-
2
-
-
84871278310
-
Automated concolic testing of smartphone apps
-
Anand, S., Naik, M., Harrold, M. J., and Yang, H. Automated concolic testing of smartphone apps. In Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering (2012).
-
(2012)
Proceedings of The ACM SIGSOFT 20th International Symposium on The Foundations of Software Engineering
-
-
Anand, S.1
Naik, M.2
Harrold, M.J.3
Yang, H.4
-
3
-
-
85178287263
-
DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket
-
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., and Siemens, C. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In Ndss (2014).
-
(2014)
Ndss
-
-
Arp, D.1
Spreitzenbarth, M.2
Hubner, M.3
Gascon, H.4
Rieck, K.5
Siemens, C.6
-
4
-
-
84920438426
-
Deep Packet Inspection As a Service
-
CoNEXT
-
Bremler-Barr, A., Harchol, Y., Hay, D., and Koral, Y. Deep Packet Inspection As a Service. In Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies (2014), CoNEXT.
-
(2014)
Proceedings of The 10th ACM International on Conference on Emerging Networking Experiments and Technologies
-
-
Bremler-Barr, A.1
Harchol, Y.2
Hay, D.3
Koral, Y.4
-
5
-
-
84966660819
-
Acquiring and analyzing app metrics for effective mobile malware detection
-
Canfora, G., Medvet, E., Mercaldo, F., and Visaggio, C. A. Acquiring and analyzing app metrics for effective mobile malware detection. In Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics (2016).
-
(2016)
Proceedings of The 2016 ACM on International Workshop on Security And Privacy Analytics
-
-
Canfora, G.1
Medvet, E.2
Mercaldo, F.3
Visaggio, C.A.4
-
6
-
-
79955951954
-
CloneCloud: Elastic Execution between Mobile Device and Cloud
-
Chun, B., Ihm, S., Maniatis, P., Naik, M., and Patti, A. CloneCloud: Elastic Execution Between Mobile Device and Cloud. Proceedings of the sixth conference on Computer systems (2011).
-
(2011)
Proceedings of The Sixth Conference on Computer Systems
-
-
Chun, B.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
7
-
-
84883095467
-
Networkprofiler: Towards automatic fingerprinting of android apps
-
Dai, S., Tongaonkar, A., Wang, X., Nucci, A., and Song, D. Networkprofiler: Towards automatic fingerprinting of android apps. In Proceedings of INFOCOM (2013).
-
(2013)
Proceedings of INFOCOM
-
-
Dai, S.1
Tongaonkar, A.2
Wang, X.3
Nucci, A.4
Song, D.5
-
8
-
-
77956946040
-
RCUDA: Reducing the number of GPU-based accelerators in high performance clusters
-
Duato, J., Pena, A. J., Silla, F., Mayo, R., and Quintana-Ort, E. S. rCUDA: Reducing the number of GPU-based accelerators in high performance clusters. In Proceedings of the 2010 International Conference on High Performance Computing and Simulation (2010).
-
(2010)
Proceedings of The 2010 International Conference on High Performance Computing and Simulation
-
-
Duato, J.1
Pena, A.J.2
Silla, F.3
Mayo, R.4
Quintana-Ort, E.S.5
-
9
-
-
85059767531
-
-
arXiv preprint
-
Feng, Y., Bastani, O., Martins, R., Dillig, I., and Anand, S. Automated synthesis of semantic malware signatures using maximum satisfiability. arXiv preprint arXiv:1608.06254 (2016).
-
(2016)
Automated Synthesis of Semantic Malware Signatures Using Maximum Satisfiability
-
-
Feng, Y.1
Bastani, O.2
Martins, R.3
Dillig, I.4
Anand, S.5
-
10
-
-
85019999359
-
Large-scale offloading in the Internet of Things
-
Flores, H., Su, X., Kostakos, V., Ding, A. Y., Nurmi, P., Tarkoma, S., Hui, P., and Li, Y. Large-scale offloading in the Internet of Things. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (2017).
-
(2017)
2017 IEEE International Conference on Pervasive Computing and Communications Workshops
-
-
Flores, H.1
Su, X.2
Kostakos, V.3
Ding, A.Y.4
Nurmi, P.5
Tarkoma, S.6
Hui, P.7
Li, Y.8
-
11
-
-
84889046959
-
Structural detection of android malware using embedded call graphs
-
Gascon, H., Yamaguchi, F., Arp, D., and Rieck, K. Structural detection of android malware using embedded call graphs. In Proceedings of the 2013 ACM workshop on Artificial intelligence and security (2013).
-
(2013)
Proceedings of The 2013 ACM Workshop on Artificial Intelligence and Security
-
-
Gascon, H.1
Yamaguchi, F.2
Arp, D.3
Rieck, K.4
-
12
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
Kim, H., Smith, J., and Shin, K. G. Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the 6th international conference on Mobile systems, applications, and services (2008).
-
(2008)
Proceedings of The 6th International Conference on Mobile Systems, Applications, and Services
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
13
-
-
84861596582
-
ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
-
Kosta, S., Aucinas, A., Hui, P., Mortier, R., and Zhang, X. ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In Proceedings of INFOCOM (2012).
-
(2012)
Proceedings of INFOCOM
-
-
Kosta, S.1
Aucinas, A.2
Hui, P.3
Mortier, R.4
Zhang, X.5
-
14
-
-
77954516371
-
Virusmeter: Preventing your cellphone from spies
-
Liu, L., Yan, G., Zhang, X., and Chen, S. Virusmeter: Preventing your cellphone from spies. In International Workshop on Recent Advances in Intrusion Detection (2009).
-
(2009)
International Workshop on Recent Advances in Intrusion Detection
-
-
Liu, L.1
Yan, G.2
Zhang, X.3
Chen, S.4
-
17
-
-
85007189977
-
Enabling android-based devices to high-end GPGPUs
-
10048
-
Montella, R., Ferraro, C., Kosta, S., Pelliccia, V., and Giunta, G. Enabling android-based devices to high-end GPGPUs, vol. 10048 LNCS. 2016.
-
(2016)
LNCS
-
-
Montella, R.1
Ferraro, C.2
Kosta, S.3
Pelliccia, V.4
Giunta, G.5
-
18
-
-
85028998408
-
Accelerating Linux and Android applications on low-power devices through remote GPGPU offloading
-
Montella, R., Kosta, S., Oro, D., Vera, J., Fernández, C., Palmieri, C., Di Luccio, D., Giunta, G., Lapegna, M., and Laccetti, G. Accelerating Linux and Android applications on low-power devices through remote GPGPU offloading. Concurrency Computation (2017).
-
(2017)
Concurrency Computation
-
-
Montella, R.1
Kosta, S.2
Oro, D.3
Vera, J.4
Fernández, C.5
Palmieri, C.6
Di Luccio, D.7
Giunta, G.8
Lapegna, M.9
Laccetti, G.10
-
20
-
-
78751498804
-
Paranoid Android: Versatile protection for smartphones
-
Portokalidis, G., Homburg, P., Anagnostakis, K., and Bos, H. Paranoid Android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference (2010).
-
(2010)
Proceedings of The 26th Annual Computer Security Applications Conference
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
21
-
-
84974623223
-
Flexible and secure resource sharing for mobile augmentation systems
-
Reiter, A., and Zefferer, T. Flexible and secure resource sharing for mobile augmentation systems. In Proceedings - 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2016 (2016).
-
(2016)
Proceedings - 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2016
-
-
Reiter, A.1
Zefferer, T.2
-
22
-
-
70350136710
-
The Case for VM-based Cloudlets in Mobile Computing
-
Satyanarayanan, M., Bahl, V., Caceres, R., and Davies, N. The Case for VM-based Cloudlets in Mobile Computing. IEEE Pervasive Computing (2009).
-
(2009)
IEEE Pervasive Computing
-
-
Satyanarayanan, M.1
Bahl, V.2
Caceres, R.3
Davies, N.4
-
23
-
-
67650323193
-
Gnort: High Performance Network Intrusion Detection Using Graphics Processors
-
Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E. P., and Ioannidis, S. Gnort: High Performance Network Intrusion Detection Using Graphics Processors. In Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (2008).
-
(2008)
Proceedings of The 11th International Symposium on Recent Advances in Intrusion Detection
-
-
Vasiliadis, G.1
Antonatos, S.2
Polychronakis, M.3
Markatos, E.P.4
Ioannidis, S.5
-
26
-
-
84868259476
-
DroidMat: Android malware detection through manifest and api calls tracing
-
Wu, D.-J., Mao, C.-H., Wei, T.-E., Lee, H.-M., and Wu, K.-P. DroidMat: Android malware detection through manifest and api calls tracing. In Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference (2012).
-
(2012)
Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference
-
-
Wu, D.-J.1
Mao, C.-H.2
Wei, T.-E.3
Lee, H.-M.4
Wu, K.-P.5
-
28
-
-
84988552242
-
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications
-
Yang, C., Xu, Z., Gu, G., Yegneswaran, V., and Porras, P. DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. In European symposium on research in computer security (2014).
-
(2014)
European Symposium on Research in Computer Security
-
-
Yang, C.1
Xu, Z.2
Gu, G.3
Yegneswaran, V.4
Porras, P.5
-
29
-
-
84951807502
-
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context
-
Yang, W., Xiao, X., Andow, B., Li, S., Xie, T., and Enck, W. AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context. In Proceedings of the 37th IEEE International Conference Software Engineering (2015).
-
(2015)
Proceedings of The 37th IEEE International Conference Software Engineering
-
-
Yang, W.1
Xiao, X.2
Andow, B.3
Li, S.4
Xie, T.5
Enck, W.6
-
30
-
-
85016028641
-
ScanMe mobile: A cloud-based Android malware analysis service
-
Zhang, H., Cole, Y., Ge, L., Wei, S., Yu, W., Lu, C., Chen, G., Shen, D., Blasch, E., and Pham, K. D. ScanMe mobile: a cloud-based Android malware analysis service. ACM SIGAPP Applied Computing Review (2016).
-
(2016)
ACM SIGAPP Applied Computing Review
-
-
Zhang, H.1
Cole, Y.2
Ge, L.3
Wei, S.4
Yu, W.5
Lu, C.6
Chen, G.7
Shen, D.8
Blasch, E.9
Pham, K.D.10
|