| Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices R Spreitzer, V Moonsamy, T Korak, S Mangard IEEE Communications Surveys & Tutorials, 2017 | 371 | 2017 |
| MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense RK Konoth, E Vineti, V Moonsamy, M Lindorfer, C Kruegel, H Bos, ... Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 234 | 2018 |
| Mining permission patterns for contrasting clean and malicious android applications V Moonsamy, J Rong, S Liu Future Generation Computer Systems 36, 122-132, 2014 | 147 | 2014 |
| Evadedroid: A practical evasion attack on machine learning for black-box android malware detection H Bostani, V Moonsamy Computers & Security 139, 103676, 2024 | 85 | 2024 |
| IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing P Staat, S Mulzer, S Roth, V Moonsamy, M Heinrichs, R Kronberger, ... IEEE Symposium on Security and Privacy (S&P), 2022 | 80 | 2022 |
| Analysis of malicious and benign android applications M Alazab, V Moonsamy, L Batten, P Lantz, R Tian 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 80 | 2012 |
| No free charge theorem: A covert channel via usb charging cable on mobile devices R Spolaor, L Abudahi, V Moonsamy, M Conti, R Poovendran International Conference on Applied Cryptography and Network Security, 83-102, 2017 | 60 | 2017 |
| Less is More: A privacy-respecting Android malware classifier using federated learning R Gálvez, V Moonsamy, C Diaz Proceedings on Privacy Enhancing Technologies 4, 96-116, 2021 | 59 | 2021 |
| New directions in IoT privacy using attribute-based authentication G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, ... Proceedings of the ACM International Conference on Computing Frontiers, 461-466, 2016 | 48 | 2016 |
| “Those things are written by lawyers, and programmers are reading that.” Mapping the Communication Gap Between Software Developers and Privacy Experts SA Horstmann, S Domiks, M Gutfleisch, M Tran, Y Acar, V Moonsamy, ... Proceedings on Privacy Enhancing Technologies (PETS) 2024 (1), 151-170, 2024 | 43 | 2024 |
| Towards an understanding of the impact of advertising on data leaks V Moonsamy, M Alazab, L Batten International journal of security and networks 7 (3), 181-193, 2012 | 41 | 2012 |
| Feature reduction to speed up malware classification V Moonsamy, R Tian, L Batten Nordic Conference on Secure IT Systems, 176-188, 2011 | 37 | 2011 |
| Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code C Meijer, V Moonsamy, J Wetzels 30th USENIX Security Symposium (USENIX Security 21), 2021 | 28 | 2021 |
| Instructions Unclear: Undefined Behaviour in Cellular Network Specifications D Klischies, M Schloegel, T Scharnowski, M Bogodukhov, D Rupprecht, ... 32nd USENIX Security Symposium (USENIX Security 23), 3475--3492, 2023 | 25 | 2023 |
| Malicious cryptocurrency miners: Status and Outlook RK Konoth, R van Wegberg, V Moonsamy, H Bos arXiv preprint arXiv:1901.10794, 2019 | 24 | 2019 |
| Smartphone applications, malware and data theft LM Batten, V Moonsamy, M Alazab Computational Intelligence, Cyber Security and Computational Models …, 2015 | 20 | 2015 |
| Mitigating man-in-the-middle attacks on smartphones–a discussion of SSL pinning and DNSSec V Moonsamy, L Batten | 20 | 2014 |
| Efficient classification of android malware in the wild using robust static features H Fereidooni, V Moonsamy, M Conti, L Batina Protecting mobile networks and devices: challenges and solutions 1, 181-209, 2016 | 19 | 2016 |
| Gamut: Sifting through Images to Detect Android Malware J Gennissen, L Cavallaro, V Moonsamy, L Batina | 18 | 2017 |
| Targeted and Troublesome: Tracking and Advertising on Children's Websites Z Moti, A Senol, H Bostani, FZ Borgesius, V Moonsamy, A Mathur, G Acar Proceedings of the 45th IEEE Symposium on Security and Privacy (IEEE S&P 2024), 2024 | 17 | 2024 |