For an updated list, see my Google Scholar profile.
[27] |
[26] |
[25] |
[24] |
[23] |
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
In Black Hat USA,
Las Vegas, NV,
July, 2017,
[PDF] [BibTeX] [Website & Demos] [Slides] [Talk]
|
[22] |
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
In Proceedings of the IEEE Symposium on Security and Privacy (S&P),
San Jose, CA,
May, 2017,
Distinguished Practical Paper Award at IEEE Security & Privacy 2017 [PDF] [BibTeX] [Website & Demos] [Slides] [Talk] [Press: NewsWeek, TechCrunch, The Register, Others] |
[21] |
[20] |
[19] |
[18] |
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
In Proceedings of the ACM Conference on Computer and Communications Security (CCS),
Vienna, Austria,
October, 2016,
Pwnie Award for Best Privilege Escalation Bug 2017 [PDF] [BibTeX] [Project Website] [Press: SlashDot, WIRED, Ars Technica, Others] |
[17] |
[16] |
[15] |
[14] |
[13] |
[12] |
[11] |
[10] |
[9] |
[8] |
[7] |
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework
In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS),
San Diego, CA,
February, 2015,
[PDF] [BibTeX] [Project Website]
|
[6] |
Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors
In Proceedings of the International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS),
Wroclaw, Poland,
September, 2014,
[PDF] [BibTeX] [Project Website]
|
[5] |
Ten Years of iCTF: The Good, The Bad, and The Ugly
In Proceedings of the USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE),
San Diego, CA,
August, 2014,
[PDF] [BibTeX] [Project Website]
|
[4] |
Andrubis: Android Malware Under The Magnifying Glass
In Technical Report TR-ISECLAB-0414-001,
,
May, 2014,
[PDF] [BibTeX] [Project Website]
|
[3] |
[2] |
[1] |
© 2018 Yanick Fratantonio