Veelasha Moonsamy
Orcid: 0000-0001-6296-2182
According to our database1,
Veelasha Moonsamy
authored at least 37 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware Detection.
ACM Trans. Priv. Secur., May, 2025
IEEE Trans. Dependable Secur. Comput., 2025
Making Web Applications GDPR Compliant: A Comparative Evaluation of GDPR-Enforcement Frameworks.
Proc. Priv. Enhancing Technol., 2025
IEEE Secur. Priv., 2025
BaseBridge: Bridging the Gap Between Over-the-Air and Emulation Testing for Cellular Baseband Firmware.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
"Sorry for Bugging you so much." Exploring Developers' Behavior Towards Privacy-Compliant Implementation.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Vulnerability, Where Art Thou? An Investigation of Vulnerability Management in Android Smartphone Chipsets.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
5G Under Siege: A Comprehensive Guide to Threats and Penetration Testing in 5G Campus Networks.
Proceedings of the International Wireless Communications and Mobile Computing, 2025
2024
"Those things are written by lawyers, and programmers are reading that." Mapping the Communication Gap Between Software Developers and Privacy Experts.
Proc. Priv. Enhancing Technol., January, 2024
EvadeDroid: A practical evasion attack on machine learning for black-box Android malware detection.
Comput. Secur., 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations.
Proceedings of the Computer Security. ESORICS 2024 International Workshops, 2024
Proceedings of the Annual Computer Security Applications Conference, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
Domain Constraints in Feature Space: Strengthening Robustness of Android Malware Detection against Realizable Adversarial Examples.
CoRR, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2021
Less is More: A privacy-respecting Android malware classifier using federated learning.
Proc. Priv. Enhancing Technol., 2021
CoRR, 2021
Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code.
Proceedings of the 30th USENIX Security Symposium, 2021
2019
2018
IEEE Commun. Surv. Tutorials, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016
2014
Future Gener. Comput. Syst., 2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013
2012
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods.
J. Networks, 2012
Int. J. Secur. Networks, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
2011
Proceedings of the Information Security Technology for Applications, 2011