Reducing combinatorics in GUI testing of android applications N Mirzaei, J Garcia, H Bagheri, A Sadeghi, S Malek Proceedings of the 38th international conference on software engineering …, 2016 | 174 | 2016 |
Covert: Compositional analysis of android inter-app permission leakage H Bagheri, A Sadeghi, J Garcia, S Malek IEEE transactions on Software Engineering 41 (9), 866-886, 2015 | 171 | 2015 |
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software A Sadeghi, H Bagheri, J Garcia, S Malek IEEE Transactions on Software Engineering, 2016 | 166 | 2016 |
Ecodroid: An approach for energy-based ranking of android apps RJ Behrouz, A Sadeghi, J Garcia, S Malek, P Ammann 2015 IEEE/ACM 4th International Workshop on Green and Sustainable Software, 8-14, 2015 | 102 | 2015 |
Energy-aware test-suite minimization for android apps R Jabbarvand, A Sadeghi, H Bagheri, S Malek Proceedings of the 25th International Symposium on Software Testing and …, 2016 | 76 | 2016 |
Patdroid: permission-aware gui testing of android A Sadeghi, R Jabbarvand, S Malek Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 62 | 2017 |
Practical, formal synthesis and automatic enforcement of security policies for android H Bagheri, A Sadeghi, R Jabbarvand, S Malek 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 59 | 2016 |
Analysis of android inter-app security vulnerabilities using covert A Sadeghi, H Bagheri, S Malek 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015 | 55 | 2015 |
A temporal permission analysis and enforcement framework for android A Sadeghi, R Jabbarvand, N Ghorbani, H Bagheri, S Malek Proceedings of the 40th International Conference on Software Engineering …, 2018 | 47 | 2018 |
Software architectural principles in contemporary mobile software: from conception to practice H Bagheri, J Garcia, A Sadeghi, S Malek, N Medvidovic Journal of Systems and Software 119, 31-44, 2016 | 44 | 2016 |
Automated dynamic enforcement of synthesized security policies in android H Bagheri, A Sadeghi, R Jabbarvand, S Malek George Mason University, Tech. Rep. GMU-CS-TR-2015-5, 2015 | 23 | 2015 |
Mining the categorized software repositories to improve the analysis of security vulnerabilities A Sadeghi, N Esfahani, S Malek Fundamental Approaches to Software Engineering: 17th International …, 2014 | 22 | 2014 |
Architecture modeling and analysis of security in android systems B Schmerl, J Gennari, A Sadeghi, H Bagheri, S Malek, J Cámara, ... Software Architecture: 10th European Conference, ECSA 2016, Copenhagen …, 2016 | 19 | 2016 |
Ensuring the consistency of adaptation through inter-and intra-component dependency analysis A Sadeghi, N Esfahani, S Malek ACM Transactions on Software Engineering and Methodology (TOSEM) 26 (1), 1-27, 2017 | 10 | 2017 |
Emphasizing experiences in teaching software engineering courses SH Mirian-Hosseinabadi, Z Aghakasiri, A Sadeghi, P Delfani, ... 2010 2nd International Conference on Education Technology and Computer 2, V2 …, 2010 | 9 | 2010 |
Mbtdd: Model based test driven development A Sadeghi, SH Mirian-Hosseinabadi International Journal of Software Engineering and Knowledge Engineering 22 …, 2012 | 8 | 2012 |
Efficient permission-aware analysis of android apps A Sadeghi University of California, Irvine, 2018 | 6 | 2018 |
Mining Mobile App Markets for Prioritization of Security Assessment Effort A Sadeghi, N Esfahani, S Malek 2nd International Workshop on App Market Analytics (WAMA 2017), 2017 | 6 | 2017 |
Automated detection and mitigation of inter-application security vulnerabilities in android (invited talk) S Malek, H Bagheri, A Sadeghi Proceedings of the 2nd International Workshop on Software Development …, 2014 | 5 | 2014 |
Security and software engineering S Malek, H Bagheri, J Garcia, A Sadeghi Handbook of Software Engineering, 445-489, 2019 | 4 | 2019 |