If you made any changes in Pure these will be visible here soon.

Research Output 2014 2018

Filter
Article
2017

Characterizing malicious Android apps by mining topic-specific data flow signatures

Yang, X., Lo, D., Li, L., Xia, X., Bissyandé, T. F. & Klein, J., 1 Oct 2017, In : Information and Software Technology. 90, p. 27-39 13 p.

Research output: Contribution to journalArticleResearchpeer-review

On Locating Malicious Code in Piggybacked Android Apps

Li, L., Li, D., Bissyandé, T. F., Klein, J., Cai, H., Lo, D. & Le Traon, Y., 1 Nov 2017, In : Journal of Computer Science and Technology. 32, 6, p. 1108-1124 17 p.

Research output: Contribution to journalArticleResearchpeer-review

Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting

Li, L., Li, D., Bissyande, T. F., Klein, J., Le Traon, Y., Lo, D. & Cavallaro, L., 1 Jun 2017, In : IEEE Transactions on Information Forensics and Security. 12, 6, p. 1269-1284 16 p., 7828100.

Research output: Contribution to journalArticleResearchpeer-review

2016

Combining static analysis with probabilistic models to enable market-scale android inter-component analysis

Octeau, D., Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J. & Le Traon, Y., 8 Apr 2016, In : ACM SIGPLAN Notices. 51, 1, p. 469-484 16 p.

Research output: Contribution to journalArticleResearchpeer-review

2014

Detecting privacy leaks in Android Apps

Li, L., Bartel, A., Klein, J. & Le Traon, Y., 2014, In : CEUR Workshop Proceedings. 1298

Research output: Contribution to journalArticleResearchpeer-review