According to our database1, Veelasha Moonsamy authored at least 13 papers between 2011 and 2018.
Legend:Book In proceedings Article PhD thesis Other
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices.
IEEE Communications Surveys and Tutorials, 2018
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices.
Proceedings of the Applied Cryptography and Network Security, 2017
New directions in IoT privacy using attribute-based authentication.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016
Mining permission patterns for contrasting clean and malicious android applications.
Future Generation Comp. Syst., 2014
Android applications: Data leaks via advertising libraries.
Proceedings of the International Symposium on Information Theory and its Applications, 2014
An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
Contrasting Permission Patterns between Clean and Malicious Android Applications.
Proceedings of the Security and Privacy in Communication Networks, 2013
Can Smartphone Users Turn Off Tracking Service Settings?
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods.
Towards an understanding of the impact of advertising on data leaks.
Analysis of Malicious and Benign Android Applications.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Feature Reduction to Speed Up Malware Classification.
Proceedings of the Information Security Technology for Applications, 2011