Aisha I. Ali-Gombe

Orcid: 0000-0002-2563-0557

According to our database1, Aisha I. Ali-Gombe authored at least 26 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices.
Comput. Secur., September, 2023

Security of IT/OT Convergence: Design and Implementation Challenges.
CoRR, 2023

Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals.
Proceedings of the IEEE Secure Development Conference, 2023

I've Got You, Under My Skin: Biohacking Augmentation Implant Forensics.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

2022
Memory analysis of .NET and .Net Core applications.
Digit. Investig., 2022

A Reverse Engineering Education Needs Analysis Survey.
CoRR, 2022

Intent-aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

User Awareness and Privacy Regarding Instant Games on Facebook.
Proceedings of the HCI International 2022 - Late Breaking Papers. Interaction in New Media, Learning and Games, 2022

Transforming Memory Image to Sound Wave Signals for an Effective IoT Fingerprinting.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

I Don't Know Why You Need My Data: A Case Study of Popular Social Media Privacy Policies.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Modern macOS userland runtime analysis.
Digit. Investig., 2021

Seance: Divination of tool-breaking changes in forensically important binaries.
Digit. Investig., 2021

IIoT-ARAS: IIoT/ICS Automated Risk Assessment System for Prediction and Prevention.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Object Allocation Pattern as an Indicator for Maliciousness - An Exploratory Analysis.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics.
Comput. Secur., 2020

AmpleDroid Recovering Large Object Files from Android Application Memory.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
HookTracer: A System for Automated and Accessible API Hooks Analysis.
Digit. Investig., 2019

DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

2018
Memory forensics and the Windows Subsystem for Linux.
Digit. Investig., 2018

Toward a more dependable hybrid analysis of android malware using aspect-oriented programming.
Comput. Secur., 2018

Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2016
Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

AspectDroid: Android App Analysis System.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Robust Fingerprinting for Relocatable Code.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

OpSeq: Android Malware Fingerprinting.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015


  Loading...