This web page contains links to postscript versions of papers that may be covered by copyright (e.g., ACM Copyright).
  1. Fang Liu, Haipeng Cai, gang Wang, Danfeng Yao, and Babara G. Ryder, "MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communications Risks", Proceedings of the 2017 Mobile Security Technologies Workshop (MoST), july, 2017.

    Note: © Copyright 2016 IEEE Computer Society.

  2. Xu, Kui, Tian, Ke, Yao, Danfeng and Ryder, Barbara G., "A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity", Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), May, 2016.

    Local

    Note: © Copyright 2016 IEEE Computer Society.

  3. Tien, Ke, Yao, Danfeng, Ryder, Barbara G., and Tan, Gang, "Analysis of Internal Code Heterogeneity for High-Precision Classification of Repackaged Malware", Proceedings of the Mobile Security Technologies Workshop (MoST), May, 2016.

    Local

    Note: © Copyright 2016 IEEE Computer Society.

  4. Xiaokui Shu, Danfeng Yao, and Barbara Ryder, "A Formal Framework for Program Anomaly Detection", Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), November, 2015.

    Local

    Digital Library

    Note: © Copyright 2015 Springer.

  5. Kui Xu and Danfeng Yao and Barbara G. Ryder and Ke Tian, "Probabilistic Program Modeling for High Precision Anomaly Classification", Proceedings of the Computer Security Foundations Symposium, July, 2015.

    Local

    Digital Library

    Note: © Copyright 2015 IEEE Computer Society.

  6. Karim O. Elish and Danfeng Yao and Barbara G. Ryder, "Static Characterization of Pairwise Android Inter-component Communications for Collusion Detection", Proceedings of the Mobile Security Technologies (MoST), May, 2015.

    Note: © Copyright 2015 IEEE Computer Society.

  7. Karim O. Elish and Danfeng Yao and Barbara G. Ryder, "Profiling User-trigger Dependence for Android Malware Detection", Computers and Society, February, 2015.

    Local

    Digital Library

    Note: © Copyright 2015 Elsevier.

  8. Karim O. Elish and Danfeng Yao and Barbara G. Ryder, "User-centric Dependence Analysis for Identifying Malicious Mobile Apps", Mobile Security Technologies workshop, October, 2012.

    Local

    Note: © Copyright 2012 IEEE.