Personensuche
X
?
E-Business and Telecommunications; Communications in Computer and Information Science ,
1
Explaining the Use of Cryptographic API in Android Malware:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
2
Reach Me if You Can: On Native Vulnerability Reachability i..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
3
Extended Abstract: Effective Call Graph Fingerprinting for ..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
4
PowerDrive: Accurate De-obfuscation and Analysis of PowerSh..:
, In:
?
Proceedings of the Symposium on Applied Computing ,
5
R-PackDroid : API package-based characterization and det..:
, In:
?
Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy ,
6
Evaluating Analysis Tools for Android Apps : Status Quo ..:
, In:
?
Proceedings of the 31st Annual Computer Security Applications Conference ,
7
On the Robustness of Mobile Device Fingerprinting : Can ..:
, In:
?
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop ,
8
Lux0R : Detection of Malicious PDF-embedded JavaScript c..:
, In:
?
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security ,
9