Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware.
CoRR, January, 2025
MARS: The first line of defense for IoT incident response.
Forensic Sci. Int. Digit. Investig., 2024
Enhancing privacy policy comprehension through Privacify: A user-centric approach using advanced language models.
Comput. Secur., 2024
User Privacy in the Digital Playground: An In-Depth Investigation of Facebook Instant Games.
Proceedings of the IEEE Secure Development Conference, 2024
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices.
Comput. Secur., September, 2023
Security of IT/OT Convergence: Design and Implementation Challenges.
CoRR, 2023
Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals.
Proceedings of the IEEE Secure Development Conference, 2023
I've Got You, Under My Skin: Biohacking Augmentation Implant Forensics.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Memory analysis of .NET and .Net Core applications.
Digit. Investig., 2022
A Reverse Engineering Education Needs Analysis Survey.
CoRR, 2022
Intent-aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
User Awareness and Privacy Regarding Instant Games on Facebook.
Proceedings of the HCI International 2022 - Late Breaking Papers. Interaction in New Media, Learning and Games, 2022
Transforming Memory Image to Sound Wave Signals for an Effective IoT Fingerprinting.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
I Don't Know Why You Need My Data: A Case Study of Popular Social Media Privacy Policies.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Modern macOS userland runtime analysis.
Digit. Investig., 2021
Seance: Divination of tool-breaking changes in forensically important binaries.
Digit. Investig., 2021
IIoT-ARAS: IIoT/ICS Automated Risk Assessment System for Prediction and Prevention.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Object Allocation Pattern as an Indicator for Maliciousness - An Exploratory Analysis.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics.
Comput. Secur., 2020
AmpleDroid Recovering Large Object Files from Android Application Memory.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
HookTracer: A System for Automated and Accessible API Hooks Analysis.
Digit. Investig., 2019
DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Memory forensics and the Windows Subsystem for Linux.
Digit. Investig., 2018
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming.
Comput. Secur., 2018
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
AspectDroid: Android App Analysis System.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Robust Fingerprinting for Relocatable Code.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
OpSeq: Android Malware Fingerprinting.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015