A survey on malicious domains detection through DNS data analysis Y Zhauniarovich, I Khalil, T Yu, M Dacier ACM Computing Surveys (CSUR) 51 (4), 1-36, 2018 | 206 | 2018 |
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci 5th ACM Conference on Data and Application Security and Privacy (CODASPY'15 …, 2015 | 127 | 2015 |
CRêPE: A System for Enforcing Fine-grained Context-related Policies on Android M Conti, B Crispo, E Fernandes, Y Zhauniarovich IEEE Transactions on Information Forensics and Security 7 (5), 1426-1438, 2012 | 109 | 2012 |
YAASE: Yet Another Android Security Extension G Russello, B Crispo, E Fernandes, Y Zhauniarovich Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International …, 2011 | 87 | 2011 |
FSquaDRA: Fast Detection of Repackaged Applications Y Zhauniarovich, O Gadyatskaya, B Crispo, F La Spina, E Moser IFIP Annual Conference on Data and Applications Security and Privacy, 130-145, 2014 | 85 | 2014 |
MOSES: Supporting and Enforcing Security Profiles on Smartphones Y Zhauniarovich, G Russello, M Conti, B Crispo, E Fernandes IEEE Transactions on Dependable and Secure Computing 11 (3), 211 - 223, 2014 | 77 | 2014 |
Please Hold On: Unobtrusive User Authentication using Smartphone’s built-in Sensors A Buriro, B Crispo, Y Zhauniarovich IEEE International Conference on Identity, Security and Behavior Analysis …, 2017 | 62 | 2017 |
Small Changes, Big Changes: An Updated View on the Android Permission System Y Zhauniarovich, O Gadyatskaya International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016 | 49 | 2016 |
Towards black box testing of android apps Y Zhauniarovich, A Philippov, O Gadyatskaya, B Crispo, F Massacci 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 48 | 2015 |
Fine-grained code coverage measurement in automated black-box Android testing A Pilgun, O Gadyatskaya, Y Zhauniarovich, S Dashevskyi, A Kushniarou, ... ACM Transactions on Software Engineering and Methodology (TOSEM) 29 (4), 1-35, 2020 | 34 | 2020 |
Visualization of actionable knowledge to mitigate DRDoS attacks M Aupetit, Y Zhauniarovich, G Vasiliadis, M Dacier, Y Boshmaf 2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2016 | 33 | 2016 |
Evaluation of Resource-Based App Repackaging Detection in Android O Gadyatskaya, AL Lezza, Y Zhauniarovich Nordic Conference on Secure IT Systems, 135-151, 2016 | 27 | 2016 |
Security in the Firefox OS and Tizen Mobile Platforms O Gadyatskaya, F Massacci, Y Zhauniarovich Computer 47 (6), 57-63, 2014 | 26 | 2014 |
StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications M Ahmad, V Costamagna, B Crispo, F Bergadano, Y Zhauniarovich Journal of Systems and Software 159, 110386, 2020 | 23 | 2020 |
Dissecting Android Cryptocurrency Miners S Dashevskyi, Y Zhauniarovich, O Gadyatskaya, A Pilgun, H Ouhssain Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 20 | 2020 |
DEMO: Enabling Trusted Stores for Android Y Zhauniarovich, O Gadyatskaya, B Crispo Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 19 | 2013 |
An Effective Android Code Coverage Tool A Pilgun, O Gadyatskaya, S Dashevskyi, Y Zhauniarovich, A Kushniarou Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 17 | 2018 |
Sorting the Garbage: Filtering Out DRDoS Amplification Traffic in ISP Networks Y Zhauniarovich, P Dodia 2019 IEEE Conference on Network Softwarization (NetSoft), 142-150, 2019 | 15 | 2019 |
Profiling DRDoS Attacks with Data Analytics Pipeline L Berti-Equille, Y Zhauniarovich Proceedings of the 26th ACM International on Conference on Information and …, 2017 | 13 | 2017 |
Demonstrating the Effectiveness of MOSES for Separation of Execution Modes G Russello, M Conti, B Crispo, E Fernandes, Y Zhauniarovich Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 12 | 2012 |