default search action
Yousra Aafer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Dheeraj Vagavolu, Yousra Aafer, Meiyappan Nagappan:
(Deep) Learning of Android Access Control Recommendation from Static Execution Paths. EuroS&P 2024: 758-772 - [e1]Eleonora Losiouk, Alessandro Brighente, Mauro Conti, Yousra Aafer, Yanick Fratantonio:
The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024. ACM 2024, ISBN 979-8-4007-0959-3 [contents] - [i3]Noble Saji Mathews, Yelizaveta Brus, Yousra Aafer, Meiyappan Nagappan, Shane McIntosh:
LLbezpeky: Leveraging Large Language Models for Vulnerability Detection. CoRR abs/2401.01269 (2024) - 2023
- [c28]Yapeng Ye, Zhuo Zhang, Qingkai Shi, Yousra Aafer, Xiangyu Zhang:
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling. SP 2023: 2391-2408 - [c27]Parjanya Vyas, Asim Waheed, Yousra Aafer, N. Asokan:
Auditing Framework APIs via Inferred App-side Security Specifications. USENIX Security Symposium 2023: 6061-6077 - [i2]Kishanthan Thangarajah, Noble Saji Mathews, Michael Pu, Meiyappan Nagappan, Yousra Aafer, Sridhar Chimalakonda:
Statically Detecting Buffer Overflow in Cross-language Android Applications Written in Java and C/C++. CoRR abs/2305.10233 (2023) - 2022
- [c26]Zeinab El-Rewini, Zhuo Zhang, Yousra Aafer:
Poirot: Probabilistically Recommending Protections for the Android Framework. CCS 2022: 937-950 - [c25]Fei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer:
ProFactory: Improving IoT Security via Formalized Protocol Customization. USENIX Security Symposium 2022: 3879-3896 - 2021
- [c24]Zeinab El-Rewini, Yousra Aafer:
Dissecting Residual APIs in Custom Android ROMs. CCS 2021: 1598-1611 - [c23]Zhuo Zhang, Wei You, Guanhong Tao, Yousra Aafer, Xuwei Liu, Xiangyu Zhang:
StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting. SP 2021: 659-676 - [c22]Zhuo Zhang, Yapeng Ye, Wei You, Guanhong Tao, Wen-Chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang:
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary. SP 2021: 813-832 - [c21]Yousra Aafer, Wei You, Yi Sun, Yu Shi, Xiangyu Zhang, Heng Yin:
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing. USENIX Security Symposium 2021: 2759-2776 - 2020
- [c20]Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu:
Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles. CCS 2020: 263-278 - [c19]I Luk Kim, Yunhui Zheng, Hogun Park, Weihang Wang, Wei You, Yousra Aafer, Xiangyu Zhang:
Finding client-side business flow tampering vulnerabilities. ICSE 2020: 222-233 - [c18]Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu:
Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles. RAID 2020: 349-364 - [c17]Wei You, Zhuo Zhang, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Harmon, Xiangyu Zhang:
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning. SP 2020: 1121-1138
2010 – 2019
- 2019
- [c16]Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang:
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation. CCS 2019: 1265-1282 - 2018
- [c15]Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach. CCS 2018: 801-816 - [c14]Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li:
Precise Android API Protection Mapping Derivation and Reasoning. CCS 2018: 1151-1164 - [c13]Zhenhao Tang, Juan Zhai, Minxue Pan, Yousra Aafer, Shiqing Ma, Xiangyu Zhang, Jianhua Zhao:
Dual-force: understanding WebView malware via cross-language forced execution. ASE 2018: 714-725 - [c12]Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, Chen Tian:
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection. NDSS 2018 - [c11]Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, Xiangyu Zhang:
Trojaning Attack on Neural Networks. NDSS 2018 - [c10]I Luk Kim, Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, Weijie Meng, Xiangyu Zhang:
AdBudgetKiller: Online Advertising Budget Draining Attack. WWW 2018: 297-307 - 2017
- [c9]Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang:
Analysis of SEAndroid Policies: Combining MAC and DAC in Android. ACSAC 2017: 553-565 - [c8]Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, I Luk Kim, Wen-Chuan Lee, Yingqi Liu, Weijie Meng, Xiangyu Zhang, Patrick Eugster:
PAD: programming third-party web advertisement censorship. ASE 2017: 240-251 - [c7]Jianjun Huang, Yousra Aafer, David Mitchel Perry, Xiangyu Zhang, Chen Tian:
UI driven Android application reduction. ASE 2017: 286-296 - [c6]Shiqing Ma, Yousra Aafer, Zhaogui Xu, Wen-Chuan Lee, Juan Zhai, Yingqi Liu, Xiangyu Zhang:
LAMP: data provenance for graph based machine learning algorithms through derivative computation. ESEC/SIGSOFT FSE 2017: 786-797 - 2016
- [c5]Xiao Zhang, Yousra Aafer, Kailiang Ying, Wenliang Du:
Hey, You, Get Off of My Image: Detecting Data Residue in Android Images. ESORICS (1) 2016: 401-421 - [c4]Xiao Zhang, Kailiang Ying, Yousra Aafer, Zhenshen Qiu, Wenliang Du:
Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android. NDSS 2016 - [c3]Yousra Aafer, Xiao Zhang, Wenliang Du:
Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis. USENIX Security Symposium 2016: 1153-1168 - 2015
- [c2]Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen, XiaoFeng Wang, Xiao-yong Zhou, Wenliang Du, Michael Grace:
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References. CCS 2015: 1248-1259 - 2014
- [i1]E. Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang, Wenliang Du:
A Systematic Security Evaluation of Android's Multi-User Framework. CoRR abs/1410.7752 (2014) - 2013
- [c1]Yousra Aafer, Wenliang Du, Heng Yin:
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. SecureComm 2013: 86-103
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 20:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint