Yousra Aafer

According to our database1, Yousra Aafer authored at least 31 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
LLbezpeky: Leveraging Large Language Models for Vulnerability Detection.
CoRR, 2024

2023
Statically Detecting Buffer Overflow in Cross-language Android Applications Written in Java and C/C++.
CoRR, 2023

Auditing Framework APIs via Inferred App-side Security Specifications.
Proceedings of the 32nd USENIX Security Symposium, 2023

D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
ProFactory: Improving IoT Security via Formalized Protocol Customization.
Proceedings of the 31st USENIX Security Symposium, 2022

Poirot: Probabilistically Recommending Protections for the Android Framework.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.
Proceedings of the 30th USENIX Security Symposium, 2021

OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Dissecting Residual APIs in Custom Android ROMs.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Finding client-side business flow tampering vulnerabilities.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
AdBudgetKiller: Online Advertising Budget Draining Attack.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Trojaning Attack on Neural Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Dual-force: understanding WebView malware via cross-language forced execution.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Precise Android API Protection Mapping Derivation and Reasoning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
LAMP: data provenance for graph based machine learning algorithms through derivative computation.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

PAD: programming third-party web advertisement censorship.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

UI driven Android application reduction.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Analysis of SEAndroid Policies: Combining MAC and DAC in Android.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis.
Proceedings of the 25th USENIX Security Symposium, 2016

Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Hey, You, Get Off of My Image: Detecting Data Residue in Android Images.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
A Systematic Security Evaluation of Android's Multi-User Framework.
CoRR, 2014

2013
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android.
Proceedings of the Security and Privacy in Communication Networks, 2013


  Loading...