Author of the publication

Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods : An Application to the Android Framework for Data Leak Detection.

, , , , , and . SANER, page 783-794. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis., , , , , , , , and . ICSE, page 1232-1244. ACM, (2022)Analyzing the Unanalyzable: an Application to Android Apps.. University of Luxembourg, (2023)base-search.net (ftunivluxembourg:oai:orbilu.uni.lu:10993/54372).Demystifying Hidden Sensitive Operations in Android Apps., , , , , , , and . ACM Trans. Softw. Eng. Methodol., 32 (2): 50:1-50:30 (April 2023)RAICC: Revealing Atypical Inter-Component Communication in Android Apps., , , and . ICSE, page 1398-1409. IEEE, (2021)Sensitive and Personal Data: What Exactly Are You Talking About?, , , , and . MOBILESoft, page 70-74. IEEE, (2023)Revisiting Android App Categorization., , , and . ICSE, page 204:1-204:12. ACM, (2024)Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps., , , and . ICSE, page 723-735. ACM, (2022)A Partial Replication of "RAICC: Revealing Atypical Inter-Component Communication in Android Apps"., , , and . ICSE (Companion Volume), page 207-208. IEEE, (2021)TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs., , and . MSR, page 459-463. ACM, (2022)AndroLog: Android Instrumentation and Code Coverage Analysis., and . SIGSOFT FSE Companion, page 597-601. ACM, (2024)