Veelasha Moonsamy

Orcid: 0000-0001-6296-2182

According to our database1, Veelasha Moonsamy authored at least 26 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
"Those things are written by lawyers, and programmers are reading that." Mapping the Communication Gap Between Software Developers and Privacy Experts.
Proc. Priv. Enhancing Technol., January, 2024

Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces.
CoRR, 2024

2023
TLS â†' Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android.
IACR Cryptol. ePrint Arch., 2023

Targeted and Troublesome: Tracking and Advertising on Children's Websites.
CoRR, 2023

Instructions Unclear: Undefined Behaviour in Cellular Network Specifications.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Domain Constraints in Feature Space: Strengthening Robustness of Android Malware Detection against Realizable Adversarial Examples.
CoRR, 2022

IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Less is More: A privacy-respecting Android malware classifier using federated learning.
Proc. Priv. Enhancing Technol., 2021

IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.
CoRR, 2021

EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box Android Malware Detection.
CoRR, 2021

Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code.
Proceedings of the 30th USENIX Security Symposium, 2021

2019
Malicious cryptocurrency miners: Status and Outlook.
CoRR, 2019

2018
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices.
IEEE Commun. Surv. Tutorials, 2018

MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices.
CoRR, 2016

New directions in IoT privacy using attribute-based authentication.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

2014
Mining permission patterns for contrasting clean and malicious android applications.
Future Gener. Comput. Syst., 2014

Android applications: Data leaks via advertising libraries.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Contrasting Permission Patterns between Clean and Malicious Android Applications.
Proceedings of the Security and Privacy in Communication Networks, 2013

Can Smartphone Users Turn Off Tracking Service Settings?
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

2012
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods.
J. Networks, 2012

Towards an understanding of the impact of advertising on data leaks.
Int. J. Secur. Networks, 2012

Analysis of Malicious and Benign Android Applications.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
Feature Reduction to Speed Up Malware Classification.
Proceedings of the Information Security Technology for Applications, 2011


  Loading...