Android permissions demystified AP Felt, E Chin, S Hanna, D Song, D Wagner Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 2150 | 2011 |
A survey of mobile malware in the wild AP Felt, M Finifter, E Chin, S Hanna, D Wagner Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 1163 | 2011 |
Permission re-delegation: Attacks and defenses. AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin USENIX security symposium 30, 88, 2011 | 771 | 2011 |
A symbolic execution framework for javascript P Saxena, D Akhawe, S Hanna, F Mao, S McCamant, D Song 2010 IEEE Symposium on Security and Privacy, 513-528, 2010 | 632 | 2010 |
Juxtapp: A scalable system for detecting code reuse among android applications S Hanna, L Huang, E Wu, S Li, C Chen, D Song Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013 | 323 | 2013 |
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications. P Saxena, S Hanna, P Poosankam, D Song NDss, 2010 | 206 | 2010 |
Emulating emulation-resistant malware MG Kang, H Yin, S Hanna, S McCamant, D Song Proceedings of the 1st ACM workshop on Virtual machine security, 11-22, 2009 | 172 | 2009 |
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices. S Hanna, R Rolles, A Molina-Markham, P Poosankam, J Blocki, K Fu, ... HealthSec, 2011 | 100 | 2011 |
The emperor’s new APIs: On the (in) secure usage of new client-side primitives S Hanna, R Shin, D Akhawe, A Boehm, P Saxena, D Song Proceedings of the Web 2, 2010 | 71 | 2010 |
Hookscout: Proactive binary-centric hook detection H Yin, P Poosankam, S Hanna, D Song International Conference on Detection of Intrusions and Malware, and …, 2010 | 53 | 2010 |
Juxtapp and dstruct: Detection of similarity among android applications S Li, S Hanna, L Huang, E Wu, C Chen, D Song EECS Department, University of California, 2012 | 25 | 2012 |
The Network Endpoint Assessment (NEA) Asokan Attack Analysis J Salowey, S Hanna | 6 | 2012 |
Analysis of August 2003 Follow-up Survey on Obstacles to PKI Deployment and Usage S Hanna OASIS PKI Technical Committee, 1October, 2003 | 4 | 2003 |
Requirements for a tunnel-based extensible authentication protocol (EAP) method K Hoeper, S Hanna, H Zhou, J Salowey | 3 | 2012 |
TNC: Open standards for network access control S Hana Network World Conference & Expo, 2007 | 3 | 2007 |
The Java Reliable Multicast Service™: A Reliable Multicast Library S Hanna, M Kadansky, P Rosenzweig Sun Microsystems Laboratories The First Ten Years, 2001 | 3 | 2001 |
PB-TNC: A Posture Broker (PB) Protocol Compatible with Trusted Network Connect (TNC) R Sahita, S Hanna, R Hurst, K Narayan | 2 | 2010 |
NEA: Public health for the network S Hanna, S Thomson IEEE internet computing 14 (3), 77-80, 2010 | 1 | 2010 |
RFC 7170: Tunnel Extensible Authentication Protocol (TEAP) Version 1 H Zhou, N Cam-Winget, J Salowey, S Hanna RFC Editor, 2014 | | 2014 |
Coenrolment In A Randomized Trial Of High Frequency Oscillation In Ards: Prevalence, Patterns And Predictors DJ Cook, L Hand, P Austin, Q Zhou, V Danesh, N Adhikari, YM Arabi, ... B23. CLINICAL TRIALS AND OUTCOMES, A2542-A2542, 2014 | | 2014 |