Toward a framework for detecting privacy policy violations in android application code R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ... Proceedings of the 38th International conference on software engineering, 25-36, 2016 | 237 | 2016 |
Guileak: Tracing privacy policy claims on user input data for android applications X Wang, X Qin, MB Hosseini, R Slavin, TD Breaux, J Niu Proceedings of the 40th International Conference on Software Engineering, 37-47, 2018 | 101 | 2018 |
How does misconfiguration of analytic services compromise mobile privacy? X Zhang, X Wang, R Slavin, T Breaux, J Niu Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 28 | 2020 |
Condysta: Context-aware dynamic supplement to static taint analysis X Zhang, X Wang, R Slavin, J Niu 2021 IEEE Symposium on Security and Privacy (SP), 796-812, 2021 | 23 | 2021 |
Managing security requirements patterns using feature diagram hierarchies R Slavin, JM Lehker, J Niu, TD Breaux 2014 IEEE 22nd International Requirements Engineering Conference (RE), 193-202, 2014 | 22 | 2014 |
Privacy assurance for android augmented reality apps X Zhang, R Slavin, X Wang, J Niu 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing …, 2019 | 17 | 2019 |
Analyzing privacy policies through syntax-driven semantic analysis of information types MB Hosseini, TD Breaux, R Slavin, J Niu, X Wang Information and Software Technology 138, 106608, 2021 | 15 | 2021 |
PVDetector: a detector of privacy-policy violations for Android apps R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ... Proceedings of the international conference on mobile software engineering …, 2016 | 15 | 2016 |
Characterizations and boundaries of security requirements patterns R Slavin, H Shen, J Niu 2012 Second IEEE International Workshop on Requirements Patterns (RePa), 48-53, 2012 | 15 | 2012 |
Ambiguity and generality in natural language privacy policies MB Hosseini, J Heaps, R Slavin, J Niu, T Breaux 2021 IEEE 29th International Requirements Engineering Conference (RE), 70-81, 2021 | 8 | 2021 |
Disambiguating requirements through syntax-driven semantic analysis of information types M Bokaei Hosseini, R Slavin, T Breaux, X Wang, J Niu Requirements Engineering: Foundation for Software Quality: 26th …, 2020 | 7 | 2020 |
Rethinking security requirements in RE research H Hibshi, R Slavin, J Niu, T Breaux Department of Computer Science, University of Texas at San Antonio, 2014 | 7 | 2014 |
Security patterns repository R Slavin, J Niu URL http://sefm. cs. utsa. edu/repository, 2017 | 5 | 2017 |
GUILeak: Identifying privacy practices on GUI-based data X Wang, X Qin, MB Hosseini, R Slavin, TD Breaux, J Niu Academic Press, 2019 | 4 | 2019 |
Sequence Diagram Aided Privacy Policy Specification H Shen, R Krishnan, R Slavin, J Niu IEEE Transactions on Dependable and Secure Computing 13 (3), 381-393, 2016 | 3* | 2016 |
DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data X Zhang, J Heaps, R Slavin, J Niu, T Breaux, X Wang ACM Transactions on Software Engineering and Methodology 32 (4), 1-34, 2023 | 2 | 2023 |
Protocol-agnostic IoT Device Classification on Encrypted Traffic Using Link-Level Flows GA Morales, A Bienek-Parrish, P Jenkins, R Slavin Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 19-24, 2023 | 1 | 2023 |
A Vision-Based Low-Cost Power Wheelchair Assistive Driving System for Smartphones Z Wang, K Liu, J Wang, J Xu, J Chen, Y Jin, R Slavin 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th …, 2022 | 1 | 2022 |
Toward a code pattern based vulnerability measurement model J Heaps, R Slavin, X Wang Proceedings of the 23nd ACM on Symposium on Access Control Models and …, 2018 | 1 | 2018 |
Beyond Text-to-SQL for IoT Defense: A Comprehensive Framework for Querying and Classifying IoT Threats R Pavlich, N Ebadi, R Tarbell, B Linares, A Tan, R Humphreys, JK Das, ... arXiv preprint arXiv:2406.17574, 2024 | | 2024 |