Mykolai Protsenko

According to our database1, Mykolai Protsenko authored at least 20 papers between 2013 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Advanced System Resiliency Based on Virtualization Techniques for IoT Devices.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2018
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Securing the android app ecosystem: obfuscation, tamperproofing, and malware detection = Absicherung des Android App Ökosystems.
PhD thesis, 2017

Classifying malware attacks in IaaS cloud environments.
J. Cloud Comput., 2017

Anti-ProGuard: Towards Automated Deobfuscation of Android Apps.
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017

A Cloud-Based Compilation and Hardening Platform for Android Apps.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Comparative evaluation of machine learning-based malware detection on Android.
Proceedings of the Sicherheit 2016: Sicherheit, 2016

ARTIST: The Android Runtime Instrumentation Toolkit.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A game of Droid and Mouse: The threat of split-personality malware on Android.
Comput. Secur., 2015

Protecting Android Apps Against Reverse Engineering by the Use of the Native Code.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

CloudIDEA: A Malware Defense Architecture for Cloud Data Centers.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2015 Conferences, 2015

Dynamic Self-Protection and Tamperproofing for Android Apps Using Native Code.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Toward an Open Source Location Privacy Evaluation Framework for Vehicular Networks.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Android Malware Detection Based on Software Complexity Metrics.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

An(other) Exercise in Measuring the Strength of Source Code Obfuscation.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

Divide-and-Conquer: Why Android Malware Cannot Be Stopped.
Proceedings of the Ninth International Conference on Availability, 2014

2013
PANDORA applies non-deterministic obfuscation randomly to Android.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013


  Loading...