Seguir
A. Ali-Gombe
Título
Citado por
Citado por
Año
Aspectdroid: Android app analysis system
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
472016
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming
AI Ali-Gombe, B Saltaformaggio, D Xu, GG Richard III
computers & security 73, 235-248, 2018
452018
Opseq: Android malware fingerprinting
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-12, 2015
342015
Memory forensics and the windows subsystem for linux
N Lewis, A Case, A Ali-Gombe, GG Richard III
Digital Investigation 26, S3-S11, 2018
262018
{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction
A Ali-Gombe, S Sudhakaran, A Case, GG Richard III
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
252019
“Tipped Off by Your Memory Allocator”: Device-Wide User Activity Sequencing from Android Memory Images
R Bhatia, B Saltaformaggio, SJ Yang, A Ali-Gombe, X Zhang, D Xu, ...
202018
Hooktracer: Automatic detection and analysis of keystroke loggers using memory forensics
A Case, RD Maggio, M Firoz-Ul-Amin, MM Jalalzai, A Ali-Gombe, M Sun, ...
Computers & Security 96, 101872, 2020
192020
HookTracer: A system for automated and accessible API hooks analysis
A Case, MM Jalalzai, M Firoz-Ul-Amin, RD Maggio, A Ali-Gombe, M Sun, ...
Digital Investigation 29, S104-S112, 2019
182019
Memory analysis of. net and. net core applications
M Manna, A Case, A Ali-Gombe, GG Richard III
Forensic Science International: Digital Investigation 42, 301404, 2022
132022
IIoT-ARAS: IIoT/ICS Automated risk assessment system for prediction and prevention
B Zahran, A Hussaini, A Ali-Gombe
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
112021
Robust fingerprinting for relocatable code
I Ahmed, V Roussev, A Ali Gombe
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
112015
Modern macOS userland runtime analysis
M Manna, A Case, A Ali-Gombe, GG Richard III
Forensic Science International: Digital Investigation 38, 301221, 2021
82021
Don't touch that column: Portable, fine-grained access control for android's native content providers
A Ali-Gombe, GG Richard III, I Ahmed, V Roussev
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
62016
App-agnostic post-execution semantic analysis of Android in-memory forensics artifacts
A Ali-Gombe, A Tambaoan, A Gurfolino, GG Richard III
Proceedings of the 36th Annual Computer Security Applications Conference, 28-41, 2020
52020
Cross-platform malware: study of the forthcoming hazard adaptation and behavior
B Zahran, S Nicholson, A Ali-Gombe
Proceedings of the International Conference on Security and Management (SAM …, 2019
52019
Volatile Memory Message Carving: A" per process basis" Approach
AI Ali-Gombe
52012
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices
R Vijayakanthan, I Ahmed, A Ali-Gombe
Computers & Security 132, 103298, 2023
32023
Security of IT/OT Convergence: Design and Implementation Challenges
B Zahran, A Hussaini, A Ali-Gombe
The 2021 World Congress in Computer Science, Computer Engineering, and …, 2021
32021
Object allocation pattern as an indicator for maliciousness-an exploratory analysis
A Hussaini, B Zahran, A Ali-Gombe
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
32021
AmpleDroid Recovering Large Object Files from Android Application Memory
S Sudhakaran, A Ali-Gombe, A Orgah, A Case, GG Richard III
IEEE International Workshop on Information Forensics and Security (IEEE …, 2020
32020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20