Mariem Graa

According to our database1, Mariem Graa authored at least 14 papers between 2011 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Detection and Response to Data Exfiltration from Internet of Things Android Devices.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Theoretical Security Evaluation of the Human Semantic Authentication Protocol.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Detection of Side Channel Attacks Based on Data Tainting in Android Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems.
Proceedings of the Information Systems Security - 13th International Conference, 2017

2016
Tracking Explicit and Control Flows in Java and Native Android Apps Code.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2014
Hybrid code analysis to detect confidentiality violations in android system. (Analyse hybride du code pour détecter les violations de la confidentialité dans le système android).
PhD thesis, 2014

Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Détection de flux de contrôle illégaux dans les Smartphones.
Proceedings of the Actes du XXXIIème Congrès INFORSID, Lyon, France, 20-23 Mai 2014., 2014

Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

2013
Formal Characterization of Illegal Control Flow in Android System.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

2012
Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
Using Requirements Engineering in an Automatic Security Policy Derivation Process.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011


  Loading...