointer: towards precise, sound, and scalable binary-level pointer analysis., , , and . CC, page 169-180. ACM, (2022)MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies., , and . TrustCom, page 810-821. IEEE, (2021)μDep: Mutation-based Dependency Generation for Precise Taint Analysis on Android Native Code., , , , , and . CoRR, (2021)