default search action
Damien Octeau
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j4]Xiaoyu Sun, Li Li, Tegawendé F. Bissyandé, Jacques Klein, Damien Octeau, John C. Grundy:
Taming Reflection: An Essential Step Toward Whole-program Analysis of Android Apps. ACM Trans. Softw. Eng. Methodol. 30(3): 32:1-32:36 (2021)
2010 – 2019
- 2018
- [c14]Jinman Zhao, Aws Albarghouthi, Vaibhav Rastogi, Somesh Jha, Damien Octeau:
Neural-augmented static analysis of Android communication. ESEC/SIGSOFT FSE 2018: 342-353 - [i2]Jinman Zhao, Aws Albarghouthi, Vaibhav Rastogi, Somesh Jha, Damien Octeau:
Neural-Augmented Static Analysis of Android Communication. CoRR abs/1809.04059 (2018) - 2017
- [j3]Li Li, Tegawendé F. Bissyandé, Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein, Yves Le Traon:
Static analysis of android apps: A systematic literature review. Inf. Softw. Technol. 88: 67-95 (2017) - 2016
- [j2]Damien Octeau, Daniel Luchaup, Somesh Jha, Patrick D. McDaniel:
Composite Constant Propagation and its Application to Android Program Analysis. IEEE Trans. Software Eng. 42(11): 999-1014 (2016) - [c13]Li Li, Tegawendé F. Bissyandé, Damien Octeau, Jacques Klein:
DroidRA: taming reflection to support whole-program analysis of Android apps. ISSTA 2016: 318-329 - [c12]Li Li, Tegawendé F. Bissyandé, Damien Octeau, Jacques Klein:
Reflection-aware static analysis of Android apps. ASE 2016: 756-761 - [c11]Damien Octeau, Somesh Jha, Matthew L. Dering, Patrick D. McDaniel, Alexandre Bartel, Li Li, Jacques Klein, Yves Le Traon:
Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis. POPL 2016: 469-484 - [c10]Michael Backes, Sven Bugiel, Erik Derr, Patrick D. McDaniel, Damien Octeau, Sebastian Weisgerber:
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. USENIX Security Symposium 2016: 1101-1118 - 2015
- [j1]Basak Guler, Burak Varan, Kaya Tutuncuoglu, Mohamed S. Nafea, Ahmed A. Zewail, Aylin Yener, Damien Octeau:
Using Social Sensors for Influence Propagation in Networks With Positive and Negative Relationships. IEEE J. Sel. Top. Signal Process. 9(2): 360-373 (2015) - [c9]Damien Octeau, Daniel Luchaup, Matthew L. Dering, Somesh Jha, Patrick D. McDaniel:
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis. ICSE (1) 2015: 77-88 - [c8]Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick D. McDaniel:
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. ICSE (1) 2015: 280-291 - 2014
- [c7]Basak Guler, Burak Varan, Kaya Tutuncuoglu, Mohamed S. Nafea, Ahmed A. Zewail, Aylin Yener, Damien Octeau:
Optimal strategies for targeted influence in signed networks. ASONAM 2014: 906-911 - [c6]Basak Guler, Burak Varan, Kaya Tutuncuoglu, Mohamed S. Nafea, Ahmed A. Zewail, Aylin Yener, Damien Octeau:
Communicating in a socially-aware network: Impact of relationship types. GlobalSIP 2014: 788-792 - [c5]Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, Patrick D. McDaniel:
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. PLDI 2014: 259-269 - [c4]Wenhui Hu, Damien Octeau, Patrick D. McDaniel, Peng Liu:
Duet: library integrity verification for android applications. WISEC 2014: 141-152 - [i1]Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick D. McDaniel:
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis. CoRR abs/1404.7431 (2014) - 2013
- [c3]Damien Octeau, Patrick D. McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein, Yves Le Traon:
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis. USENIX Security Symposium 2013: 543-558 - 2012
- [c2]Damien Octeau, Somesh Jha, Patrick D. McDaniel:
Retargeting Android applications to Java bytecode. SIGSOFT FSE 2012: 6 - 2011
- [c1]William Enck, Damien Octeau, Patrick D. McDaniel, Swarat Chaudhuri:
A Study of Android Application Security. USENIX Security Symposium 2011
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint