Cited By
View all- Lesani M(2024)Vulnerability Flow Type Systems2024 IEEE Security and Privacy Workshops (SPW)10.1109/SPW63631.2024.00020(157-168)Online publication date: 23-May-2024
- Hu X(2024)TySA: Enforcing Security Policies for Safeguarding Against Permission-Induced Attacks in Android ApplicationsIEEE Access10.1109/ACCESS.2024.348785212(165026-165041)Online publication date: 2024
- Liu CWang HLiu TGu DMa YWang HXiao XDwyer MDamian DZeller A(2022)ProMalProceedings of the 44th International Conference on Software Engineering10.1145/3510003.3510037(1755-1767)Online publication date: 21-May-2022
- Show More Cited By