You Get Where You're Looking for: The Impact of Information Sources on Code Security, 2016 IEEE Symposium on Security and Privacy (SP), 2016. ,
, , pp.289-305
Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era, Security, Privacy, and Applied Cryptography Engineering, pp.53-73, 2017. ,
AndroZoo: Collecting Millions of Android Apps for the Research Community, Proceedings of the 13th International Conference on Mining Software Repositories (MSR '16, pp.468-471, 2016. ,
Mining Apps for Abnormal Usage of Sensitive Data, 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, vol.1, pp.426-436, 2015. ,
Exploring decision making with Android's runtime permission dialogs using in-context surveys, Thirteenth Symposium on Usable Privacy and Security, pp.195-210, 2017. ,
From keyloggers to touchloggers: Take the rough with the smooth, Computers & security, vol.32, pp.102-114, 2013. ,
, , 2011.
Android Permissions Demystified, Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11), pp.627-638, 2011. ,
Android Permissions: User Attention, Comprehension, and Behavior, Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12), 2012. ,
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop, 2017 IEEE Symposium on Security and Privacy (SP). 1041-1057, 2017. ,
Checking app behavior against app descriptions, 36th International Conference on Software Engineering, ICSE '14, pp.1025-1035, 2014. ,
DOI : 10.1145/2568225.2568276
Dynamic Deployment of Sensing Experiments in the Wild Using Smartphones, Distributed Applications and Interoperable Systems -13th IFIP WG 6.1 International Conference, DAIS 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, vol.7891, pp.43-56, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00804114
The domino effect of password reuse, Commun. ACM, vol.47, pp.75-78, 2004. ,
A11Y Attacks: Exploiting Accessibility in Operating Systems, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14), pp.103-115, 2014. ,
Identifying and quantifying the android device users' security risk exposure, 2013 International Conference on Computing, Networking and Communications (ICNC, pp.11-17, 2013. ,
Short paper: enhancing mobile application permissions with runtime feedback and constraints, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, pp.45-50, 2012. ,
On Malware Leveraging the Android Accessibility Framework, pp.512-523, 2014. ,
Understanding Code Smells in Android Applications, Proceedings of the International Conference on Mobile Software Engineering and Systems (MOBILESoft '16, pp.225-234, 2016. ,
Accessibility in Context: Understanding the Truly Mobile Experience of Smartphone Users with Motor Impairments, Proceedings of the 16th International ACM SIGACCESS Conference on Computers & Accessibility (ASSETS '14), pp.209-216, 2014. ,
A Stitch in Time: Supporting Android Developers in WritingSecure Code, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1065-1077, 2017. ,
Lightweight detection of Androidspecific code smells: The aDoctor project, 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), vol.00, pp.487-491, 2017. ,
, Spoon: A Library for Implementing Analyses and Transformations of Java Source Code. Software: Practice and Experience, vol.46, pp.1155-1179, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01078532
Getting Smartphones to Talkback: Understanding the Smartphone Adoption Process of Blind Users, Proceedings of the 17th International ACM SIGACCESS Conference on Computers & Accessibility (ASSETS '15), pp.23-32, 2015. ,
The password life cycle: user behaviour in managing passwords, Proceedings of the Tenth Symposium on Usable Privacy and Security (SOUPS '14), 2014. ,
When It's Better to Ask Forgiveness Than Get Permission: Attribution Mechanisms for Smartphone Resources, Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13), 2013. ,