Droidlegacy: Automated familial classification of android malware L Deshotels, V Notani, A Lakhotia Proceedings of ACM SIGPLAN on program protection and reverse engineering …, 2014 | 186 | 2014 |
Inaudible Sound as a Covert Channel in Mobile Devices L Deshotels 8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014 | 168 | 2014 |
A study of security isolation techniques R Shu, P Wang, SA Gorski III, B Andow, A Nadkarni, L Deshotels, J Gionta, ... ACM Computing Surveys (CSUR) 49 (3), 1-37, 2016 | 53 | 2016 |
Sandscout: Automatic detection of flaws in ios sandbox profiles L Deshotels, R Deaconescu, M Chiroiu, L Davi, W Enck, AR Sadeghi Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 22 | 2016 |
Program Structure-Based Feature Selection for Android Malware Analysis A Walenstein, L Deshotels, A Lakhotia 4th International Conference on Security and Privacy in Mobile Information …, 2012 | 17 | 2012 |
Kobold: Evaluating decentralized access control for remote NSXPC methods on iOS L Deshotels, C Carabas, J Beichler, R Deaconescu, W Enck 2020 IEEE Symposium on Security and Privacy (SP), 1056-1070, 2020 | 14 | 2020 |
iOracle: Automated evaluation of access control policies in iOS L Deshotels, R Deaconescu, C Carabas, I Manda, W Enck, M Chiroiu, ... Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 10 | 2018 |
Sandblaster: Reversing the apple sandbox R Deaconescu, L Deshotels, M Bucicoiu, W Enck, L Davi, AR Sadeghi arXiv preprint arXiv:1608.04303, 2016 | 6 | 2016 |
DroidLegacy L Deshotels, V Notani, A Lakhotia Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering …, 2014 | 5 | 2014 |
Automated Evaluation of Access Control in the iPhone Operating System LA Deshotels North Carolina State University, 2018 | | 2018 |
Application and Evaluation of Artificial Intelligence Algorithms for StarCraft L Deshotels Algorithmic and Architectural Gaming Design: Implementation and Development …, 2012 | | 2012 |
iOS Security Framework: Understanding the Security of Mobile Phone Platforms W Enck, R Deaconescu, M Chiroiu, L Deshotels | | |