2023 |
|
Free Willy: Prune System Calls to Enhance Software Security
ACM/SIGAPP Symposium on Applied Computing (SAC)
|
2021 |
|
Hybroid: Toward Android Malware Detectionand Categorization with Program Code and Network Traffic
International Security Conference (ISC 2021)
|
|
|
Falcon: Malware Detection and Categorization with Network Traffic Images
ICANN - The International Conference on Artificial Neural Networks
|
|
|
HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs
ICANN - The International Conference on Artificial Neural Networks
|
2020 |
|
Detecting and Categorizing Android Malware with Graph Neural Networks
The 36th ACM/SIGAPP Symposium On Applied Computing
|
2019 |
|
MANIS: Evading Malware Detection System on Graph Structure
The 35th ACM/SIGAPP Symposium On Applied Computing
|
2018 |
|
Learning on a Budget for User Authentication on Mobile Devices
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018)
|
|
|
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
Annual Computer Security Applications Conference (ACSAC)
|
|
|
Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection
IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
|
|
|
Smashing the Stack Protector for Fun and Profit
IFIP Information Security Conference & Privacy Conference (IFIP SEC)
|
2017 |
|
Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks
15th Annual Conference on Privacy, Security and Trust (PST)
|
|
|
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
|
|
|
Empowering Convolutional Networks for Malware Classification and Analysis
30th International Joint Conference on Neural Networks (IJCNN)
|
|
|
Combating Control Flow Linearization
32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
|
|
|
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
|
2016 |
|
Deep Learning for Classification of Malware System Call Sequences
29th Australasian Joint Conference on Artificial Intelligence (AI)
|
|
|
Leveraging Internet Services to Evade Censorship
19th International Conference on Information Security (ISC)
|
|
|
SKALD: A Scalable Architecture for Feature Extraction, Multi-User Analysis, and Real-Time Information Sharing
19th International Conference on Information Security (ISC)
|
|
|
Adaptive Semantics-Aware Malware Classification
13th Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)
|
|
|
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
11th ACM Asia Conference on Computer and Communications Security (ASIACCS)
|
|
|
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
6th ACM Conference on Data and Application Security and Privacy (CODASPY)
|
2015 |
|
Revealing the Relationship Network Behind Link Spam
13th Annual Conference on Privacy, Security and Trust (PST)
|
2014 |
|
The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security
48th IEEE International Carnahan Conference on Security Technology (ICCST)
|
|
|
Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware
12th Annual Conference on Privacy, Security and Trust (PST)
|
2013 |
|
k-subscription: Privacy-preserving Microblogging Browsing through Obfuscation
29th ACM Annual Computer Security Applications Conference (ACSAC)
|
2012 |
|
B@bel: Leveraging Email Delivery for Spam Mitigation
21st USENIX Security Symposium
|
2011 |
|
Understanding Fraudulent Activities in Online Ad Exchanges
11th ACM SIGCOMM Internet Measurement Conference (IMC)
|