AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale C Gibler, J Crussell, J Erickson, H Chen Trust and Trustworthy Computing, 291-307, 2012 | 875 | 2012 |
Attack of the clones: Detecting cloned applications on android markets J Crussell, C Gibler, H Chen Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 414 | 2012 |
Investigating User Privacy in Android Ad Libraries R Stevens, C Gibler, J Crussell, J Erickson, H Chen Workshop on Mobile Security Technologies (MoST), 2012 | 296 | 2012 |
Andarwin: Scalable detection of semantically similar android applications J Crussell, C Gibler, H Chen Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 272* | 2013 |
Madfraud: Investigating ad fraud in android applications J Crussell, R Stevens, H Chen Proceedings of the 12th annual international conference on Mobile systems …, 2014 | 219 | 2014 |
Adrob: Examining the landscape and impact of android application plagiarism C Gibler, R Stevens, J Crussell, H Chen, H Zang, H Choi Proceeding of the 11th annual international conference on Mobile systems …, 2013 | 138 | 2013 |
Malware detection and analysis K Chiang, L Lloyd, J Crussell, B Sanders, JL Erickson, DJ Fritz US Patent 9,294,486, 2016 | 119 | 2016 |
Andarwin: Scalable detection of android application clones based on semantics J Crussell, C Gibler, H Chen IEEE Transactions on Mobile Computing 14 (10), 2007-2019, 2014 | 79 | 2014 |
Attacking dbscan for fun and profit J Crussell, P Kegelmeyer Proceedings of the 2015 SIAM International Conference on Data Mining, 235-243, 2015 | 17 | 2015 |
Virtually the same: Comparing physical and virtual testbeds J Crussell, TM Kroeger, A Brown, C Phillips 2019 International Conference on Computing, Networking and Communications …, 2019 | 16 | 2019 |
Exploration of multifidelity UQ sampling strategies for computer network applications G Geraci, J Crussell, LP Swiler, BJ Debusschere International Journal for Uncertainty Quantification 11 (1), 2021 | 14 | 2021 |
Lessons learned from 10k experiments to compare virtual and physical testbeds J Crussell, TM Kroeger, D Kavaler, A Brown, C Phillips 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019 | 6 | 2019 |
Exploration of multifidelity approaches for uncertainty quantification in network applications. G Geraci, LP Swiler, J Crussell, B Debusschere Sandia National Lab.(SNL-NM), Albuquerque, NM (United States); Sandia …, 2019 | 4 | 2019 |
On the origin of mobile apps: Network provenance for android applications R Stevens, J Crussell, H Chen Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 3 | 2016 |
Scalable Semantics-Based Detection of Similar Android Apps: Design, Implementation, and Applications J Crussell University of California, Davis, 2014 | 2 | 2014 |
Virtually the Same? The Empirical Differences Between Physical and Virtual Networks. J Crussell, TM Kroeger, A Brown, CA Phillips Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2017 | 1 | 2017 |
MAdFraud J Crussell, R Stevens, H Chen Proceedings of the 12th annual international conference on Mobile systems …, 2014 | 1 | 2014 |
QUE LDRD Tools J Crussell, T Kroeger, A Brown, D Kavaler Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2020 | | 2020 |
Automated Discovery for Emulytics J Crussell, D Fritz, V Urias arXiv preprint arXiv:2003.11143, 2020 | | 2020 |
Uncertainty Quantification in Cyber Emulation. LP Swiler, G Geraci, B Debusschere, J Crussell Sandia National Lab.(SNL-NM), Albuquerque, NM (United States); Sandia …, 2019 | | 2019 |