AppsPlayground: Automatic Security Analysis of Smartphone Applications V Rastogi, Y Chen, W Enck Proceedings of the third ACM conference on Data and application security and …, 2013 | 510 | 2013 |
Droidchameleon: Evaluating Android Anti-malware against Transformation Attacks V Rastogi, Y Chen, X Jiang Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 498 | 2013 |
Autocog: Measuring the description-to-permission fidelity in android applications Z Qu, V Rastogi, X Zhang, Y Chen, T Zhu, Z Chen Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 287 | 2014 |
Catch Me if You Can: Evaluating Android Anti-malware against Transformation Attacks V Rastogi, Y Chen, X Jiang IEEE Transactions on Information Forensics and Security 9 (1), 99--108, 2014 | 264 | 2014 |
DroidNative: Automating and optimizing detection of Android native code malware variants S Alam, Z Qu, R Riley, Y Chen, V Rastogi computers & security 65, 230-246, 2017 | 126* | 2017 |
Cimplifier: automatically debloating containers V Rastogi, D Davidson, L De Carli, S Jha, P McDaniel Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 108 | 2017 |
Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces. V Rastogi, R Shao, Y Chen, X Pan, S Zou, R Riley 2016 Network and Distributed System Security Symposium (NDSS), 2016 | 86 | 2016 |
Robust attribution regularization J Chen, X Wu, V Rastogi, Y Liang, S Jha Advances in Neural Information Processing Systems 32, 2019 | 82 | 2019 |
Vetting SSL usage in applications with SSLINT B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, R Yang, Z Zhang 2015 IEEE Symposium on Security and Privacy, 519-534, 2015 | 82 | 2015 |
Security issues in language-based software ecosystems RK Vaidya, L De Carli, D Davidson, V Rastogi arXiv preprint arXiv:1903.02613, 2019 | 53* | 2019 |
Towards understanding limitations of pixel discretization against adversarial attacks J Chen, X Wu, V Rastogi, Y Liang, S Jha Proceedings of the 2019 IEEE European Symposium on Security and Privacy …, 2019 | 41* | 2019 |
Uranine: Real-time privacy leakage monitoring without system modification for android V Rastogi, Z Qu, J McClurg, Y Cao, Y Chen Security and Privacy in Communication Networks: 11th EAI International …, 2015 | 41 | 2015 |
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. Z Li, Y Tang, Y Cao, V Rastogi, Y Chen, B Liu, C Sbisa 2011 Network and Distributed System Security Symposium (NDSS), 2011 | 41 | 2011 |
Defending against package typosquatting M Taylor, R Vaidya, D Davidson, L De Carli, V Rastogi Network and System Security: 14th International Conference, NSS 2020 …, 2020 | 35 | 2020 |
Virtual browser: a virtualized browser to sandbox third-party javascripts with enhanced security Y Cao, Z Li, V Rastogi, Y Chen, X Wen Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 28 | 2012 |
New directions for container debloating V Rastogi, C Niddodi, S Mohan, S Jha Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017 | 24 | 2017 |
Redefining web browser principals with a configurable origin policy Y Cao, V Rastogi, Z Li, Y Chen, A Moshchuk 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 24 | 2013 |
Understanding in-app ads and detecting hidden attacks through the mobile app-web interface R Shao, V Rastogi, Y Chen, X Pan, G Guo, S Zou, R Riley IEEE Transactions on Mobile Computing 17 (11), 2675-2688, 2018 | 21 | 2018 |
System and method for privacy leakage detection and prevention system without operating system modification Y Chen, V Rastogi, Z Qu, J McClurg US Patent 10,460,112, 2019 | 20 | 2019 |
Neural-augmented static analysis of android communication J Zhao, A Albarghouthi, V Rastogi, S Jha, D Octeau Proceedings of the 2018 26th acm joint meeting on european software …, 2018 | 18 | 2018 |