Analysis of android applications' permissions R Johnson, Z Wang, C Gagnon, A Stavrou 2012 IEEE Sixth International Conference on Software Security and …, 2012 | 104 | 2012 |
{FIRMSCOPE}: Automatic uncovering of {Privilege-Escalation} vulnerabilities in {Pre-Installed} apps in android firmware M Elsabagh, R Johnson, A Stavrou, C Zuo, Q Zhao, Z Lin 29th USENIX security symposium (USENIX Security 20), 2379-2396, 2020 | 59 | 2020 |
Active authentication of users A Stavrou, R Murmuria, R Johnson, D Barbara US Patent 10,289,819, 2019 | 55 | 2019 |
Forced-path execution for android applications on x86 platforms R Johnson, A Stavrou 2013 IEEE Seventh International Conference on Software Security and …, 2013 | 28 | 2013 |
Exposing security risks for commercial mobile devices Z Wang, R Johnson, R Murmuria, A Stavrou Computer Network Security: 6th International Conference on Mathematical …, 2012 | 20 | 2012 |
Systems and methods for analyzing software R Johnson, N Kiourtis, A Stavrou US Patent 10,387,627, 2019 | 18 | 2019 |
Attestation & authentication for usb communications Z Wang, R Johnson, A Stavrou 2012 IEEE Sixth International Conference on Software Security and …, 2012 | 18 | 2012 |
Detecting and measuring misconfigured manifests in android apps Y Yang, M Elsabagh, C Zuo, R Johnson, A Stavrou, Z Lin Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 12 | 2022 |
Exposing software security and availability risks for commercial mobile devices R Johnson, Z Wang, A Stavrou, J Voas 2013 Proceedings Annual Reliability and Maintainability Symposium (RAMS), 1-7, 2013 | 12 | 2013 |
Targeted DoS on android: how to disable android in 10 seconds or less R Johnson, M Elsabagh, A Stavrou, V Sritapan 2015 10th International Conference on Malicious and Unwanted Software …, 2015 | 10 | 2015 |
Dazed droids: A longitudinal study of android inter-app vulnerabilities R Johnson, M Elsabagh, A Stavrou, J Offutt Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 9 | 2018 |
All your SMS & contacts belong to ADUPS & others R Johnson, A Stavrou, A Benameur Tech. Rep, 2017 | 8 | 2017 |
Why software dos is hard to fix: Denying access in embedded android platforms R Johnson, M Elsabagh, A Stavrou Applied Cryptography and Network Security: 14th International Conference …, 2016 | 7 | 2016 |
Enhancing collective c2 in the international environment: Leveraging the unclassified information sharing enterprise service P Chlebo, G Christman, R Johnson proceedings 16th International Command and Control Research and Technology …, 2011 | 7 | 2011 |
Pairing continuous authentication with proactive platform hardening R Johnson, R Murmuria, A Stavrou, V Sritapan 2017 IEEE International Conference on Pervasive Computing and Communications …, 2017 | 6 | 2017 |
Analysis of content copyright infringement in mobile application markets R Johnson, N Kiourtis, A Stavrou, V Sritapan 2015 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2015 | 6 | 2015 |
{DEFInit}: An Analysis of Exposed Android Init Routines Y Ji, M Elsabagh, R Johnson, A Stavrou 30th USENIX Security Symposium (USENIX Security 21), 3685-3702, 2021 | 4 | 2021 |
Resilient and scalable cloned app detection using forced execution and compression trees M Elsabagh, R Johnson, A Stavrou 2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018 | 4 | 2018 |
Resurrecting the READ_LOGS permission on Samsung devices R Johnson, A Stavrou Black Hat Asia 2015, 2015 | 4 | 2015 |
Improving traditional android mdms with non-traditional means R Johnson, A Stavrou, V Sritapan 2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-6, 2016 | 3 | 2016 |