Transcend: Detecting concept drift in malware classification models R Jordaney, K Sharad, SK Dash, Z Wang, D Papini, I Nouretdinov, ... 26th USENIX security symposium (USENIX security 17), 625-642, 2017 | 354 | 2017 |
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware G Suarez-Tangil, SK Dash, M Ahmadi, J Kinder, G Giacinto, L Cavallaro Conference on Data and Application Security and Privacy, 2017 | 313 | 2017 |
Droidscribe: Classifying android malware based on runtime behavior SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ... 2016 IEEE Security and Privacy Workshops (SPW), 252-261, 2016 | 216 | 2016 |
Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware M Hurier, G Suarez-Tangil, SK Dash, TF Bissyandé, Y Le Traon, J Klein, ... Mining Software Repositories (MSR), 2017 | 128 | 2017 |
Prescience: Probabilistic guidance on the retraining conundrum for malware detection A Deo, SK Dash, G Suarez-Tangil, V Vovk, L Cavallaro Proceedings of the 2016 ACM workshop on artificial intelligence and security …, 2016 | 50 | 2016 |
A Theory of Dual Channel Constraints C Casalnuovo, ET Barr, SK Dash, P Devanbu Proceedings of the 42nd International Conference on Software Engineering …, 2020 | 41 | 2020 |
RefiNym: Using Names to Refine Types SK Dash, M Allamanis, ET Barr Foundations of Software Engineering (FSE), 2018 | 40 | 2018 |
Deep learning to detect redundant method comments A Louis, SK Dash, ET Barr, C Sutton arXiv preprint arXiv:1806.04616, 2018 | 24 | 2018 |
Flexeme: Untangling Commits Using Lexical Flows PP Pârtachi, SK Dash, M Allamanis, ET Barr Foundations of Software Engineering (FSE), 2020 | 22 | 2020 |
POSIT: Simultaneously Tagging Natural and Programming Languages PP Partachi, SK Dash, C Treude, ET Barr 42nd International Conference on Software Engineering (ICSE'20), 2020 | 15 | 2020 |
Where should I comment my code? A dataset and model for predicting locations that need comments A Louis, SK Dash, ET Barr, MD Ernst, C Sutton 42nd International Conference on Software Engineering (ICSE'20), New Ideas …, 2020 | 12 | 2020 |
A scalable approach to computing representative lowest common ancestor in directed acyclic graphs SK Dash, SB Scholz, S Herhut, B Christianson Theoretical Computer Science 513, 25-37, 2013 | 12 | 2013 |
Instruction cache tuning for embedded multitasking applications SK Dash, T Srikanthan IET computers & digital techniques 4 (6), 439-457, 2010 | 11 | 2010 |
Anomaly‐based exploratory analysis and detection of exploits in android mediaserver G Suárez‐Tangil, SK Dash, P García‐Teodoro, J Camacho, L Cavallaro IET Information Security 12 (5), 404-413, 2018 | 8 | 2018 |
Rapid estimation of instruction cache hit rates using loop profiling SK Dash, T Srikanthan 2008 International Conference on Application-Specific Systems, Architectures …, 2008 | 5 | 2008 |
MSR 2017 A Rahman, A Swidan, A Meyer, B Li, B Aloraini, CG Gavidia, C Theisen, ... | 5 | |
Do Names Echo Semantics? A Large-Scale Study of Identifiers Used in C++'s Named Casts CC Petrescu, S Smith, G Rafail, SK Dash Journal of Systems and Software, 2023 | 4 | 2023 |
AWSomePy: a dataset and characterization of serverless applications G Raffa, JB Alis, D O'Keeffe, SK Dash Proceedings of the 1st Workshop on SErverless Systems, Applications and …, 2023 | 3 | 2023 |
Genetic Optimisation of C++ Applications R Giavrimis, A Butler, CC Petrescu, M Basios, SK Dash Automated Software Engineering (ASE'21), Late Breaking Results (LBR), 2021 | 3 | 2021 |
Classifying android malware based on runtime behavior SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ... Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016 | 2 | 2016 |