AspectDroid: Android app analysis system A Ali-Gombe, I Ahmed, GG Richard III, V Roussev Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 48 | 2016 |
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming AI Ali-Gombe, B Saltaformaggio, D Xu, GG Richard III computers & security 73, 235-248, 2018 | 45 | 2018 |
Opseq: Android malware fingerprinting A Ali-Gombe, I Ahmed, GG Richard III, V Roussev Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-12, 2015 | 34 | 2015 |
{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction A Ali-Gombe, S Sudhakaran, A Case, GG Richard III 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 27 | 2019 |
Memory forensics and the windows subsystem for linux N Lewis, A Case, A Ali-Gombe, GG Richard III Digital Investigation 26, S3-S11, 2018 | 26 | 2018 |
“Tipped Off by Your Memory Allocator”: Device-Wide User Activity Sequencing from Android Memory Images R Bhatia, B Saltaformaggio, SJ Yang, A Ali-Gombe, X Zhang, D Xu, ... | 21 | 2018 |
Hooktracer: Automatic detection and analysis of keystroke loggers using memory forensics A Case, RD Maggio, M Firoz-Ul-Amin, MM Jalalzai, A Ali-Gombe, M Sun, ... Computers & Security 96, 101872, 2020 | 20 | 2020 |
HookTracer: A system for automated and accessible API hooks analysis A Case, MM Jalalzai, M Firoz-Ul-Amin, RD Maggio, A Ali-Gombe, M Sun, ... Digital Investigation 29, S104-S112, 2019 | 18 | 2019 |
Memory analysis of. net and. net core applications M Manna, A Case, A Ali-Gombe, GG Richard III Forensic Science International: Digital Investigation 42, 301404, 2022 | 13 | 2022 |
IIoT-ARAS: IIoT/ICS Automated risk assessment system for prediction and prevention B Zahran, A Hussaini, A Ali-Gombe Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 11 | 2021 |
Robust fingerprinting for relocatable code I Ahmed, V Roussev, A Ali Gombe Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 11 | 2015 |
Modern macOS userland runtime analysis M Manna, A Case, A Ali-Gombe, GG Richard III Forensic Science International: Digital Investigation 38, 301221, 2021 | 8 | 2021 |
Don't touch that column: Portable, fine-grained access control for android's native content providers A Ali-Gombe, GG Richard III, I Ahmed, V Roussev Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 6 | 2016 |
App-agnostic post-execution semantic analysis of Android in-memory forensics artifacts A Ali-Gombe, A Tambaoan, A Gurfolino, GG Richard III Proceedings of the 36th Annual Computer Security Applications Conference, 28-41, 2020 | 5 | 2020 |
Cross-platform malware: study of the forthcoming hazard adaptation and behavior B Zahran, S Nicholson, A Ali-Gombe Proceedings of the International Conference on Security and Management (SAM …, 2019 | 5 | 2019 |
Volatile Memory Message Carving: A" per process basis" Approach AI Ali-Gombe | 5 | 2012 |
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices R Vijayakanthan, I Ahmed, A Ali-Gombe Computers & Security 132, 103298, 2023 | 3 | 2023 |
Security of IT/OT Convergence: Design and Implementation Challenges B Zahran, A Hussaini, A Ali-Gombe The 2021 World Congress in Computer Science, Computer Engineering, and …, 2021 | 3 | 2021 |
Object allocation pattern as an indicator for maliciousness-an exploratory analysis A Hussaini, B Zahran, A Ali-Gombe Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 3 | 2021 |
AmpleDroid Recovering Large Object Files from Android Application Memory S Sudhakaran, A Ali-Gombe, A Orgah, A Case, GG Richard III IEEE International Workshop on Information Forensics and Security (IEEE …, 2020 | 3 | 2020 |