Author of the publication

MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis.

, , and . COMPSAC, page 422-433. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lobotomy: An Architecture for JIT Spraying Mitigation., , , and . ARES, page 50-58. IEEE Computer Society, (2014)Reconciling Security and Functional Requirements in Multi-tenant Clouds., , , and . SCC@AsiaCCS, page 11-18. ACM, (2017)dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection., , , and . DIMVA, volume 6201 of Lecture Notes in Computer Science, page 41-60. Springer, (2010)SMoTherSpectre: Exploiting Speculative Execution through Port Contention., , , , , , and . CCS, page 785-800. ACM, (2019)Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations., , , and . USENIX Security Symposium, page 49-64. USENIX Association, (2013)MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis., , and . COMPSAC, page 422-433. IEEE Computer Society, (2015)FORECAST: skimming off the malware cream., , , and . ACSAC, page 11-20. ACM, (2011)The BORG: Nanoprobing Binaries for Buffer Overreads., , , and . CODASPY, page 87-97. ACM, (2015)A Static, Packer-Agnostic Filter to Detect Similar Malware Samples., , , , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 102-122. Springer, (2012)A View to a Kill: WebView Exploitation., , and . LEET, USENIX Association, (2013)