BibTeX records: Yousra Aafer

download as .bib file

@article{DBLP:journals/corr/abs-2401-01269,
  author       = {Noble Saji Mathews and
                  Yelizaveta Brus and
                  Yousra Aafer and
                  Meiyappan Nagappan and
                  Shane McIntosh},
  title        = {LLbezpeky: Leveraging Large Language Models for Vulnerability Detection},
  journal      = {CoRR},
  volume       = {abs/2401.01269},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.01269},
  doi          = {10.48550/ARXIV.2401.01269},
  eprinttype    = {arXiv},
  eprint       = {2401.01269},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-01269.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YeZSAZ23,
  author       = {Yapeng Ye and
                  Zhuo Zhang and
                  Qingkai Shi and
                  Yousra Aafer and
                  Xiangyu Zhang},
  title        = {{D-ARM:} Disassembling {ARM} Binaries by Lightweight Superset Instruction
                  Interpretation and Graph Modeling},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2391--2408},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179307},
  doi          = {10.1109/SP46215.2023.10179307},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/YeZSAZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/VyasWAA23,
  author       = {Parjanya Vyas and
                  Asim Waheed and
                  Yousra Aafer and
                  N. Asokan},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Auditing Framework APIs via Inferred App-side Security Specifications},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {6061--6077},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/vyas},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/VyasWAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-10233,
  author       = {Kishanthan Thangarajah and
                  Noble Saji Mathews and
                  Michael Pu and
                  Meiyappan Nagappan and
                  Yousra Aafer and
                  Sridhar Chimalakonda},
  title        = {Statically Detecting Buffer Overflow in Cross-language Android Applications
                  Written in Java and {C/C++}},
  journal      = {CoRR},
  volume       = {abs/2305.10233},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.10233},
  doi          = {10.48550/ARXIV.2305.10233},
  eprinttype    = {arXiv},
  eprint       = {2305.10233},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-10233.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/El-Rewini0A22,
  author       = {Zeinab El{-}Rewini and
                  Zhuo Zhang and
                  Yousra Aafer},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Poirot: Probabilistically Recommending Protections for the Android
                  Framework},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {937--950},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560710},
  doi          = {10.1145/3548606.3560710},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/El-Rewini0A22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0046WNA0XP22,
  author       = {Fei Wang and
                  Jianliang Wu and
                  Yuhong Nan and
                  Yousra Aafer and
                  Xiangyu Zhang and
                  Dongyan Xu and
                  Mathias Payer},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {ProFactory: Improving IoT Security via Formalized Protocol Customization},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3879--3896},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/wang-fei},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0046WNA0XP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/El-RewiniA21,
  author       = {Zeinab El{-}Rewini and
                  Yousra Aafer},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Dissecting Residual APIs in Custom Android ROMs},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1598--1611},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485374},
  doi          = {10.1145/3460120.3485374},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/El-RewiniA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangYTALZ21,
  author       = {Zhuo Zhang and
                  Wei You and
                  Guanhong Tao and
                  Yousra Aafer and
                  Xuwei Liu and
                  Xiangyu Zhang},
  title        = {StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by
                  Incremental and Stochastic Rewriting},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {659--676},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00109},
  doi          = {10.1109/SP40001.2021.00109},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangYTALZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangYYTLKAZ21,
  author       = {Zhuo Zhang and
                  Yapeng Ye and
                  Wei You and
                  Guanhong Tao and
                  Wen{-}Chuan Lee and
                  Yonghwi Kwon and
                  Yousra Aafer and
                  Xiangyu Zhang},
  title        = {{OSPREY:} Recovery of Variable and Data Structure via Probabilistic
                  Analysis for Stripped Binary},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {813--832},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00051},
  doi          = {10.1109/SP40001.2021.00051},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangYYTLKAZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AaferYSS0Y21,
  author       = {Yousra Aafer and
                  Wei You and
                  Yi Sun and
                  Yu Shi and
                  Xiangyu Zhang and
                  Heng Yin},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2759--2776},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/aafer},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AaferYSS0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChoiKA0X20,
  author       = {Hongjun Choi and
                  Sayali Kate and
                  Yousra Aafer and
                  Xiangyu Zhang and
                  Dongyan Xu},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Cyber-Physical Inconsistency Vulnerability Identification for Safety
                  Checks in Robotic Vehicles},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {263--278},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417249},
  doi          = {10.1145/3372297.3417249},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChoiKA0X20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/KimZPWYA020,
  author       = {I Luk Kim and
                  Yunhui Zheng and
                  Hogun Park and
                  Weihang Wang and
                  Wei You and
                  Yousra Aafer and
                  Xiangyu Zhang},
  editor       = {Gregg Rothermel and
                  Doo{-}Hwan Bae},
  title        = {Finding client-side business flow tampering vulnerabilities},
  booktitle    = {{ICSE} '20: 42nd International Conference on Software Engineering,
                  Seoul, South Korea, 27 June - 19 July, 2020},
  pages        = {222--233},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377811.3380355},
  doi          = {10.1145/3377811.3380355},
  timestamp    = {Tue, 28 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/KimZPWYA020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChoiKA0X20,
  author       = {Hongjun Choi and
                  Sayali Kate and
                  Yousra Aafer and
                  Xiangyu Zhang and
                  Dongyan Xu},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {349--364},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/choi},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChoiKA0X20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/You0KAPSHZ20,
  author       = {Wei You and
                  Zhuo Zhang and
                  Yonghwi Kwon and
                  Yousra Aafer and
                  Fei Peng and
                  Yu Shi and
                  Carson Harmon and
                  Xiangyu Zhang},
  title        = {{PMP:} Cost-effective Forced Execution with Probabilistic Memory Pre-planning},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1121--1138},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00035},
  doi          = {10.1109/SP40000.2020.00035},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/You0KAPSHZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuLTMAZ19,
  author       = {Yingqi Liu and
                  Wen{-}Chuan Lee and
                  Guanhong Tao and
                  Shiqing Ma and
                  Yousra Aafer and
                  Xiangyu Zhang},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {{ABS:} Scanning Neural Networks for Back-doors by Artificial Brain
                  Stimulation},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1265--1282},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363216},
  doi          = {10.1145/3319535.3363216},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuLTMAZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChoiLAFTZXX18,
  author       = {Hongjun Choi and
                  Wen{-}Chuan Lee and
                  Yousra Aafer and
                  Fan Fei and
                  Zhan Tu and
                  Xiangyu Zhang and
                  Dongyan Xu and
                  Xinyan Deng},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Detecting Attacks Against Robotic Vehicles: {A} Control Invariant
                  Approach},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {801--816},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243752},
  doi          = {10.1145/3243734.3243752},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChoiLAFTZXX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AaferTHZL18,
  author       = {Yousra Aafer and
                  Guanhong Tao and
                  Jianjun Huang and
                  Xiangyu Zhang and
                  Ninghui Li},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Precise Android {API} Protection Mapping Derivation and Reasoning},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1151--1164},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243842},
  doi          = {10.1145/3243734.3243842},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AaferTHZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/TangZPAM0Z18,
  author       = {Zhenhao Tang and
                  Juan Zhai and
                  Minxue Pan and
                  Yousra Aafer and
                  Shiqing Ma and
                  Xiangyu Zhang and
                  Jianhua Zhao},
  editor       = {Marianne Huchard and
                  Christian K{\"{a}}stner and
                  Gordon Fraser},
  title        = {Dual-force: understanding WebView malware via cross-language forced
                  execution},
  booktitle    = {Proceedings of the 33rd {ACM/IEEE} International Conference on Automated
                  Software Engineering, {ASE} 2018, Montpellier, France, September 3-7,
                  2018},
  pages        = {714--725},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3238147.3238221},
  doi          = {10.1145/3238147.3238221},
  timestamp    = {Thu, 23 Jun 2022 19:54:17 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/TangZPAM0Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AaferHS0LT18,
  author       = {Yousra Aafer and
                  Jianjun Huang and
                  Yi Sun and
                  Xiangyu Zhang and
                  Ninghui Li and
                  Chen Tian},
  title        = {AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency
                  Detection},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_08-1\_Aafer\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/AaferHS0LT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiuMALZW018,
  author       = {Yingqi Liu and
                  Shiqing Ma and
                  Yousra Aafer and
                  Wen{-}Chuan Lee and
                  Juan Zhai and
                  Weihang Wang and
                  Xiangyu Zhang},
  title        = {Trojaning Attack on Neural Networks},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03A-5\_Liu\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LiuMALZW018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KimWKZAMZ18,
  author       = {I Luk Kim and
                  Weihang Wang and
                  Yonghwi Kwon and
                  Yunhui Zheng and
                  Yousra Aafer and
                  Weijie Meng and
                  Xiangyu Zhang},
  editor       = {Pierre{-}Antoine Champin and
                  Fabien Gandon and
                  Mounia Lalmas and
                  Panagiotis G. Ipeirotis},
  title        = {AdBudgetKiller: Online Advertising Budget Draining Attack},
  booktitle    = {Proceedings of the 2018 World Wide Web Conference on World Wide Web,
                  {WWW} 2018, Lyon, France, April 23-27, 2018},
  pages        = {297--307},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178876.3186096},
  doi          = {10.1145/3178876.3186096},
  timestamp    = {Tue, 28 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/KimWKZAMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenLEAZ17,
  author       = {Haining Chen and
                  Ninghui Li and
                  William Enck and
                  Yousra Aafer and
                  Xiangyu Zhang},
  title        = {Analysis of SEAndroid Policies: Combining {MAC} and {DAC} in Android},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {553--565},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134638},
  doi          = {10.1145/3134600.3134638},
  timestamp    = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenLEAZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/WangKZAKLLMZE17,
  author       = {Weihang Wang and
                  Yonghwi Kwon and
                  Yunhui Zheng and
                  Yousra Aafer and
                  I Luk Kim and
                  Wen{-}Chuan Lee and
                  Yingqi Liu and
                  Weijie Meng and
                  Xiangyu Zhang and
                  Patrick Eugster},
  editor       = {Grigore Rosu and
                  Massimiliano Di Penta and
                  Tien N. Nguyen},
  title        = {{PAD:} programming third-party web advertisement censorship},
  booktitle    = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated
                  Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November
                  03, 2017},
  pages        = {240--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ASE.2017.8115637},
  doi          = {10.1109/ASE.2017.8115637},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/WangKZAKLLMZE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/HuangAPZT17,
  author       = {Jianjun Huang and
                  Yousra Aafer and
                  David Mitchel Perry and
                  Xiangyu Zhang and
                  Chen Tian},
  editor       = {Grigore Rosu and
                  Massimiliano Di Penta and
                  Tien N. Nguyen},
  title        = {{UI} driven Android application reduction},
  booktitle    = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated
                  Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November
                  03, 2017},
  pages        = {286--296},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ASE.2017.8115642},
  doi          = {10.1109/ASE.2017.8115642},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/HuangAPZT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/MaAXLZLZ17,
  author       = {Shiqing Ma and
                  Yousra Aafer and
                  Zhaogui Xu and
                  Wen{-}Chuan Lee and
                  Juan Zhai and
                  Yingqi Liu and
                  Xiangyu Zhang},
  editor       = {Eric Bodden and
                  Wilhelm Sch{\"{a}}fer and
                  Arie van Deursen and
                  Andrea Zisman},
  title        = {{LAMP:} data provenance for graph based machine learning algorithms
                  through derivative computation},
  booktitle    = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
  pages        = {786--797},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3106237.3106291},
  doi          = {10.1145/3106237.3106291},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/MaAXLZLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangAYD16,
  author       = {Xiao Zhang and
                  Yousra Aafer and
                  Kailiang Ying and
                  Wenliang Du},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Hey, You, Get Off of My Image: Detecting Data Residue in Android Images},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {401--421},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_20},
  doi          = {10.1007/978-3-319-45744-4\_20},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhangAYD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhangYAQD16,
  author       = {Xiao Zhang and
                  Kailiang Ying and
                  Yousra Aafer and
                  Zhenshen Qiu and
                  Wenliang Du},
  title        = {Life after App Uninstallation: Are the Data Still Alive? Data Residue
                  Attacks on Android},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/life-after-app-installation-data-still-alive-data-residue-attacks-android.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhangYAQD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AaferZD16,
  author       = {Yousra Aafer and
                  Xiao Zhang and
                  Wenliang Du},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Harvesting Inconsistent Security Configurations in Custom Android
                  ROMs via Differential Analysis},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1153--1168},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aafer},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AaferZD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AaferZZZCWZDG15,
  author       = {Yousra Aafer and
                  Nan Zhang and
                  Zhongwen Zhang and
                  Xiao Zhang and
                  Kai Chen and
                  XiaoFeng Wang and
                  Xiao{-}yong Zhou and
                  Wenliang Du and
                  Michael Grace},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Hare Hunting in the Wild Android: {A} Study on the Threat of Hanging
                  Attribute References},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1248--1259},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813648},
  doi          = {10.1145/2810103.2813648},
  timestamp    = {Sun, 22 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AaferZZZCWZDG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RatazziAAHWD14,
  author       = {E. Paul Ratazzi and
                  Yousra Aafer and
                  Amit Ahlawat and
                  Hao Hao and
                  Yifei Wang and
                  Wenliang Du},
  title        = {A Systematic Security Evaluation of Android's Multi-User Framework},
  journal      = {CoRR},
  volume       = {abs/1410.7752},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.7752},
  eprinttype    = {arXiv},
  eprint       = {1410.7752},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/RatazziAAHWD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AaferDY13,
  author       = {Yousra Aafer and
                  Wenliang Du and
                  Heng Yin},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {DroidAPIMiner: Mining API-Level Features for Robust Malware Detection
                  in Android},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {86--103},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_6},
  doi          = {10.1007/978-3-319-04283-1\_6},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/AaferDY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics