Yury Zhauniarovich

Orcid: 0000-0001-9116-0728

According to our database1, Yury Zhauniarovich authored at least 32 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Who's Got My Back? Measuring the Adoption of an Internet-wide BGP RTBH Service.
Proc. ACM Meas. Anal. Comput. Syst., 2024

Finding Harmony in the Noise: Blending Security Alerts for Attack Detection.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Charting the Path to SBOM Adoption: A Business Stakeholder-Centric Approach.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Intercept and Inject: DNS Response Manipulation in the Wild.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

Tough Decisions? Supporting System Classification According to the AI Act.
Proceedings of the Legal Knowledge and Information Systems, 2023

Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks.
Proceedings of the Computer Security - ESORICS 2023, 2023

2020
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing.
ACM Trans. Softw. Eng. Methodol., 2020

StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications.
J. Syst. Softw., 2020

Dissecting Android Cryptocurrency Miners.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Characterizing Bitcoin donations to open source software on GitHub.
CoRR, 2019

Sorting the Garbage: Filtering Out DRDoS Amplification Traffic in ISP Networks.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

Poster: SDN-based System to Filter Out DRDoS Amplification Traffic in ISP Networks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
A Survey on Malicious Domains Detection through DNS Data Analysis.
ACM Comput. Surv., 2018

Fine-grained Code Coverage Measurement in Automated Black-box Android Testing.
CoRR, 2018

An Effective Android Code Coverage Tool.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Please hold on: Unobtrusive user authentication using smartphone's built-in sensors.
Proceedings of the IEEE International Conference on Identity, 2017

Profiling DRDoS Attacks with Data Analytics Pipeline.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
Visualization of actionable knowledge to mitigate DRDoS attacks.
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016

Small Changes, Big Changes: An Updated View on the Android Permission System.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Evaluation of Resource-Based App Repackaging Detection in Android.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

2015
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Towards Black Box Testing of Android Apps.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Improving the security of the Android ecosystem.
PhD thesis, 2014

MOSES: Supporting and Enforcing Security Profiles on Smartphones.
IEEE Trans. Dependable Secur. Comput., 2014

Security in the Firefox OS and Tizen Mobile Platforms.
Computer, 2014

FSquaDRA: Fast Detection of Repackaged Applications.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Security of the Android Operating System.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
Enabling trusted stores for android.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android.
IEEE Trans. Inf. Forensics Secur., 2012

Demonstrating the effectiveness of MOSES for separation of execution modes.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
YAASE: Yet Another Android Security Extension.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011


  Loading...