Yousra Aafer
Yousra Aafer
Postdoctoral Researcher, Purdue University
Email verificata su purdue.edu
TitoloCitata daAnno
Droidapiminer: Mining api-level features for robust malware detection in android
Y Aafer, W Du, H Yin
International conference on security and privacy in communication systems …, 2013
5112013
Trojaning attack on neural networks
Y Liu, S Ma, Y Aafer, WC Lee, J Zhai, W Wang, X Zhang
1182017
Hare hunting in the wild android: A study on the threat of hanging attribute references
Y Aafer, N Zhang, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
442015
Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android.
X Zhang, K Ying, Y Aafer, Z Qiu, W Du
NDSS, 2016
322016
Harvesting inconsistent security configurations in custom android roms via differential analysis
Y Aafer, X Zhang, W Du
25th {USENIX} Security Symposium ({USENIX} Security 16), 1153-1168, 2016
192016
A systematic security evaluation of android's multi-user framework
P Ratazzi, Y Aafer, A Ahlawat, H Hao, Y Wang, W Du
arXiv preprint arXiv:1410.7752, 2014
192014
Detecting attacks against robotic vehicles: A control invariant approach
H Choi, WC Lee, Y Aafer, F Fei, Z Tu, X Zhang, D Xu, X Deng
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
182018
Analysis of seandroid policies: combining MAC and DAC in android
H Chen, N Li, W Enck, Y Aafer, X Zhang
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
112017
Hey, you, get off of my image: Detecting data residue in android images
X Zhang, Y Aafer, K Ying, W Du
European Symposium on Research in Computer Security, 401-421, 2016
92016
LAMP: data provenance for graph based machine learning algorithms through derivative computation
S Ma, Y Aafer, Z Xu, WC Lee, J Zhai, Y Liu, X Zhang
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
82017
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection.
Y Aafer, J Huang, Y Sun, X Zhang, N Li, C Tian
NDSS, 2018
72018
Precise Android API protection mapping derivation and reasoning
Y Aafer, G Tao, J Huang, X Zhang, N Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
42018
UI driven Android application reduction
J Huang, Y Aafer, D Perry, X Zhang, C Tian
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
42017
Dual-force: understanding WebView malware via cross-language forced execution
Z Tang, J Zhai, M Pan, Y Aafer, S Ma, X Zhang, J Zhao
Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018
22018
Adbudgetkiller: Online advertising budget draining attack
IL Kim, W Wang, Y Kwon, Y Zheng, Y Aafer, W Meng, X Zhang
Proceedings of the 2018 World Wide Web Conference, 297-307, 2018
22018
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning
W You, Z Zhang, Y Kwon, Y Aafer, F Peng, Y Shi, C Harmon, X Zhang
2020 IEEE Symposium on Security and Privacy, SP 2020, Proceedings, 18-20, 2020
12020
ABS: Scanning neural networks for back-doors by artificial brain stimulation
Y Liu, WC Lee, G Tao, S Ma, Y Aafer, X Zhang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
12019
PAD: Programming third-party web advertisement censorship
W Wang, Y Kwon, Y Zheng, Y Aafer, IL Kim, WC Lee, Y Liu, W Meng, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
2017
Systematic discovery of Android customization hazards
Y Aafer
2016
Co-Chair
WT Sung, SX Wang, L Gao, H Hsu
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20