[go: up one dir, main page]

Follow
Veelasha Moonsamy
Veelasha Moonsamy
Professor at Ruhr University Bochum, Germany
Verified email at veelasha.org - Homepage
Title
Cited by
Cited by
Year
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
R Spreitzer, V Moonsamy, T Korak, S Mangard
IEEE Communications Surveys & Tutorials, 2017
3712017
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
RK Konoth, E Vineti, V Moonsamy, M Lindorfer, C Kruegel, H Bos, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2342018
Mining permission patterns for contrasting clean and malicious android applications
V Moonsamy, J Rong, S Liu
Future Generation Computer Systems 36, 122-132, 2014
1472014
Evadedroid: A practical evasion attack on machine learning for black-box android malware detection
H Bostani, V Moonsamy
Computers & Security 139, 103676, 2024
852024
IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing
P Staat, S Mulzer, S Roth, V Moonsamy, M Heinrichs, R Kronberger, ...
IEEE Symposium on Security and Privacy (S&P), 2022
802022
Analysis of malicious and benign android applications
M Alazab, V Moonsamy, L Batten, P Lantz, R Tian
2012 32nd International Conference on Distributed Computing Systems …, 2012
802012
No free charge theorem: A covert channel via usb charging cable on mobile devices
R Spolaor, L Abudahi, V Moonsamy, M Conti, R Poovendran
International Conference on Applied Cryptography and Network Security, 83-102, 2017
602017
Less is More: A privacy-respecting Android malware classifier using federated learning
R Gálvez, V Moonsamy, C Diaz
Proceedings on Privacy Enhancing Technologies 4, 96-116, 2021
592021
New directions in IoT privacy using attribute-based authentication
G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, ...
Proceedings of the ACM International Conference on Computing Frontiers, 461-466, 2016
482016
“Those things are written by lawyers, and programmers are reading that.” Mapping the Communication Gap Between Software Developers and Privacy Experts
SA Horstmann, S Domiks, M Gutfleisch, M Tran, Y Acar, V Moonsamy, ...
Proceedings on Privacy Enhancing Technologies (PETS) 2024 (1), 151-170, 2024
432024
Towards an understanding of the impact of advertising on data leaks
V Moonsamy, M Alazab, L Batten
International journal of security and networks 7 (3), 181-193, 2012
412012
Feature reduction to speed up malware classification
V Moonsamy, R Tian, L Batten
Nordic Conference on Secure IT Systems, 176-188, 2011
372011
Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code
C Meijer, V Moonsamy, J Wetzels
30th USENIX Security Symposium (USENIX Security 21), 2021
282021
Instructions Unclear: Undefined Behaviour in Cellular Network Specifications
D Klischies, M Schloegel, T Scharnowski, M Bogodukhov, D Rupprecht, ...
32nd USENIX Security Symposium (USENIX Security 23), 3475--3492, 2023
252023
Malicious cryptocurrency miners: Status and Outlook
RK Konoth, R van Wegberg, V Moonsamy, H Bos
arXiv preprint arXiv:1901.10794, 2019
242019
Smartphone applications, malware and data theft
LM Batten, V Moonsamy, M Alazab
Computational Intelligence, Cyber Security and Computational Models …, 2015
202015
Mitigating man-in-the-middle attacks on smartphones–a discussion of SSL pinning and DNSSec
V Moonsamy, L Batten
202014
Efficient classification of android malware in the wild using robust static features
H Fereidooni, V Moonsamy, M Conti, L Batina
Protecting mobile networks and devices: challenges and solutions 1, 181-209, 2016
192016
Gamut: Sifting through Images to Detect Android Malware
J Gennissen, L Cavallaro, V Moonsamy, L Batina
182017
Targeted and Troublesome: Tracking and Advertising on Children's Websites
Z Moti, A Senol, H Bostani, FZ Borgesius, V Moonsamy, A Mathur, G Acar
Proceedings of the 45th IEEE Symposium on Security and Privacy (IEEE S&P 2024), 2024
172024
The system can't perform the operation now. Try again later.
Articles 1–20