Suivre
Jordan Samhi
Jordan Samhi
CISPA – Helmholtz Center for Information Security
Adresse e-mail validée de cispa.de - Page d'accueil
Titre
Citée par
Citée par
Année
DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode
N Daoudi, J Samhi, AK Kabore, K Allix, TF Bissyandé, J Klein
Deployable Machine Learning for Security Defense: Second International …, 2021
352021
Raicc: Revealing atypical inter-component communication in android apps
J Samhi, A Bartel, TF Bissyandé, J Klein
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
312021
Jucify: A step towards android code unification for enhanced static analysis
J Samhi, J Gao, N Daoudi, P Graux, H Hoyez, X Sun, K Allix, ...
Proceedings of the 44th International Conference on Software Engineering …, 2022
262022
Difuzer: Uncovering suspicious hidden sensitive operations in android apps
J Samhi, L Li, TF Bissyandé, J Klein
Proceedings of the 44th International Conference on Software Engineering …, 2022
192022
A first look at Android applications in Google Play related to COVID-19
J Samhi, K Allix, TF Bissyandé, J Klein
Empirical Software Engineering 26, 1-49, 2021
182021
On The (In) Effectiveness of Static Logic Bomb Detection for Android Apps
J Samhi, A Bartel
IEEE Transactions on Dependable and Secure Computing 19 (6), 3822-3836, 2021
92021
Jucify: A step towards android code unification for enhanced static analysis. In 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE)
J Samhi, J Gao, N Daoudi, P Graux, H Hoyez, X Sun, K Allix, ...
Los Alamitos, CA, USA, 1232-1244, 2022
72022
Demystifying hidden sensitive operations in android apps
X Sun, X Chen, L Li, H Cai, J Grundy, J Samhi, T Bissyandé, J Klein
ACM Transactions on Software Engineering and Methodology 32 (2), 1-30, 2023
42023
TriggerZoo: a dataset of Android applications automatically infected with logic bombs
J Samhi, TF Bissyandé, J Klein
Proceedings of the 19th International Conference on Mining Software …, 2022
42022
Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods: An Application to the Android Framework for Data Leak …
J Samhi, M Kober, AK Kabore, S Arzt, TF Bissyandé, J Klein
2023 IEEE International Conference on Software Analysis, Evolution and …, 2023
32023
Revisiting android app categorization
M Alecci, J Samhi, TF Bissyandé, J Klein
arXiv preprint arXiv:2310.07290, 2023
22023
Sensitive and Personal Data: What Exactly Are You Talking About?
M Kober, J Samhi, S Arzt, TF Bissyandé, J Klein
2023 IEEE/ACM 10th International Conference on Mobile Software Engineering …, 2023
12023
Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods
J Samhi, M Kober, AK Kabore, S Arzt, TF Bissyandé, J Klein
2023 30th edition of the IEEE International Conference on Software Analysis …, 2023
12023
AndroLibZoo: A Reliable Dataset of Libraries Based on Software Dependency Analysis
J Samhi, TF Bissyandé, J Klein
Mining Software Repositories, 2024
2024
ChatGPT vs LLaMA: Impact, Reliability, and Challenges in Stack Overflow Discussions
L Da Silva, J Samhi, F Khomh
arXiv preprint arXiv:2402.08801, 2024
2024
Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection
M Alecci, J Samhi, L Li, TF Bissyandé, J Klein
IEEE Transactions on Dependable and Secure Computing, 2024
2024
A Dataset of Android Libraries
J Samhi, M Alecci, TF Bissyandé, J Klein
arXiv preprint arXiv:2307.12609, 2023
2023
USB Drop Attacks
J Samhi
Multi-System & Internet Security Cookbook 126, 2023
2023
Cryptojacking
J Samhi
Multi-System & Internet Security Cookbook 126, 2023
2023
Analyzing the Unanalyzable: an Application to Android Apps
J Samhi
University of Luxembourg, Luxembourg, 2023
2023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20