Prati
Ryan Johnson
Ryan Johnson
Potvrđena adresa e-pošte na masonlive.gmu.edu
Naslov
Citirano
Citirano
Godina
Analysis of android applications' permissions
R Johnson, Z Wang, C Gagnon, A Stavrou
2012 IEEE Sixth International Conference on Software Security and …, 2012
1002012
Active authentication of users
A Stavrou, R Murmuria, R Johnson, D Barbara
US Patent 10,289,819, 2019
512019
{FIRMSCOPE}: Automatic uncovering of {Privilege-Escalation} vulnerabilities in {Pre-Installed} apps in android firmware
M Elsabagh, R Johnson, A Stavrou, C Zuo, Q Zhao, Z Lin
29th USENIX security symposium (USENIX Security 20), 2379-2396, 2020
452020
Forced-path execution for android applications on x86 platforms
R Johnson, A Stavrou
2013 IEEE Seventh International Conference on Software Security and …, 2013
272013
Exposing security risks for commercial mobile devices
Z Wang, R Johnson, R Murmuria, A Stavrou
Computer Network Security: 6th International Conference on Mathematical …, 2012
192012
Attestation & authentication for usb communications
Z Wang, R Johnson, A Stavrou
2012 IEEE Sixth International Conference on Software Security and …, 2012
172012
Systems and methods for analyzing software
R Johnson, N Kiourtis, A Stavrou
US Patent 10,387,627, 2019
152019
Exposing software security and availability risks for commercial mobile devices
R Johnson, Z Wang, A Stavrou, J Voas
2013 Proceedings Annual Reliability and Maintainability Symposium (RAMS), 1-7, 2013
122013
Targeted DoS on android: how to disable android in 10 seconds or less
R Johnson, M Elsabagh, A Stavrou, V Sritapan
2015 10th International Conference on Malicious and Unwanted Software …, 2015
102015
Dazed droids: A longitudinal study of android inter-app vulnerabilities
R Johnson, M Elsabagh, A Stavrou, J Offutt
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
82018
Detecting and measuring misconfigured manifests in android apps
Y Yang, M Elsabagh, C Zuo, R Johnson, A Stavrou, Z Lin
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
72022
All your SMS & contacts belong to ADUPS & others
R Johnson, A Stavrou, A Benameur
Tech. Rep, 2017
72017
Why software dos is hard to fix: Denying access in embedded android platforms
R Johnson, M Elsabagh, A Stavrou
Applied Cryptography and Network Security: 14th International Conference …, 2016
72016
Enhancing collective c2 in the international environment: Leveraging the unclassified information sharing enterprise service
P Chlebo, G Christman, R Johnson
proceedings 16th International Command and Control Research and Technology …, 2011
72011
Pairing continuous authentication with proactive platform hardening
R Johnson, R Murmuria, A Stavrou, V Sritapan
2017 IEEE International Conference on Pervasive Computing and Communications …, 2017
62017
{DEFInit}: An Analysis of Exposed Android Init Routines
Y Ji, M Elsabagh, R Johnson, A Stavrou
30th USENIX Security Symposium (USENIX Security 21), 3685-3702, 2021
42021
Resilient and scalable cloned app detection using forced execution and compression trees
M Elsabagh, R Johnson, A Stavrou
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018
42018
Analysis of content copyright infringement in mobile application markets
R Johnson, N Kiourtis, A Stavrou, V Sritapan
2015 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2015
42015
Resurrecting the READ_LOGS permission on Samsung devices
R Johnson, A Stavrou
Black Hat Asia 2015, 2015
42015
Improving traditional android mdms with non-traditional means
R Johnson, A Stavrou, V Sritapan
2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-6, 2016
32016
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20