Seguir
Yury Zhauniarovich
Yury Zhauniarovich
Assistant Professor at TU Delft
Dirección de correo verificada de zhauniarovich.com - Página principal
Título
Citado por
Citado por
Año
A survey on malicious domains detection through DNS data analysis
Y Zhauniarovich, I Khalil, T Yu, M Dacier
ACM Computing Surveys (CSUR) 51 (4), 1-36, 2018
1972018
StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications
Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci
5th ACM Conference on Data and Application Security and Privacy (CODASPY'15 …, 2015
1262015
CRêPE: A System for Enforcing Fine-grained Context-related Policies on Android
M Conti, B Crispo, E Fernandes, Y Zhauniarovich
IEEE Transactions on Information Forensics and Security 7 (5), 1426-1438, 2012
1102012
YAASE: Yet Another Android Security Extension
G Russello, B Crispo, E Fernandes, Y Zhauniarovich
Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International …, 2011
882011
FSquaDRA: Fast Detection of Repackaged Applications
Y Zhauniarovich, O Gadyatskaya, B Crispo, F La Spina, E Moser
IFIP Annual Conference on Data and Applications Security and Privacy, 130-145, 2014
842014
MOSES: Supporting and Enforcing Security Profiles on Smartphones
Y Zhauniarovich, G Russello, M Conti, B Crispo, E Fernandes
IEEE Transactions on Dependable and Secure Computing 11 (3), 211 - 223, 2014
762014
Please Hold On: Unobtrusive User Authentication using Smartphone’s built-in Sensors
A Buriro, B Crispo, Y Zhauniarovich
IEEE International Conference on Identity, Security and Behavior Analysis …, 2017
622017
Small Changes, Big Changes: An Updated View on the Android Permission System
Y Zhauniarovich, O Gadyatskaya
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
482016
Towards black box testing of android apps
Y Zhauniarovich, A Philippov, O Gadyatskaya, B Crispo, F Massacci
2015 10th International Conference on Availability, Reliability and Security …, 2015
482015
Visualization of actionable knowledge to mitigate DRDoS attacks
M Aupetit, Y Zhauniarovich, G Vasiliadis, M Dacier, Y Boshmaf
2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2016
322016
Fine-grained code coverage measurement in automated black-box Android testing
A Pilgun, O Gadyatskaya, Y Zhauniarovich, S Dashevskyi, A Kushniarou, ...
ACM Transactions on Software Engineering and Methodology (TOSEM) 29 (4), 1-35, 2020
312020
Evaluation of Resource-Based App Repackaging Detection in Android
O Gadyatskaya, AL Lezza, Y Zhauniarovich
Nordic Conference on Secure IT Systems, 135-151, 2016
272016
Security in the Firefox OS and Tizen Mobile Platforms
O Gadyatskaya, F Massacci, Y Zhauniarovich
Computer 47 (6), 57-63, 2014
252014
StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications
M Ahmad, V Costamagna, B Crispo, F Bergadano, Y Zhauniarovich
Journal of Systems and Software 159, 110386, 2020
232020
Dissecting Android Cryptocurrency Miners
S Dashevskyi, Y Zhauniarovich, O Gadyatskaya, A Pilgun, H Ouhssain
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
182020
DEMO: Enabling Trusted Stores for Android
Y Zhauniarovich, O Gadyatskaya, B Crispo
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
182013
An Effective Android Code Coverage Tool
A Pilgun, O Gadyatskaya, S Dashevskyi, Y Zhauniarovich, A Kushniarou
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
172018
Sorting the Garbage: Filtering Out DRDoS Amplification Traffic in ISP Networks
Y Zhauniarovich, P Dodia
2019 IEEE Conference on Network Softwarization (NetSoft), 142-150, 2019
142019
Profiling DRDoS Attacks with Data Analytics Pipeline
L Berti-Equille, Y Zhauniarovich
Proceedings of the 26th ACM International on Conference on Information and …, 2017
132017
Demonstrating the Effectiveness of MOSES for Separation of Execution Modes
G Russello, M Conti, B Crispo, E Fernandes, Y Zhauniarovich
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
122012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20