Filter
Conference contribution

Search results

  • 2017

    Capturing Policies for BYOD

    Hallett, J. & Aspinall, D., 4 May 2017, ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Cham: Springer, p. 310-323 14 p. (IFIP Advances in Information and Communication Technology; vol. 502).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Certified Lightweight Contextual Policies for Android

    Seghir, M. N., Aspinall, D. & Marekova, L., 6 Feb 2017, Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016. Boston, MA, USA: Institute of Electrical and Electronics Engineers (IEEE), p. 94-100 7 p. 7839801

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2016

    Simplifying Datacenter Network Debugging with PathDump

    Tammana, P., Agarwal, R. & Lee, M., 4 Nov 2016, 12th USENIX Symposium on Operating Systems Design and Implementation OSDI16. Savannah, GA, USA: USENIX Association, p. 233-248 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • POSTER: Weighing in eHealth Security

    Krämer, M., Aspinall, D. & Wolters, M., 24 Oct 2016, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 1832-1834 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • More Semantics More Robust: Improving Android Malware Classifiers

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Jul 2016, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Darmstadt, Germany: ACM, p. 147-158 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On Robust Malware Classifiers by Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., Jun 2016, Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings. Springer, p. 326-341 15 p. (Lecture Notes in Computer Science; vol. 9681).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • A Text-Mining Approach to Explain Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Apr 2016, EuroSec '16 Proceedings of the 9th European Workshop on System Security . ACM, 6 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Explaining Unwanted Behaviours in Context

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 6 Apr 2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). CEUR-WS.org, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • PhoneWrap - Injecting the "How Often" into Mobile Apps

    Franzen, D. & Aspinall, D., Apr 2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). CEUR-WS.org, p. 11-19 9 p. (CEUR Workshop Proceedings; vol. 1575).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • AppPAL for Android: Capturing and Checking Mobile App Policies

    Hallett, J. & Aspinall, D., 2016, ESSoS: International Symposium on Engineering Secure Software and Systems. 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2015

    Security testing for Android mHealth apps

    Knorr, K. & Aspinall, D., Apr 2015, Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on. Institute of Electrical and Electronics Engineers (IEEE), p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Application of Domain-aware Binary Fuzzing to Aid Android Virtual Machine Testing

    Kyle, S., Leather, H., Franke, B., Butcher, D. & Monteith, S., 2015, Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. New York, NY, USA: ACM, p. 121-132 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • CherryPick: Tracing Packet Trajectory in Software-defined Datacenter Networks

    Tammana, P., Agarwal, R. & Lee, M., 2015, Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research. New York, NY, USA: ACM, p. 23:1-23:7 7 p. 23

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • EviCheck: Digital Evidence for Android

    Seghir, M. N. & Aspinall, D., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer, p. 221-227 6 p. (Lecture Notes in Computer Science; vol. 9364).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps

    Knorr, K., Aspinall, D. & Wolters, M., 2015, ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. Federrath, H. & Gollmann, D. (eds.). Springer, p. 571-584 14 p. (IFIP Advances in Information and Communication Technology; vol. 455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Sensor Use and Usefulness: Trade-Offs for Data-Driven Authentication on Mobile Devices

    Micallef, N., Kayacik, H. G., Just, M., Baillie, L. & Aspinall, D., 2015, Proceedings of PerCom 2015. 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2014

    Necessary and Sufficient Preconditions via Eager Abstraction

    Seghir, M. N. & Schrammel, P., 2014, Programming Languages and Systems: 12th Asian Symposium, APLAS 2014, Singapore, November 17-19, 2014, Proceedings. Springer, Vol. 8858. p. 236-254 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Towards an amortized type system for JavaScript

    Franzen, D. & Aspinall, D., 2014, 6th International Symposium on Symbolic Computation in Software Science, SCSS 2014, Gammarth, La Marsa, Tunisia, December 7-8, 2014. p. 12-26 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards an Authorization Framework for App Security Checking

    Hallett, J. & Aspinall, D., 2014, Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014.. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File