Juxtapp: A scalable system for detecting code reuse among android applications S Hanna, L Huang, E Wu, S Li, C Chen, D Song Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013 | 319 | 2013 |
Contextual policy enforcement in android applications with permission event graphs. KZ Chen, NM Johnson, V D'Silva, S Dai, K MacNamara, TR Magrino, ... Ndss 234, 2013 | 213 | 2013 |
{MACE}:{Model-inference-Assisted} concolic exploration for protocol and vulnerability discovery CY Cho, D Babić, P Poosankam, KZ Chen, EXJ Wu, D Song 20th USENIX Security Symposium (USENIX Security 11), 2011 | 166 | 2011 |
Collaborative verification of information flow for a high-assurance app store MD Ernst, R Just, S Millstein, W Dietl, S Pernsteiner, F Roesner, ... Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 129 | 2014 |
Juxtapp and dstruct: Detection of similarity among android applications S Li, S Hanna, L Huang, E Wu, C Chen, D Song EECS Department, University of California, 2012 | 25 | 2012 |
FreeMarket: Shopping for free in Android applications. D Reynaud, DX Song, TR Magrino, EXJ Wu, ECR Shin NDSS, 2012 | 21 | 2012 |
Understanding open proxies in the wild W Scott, R Bhoraskar, A Krishnamurthy Chaos Communication Camp, 2015 | 11 | 2015 |
Contextual policy enforcement in android programs with permission event graphs K Chen, N Johnson, V D'Silva, S Dai, T Magrino, K Macnamarra, E Wu, ... | 6 | 2013 |