Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Aafer, Yousra
add a person with the name Aafer, Yousra
 

Other publications of authors with the same name

Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis., , and . USENIX Security Symposium, page 1153-1168. USENIX Association, (2016)Precise Android API Protection Mapping Derivation and Reasoning., , , , and . ACM Conference on Computer and Communications Security, page 1151-1164. ACM, (2018)ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation., , , , , and . CCS, page 1265-1282. ACM, (2019)Hey, You, Get Off of My Image: Detecting Data Residue in Android Images., , , and . ESORICS (1), volume 9878 of Lecture Notes in Computer Science, page 401-421. Springer, (2016)Trojaning Attack on Neural Networks., , , , , , and . NDSS, The Internet Society, (2018)DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android., , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 86-103. Springer, (2013)A Systematic Security Evaluation of Android's Multi-User Framework., , , , , and . CoRR, (2014)Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References., , , , , , , , and . ACM Conference on Computer and Communications Security, page 1248-1259. ACM, (2015)UI driven Android application reduction., , , , and . ASE, page 286-296. IEEE Computer Society, (2017)Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android., , , , and . NDSS, The Internet Society, (2016)