Follow
Jordan Samhi
Jordan Samhi
CISPA – Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode
N Daoudi, J Samhi, AK Kabore, K Allix, TF Bissyandé, J Klein
Deployable Machine Learning for Security Defense: Second International …, 2021
372021
Raicc: Revealing atypical inter-component communication in android apps
J Samhi, A Bartel, TF Bissyandé, J Klein
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
322021
Jucify: A step towards android code unification for enhanced static analysis
J Samhi, J Gao, N Daoudi, P Graux, H Hoyez, X Sun, K Allix, ...
Proceedings of the 44th International Conference on Software Engineering …, 2022
302022
A first look at Android applications in Google Play related to COVID-19
J Samhi, K Allix, TF Bissyandé, J Klein
Empirical Software Engineering 26, 1-49, 2021
202021
Difuzer: Uncovering suspicious hidden sensitive operations in android apps
J Samhi, L Li, TF Bissyandé, J Klein
Proceedings of the 44th International Conference on Software Engineering …, 2022
182022
On the (in) effectiveness of static logic bomb detection for android apps
J Samhi, A Bartel
IEEE Transactions on Dependable and Secure Computing 19 (6), 3822-3836, 2021
92021
Demystifying hidden sensitive operations in android apps
X Sun, X Chen, L Li, H Cai, J Grundy, J Samhi, T Bissyandé, J Klein
ACM Transactions on Software Engineering and Methodology 32 (2), 1-30, 2023
52023
TriggerZoo: a dataset of android applications automatically infected with logic bombs
J Samhi, TF Bissyandé, J Klein
Proceedings of the 19th International Conference on Mining Software …, 2022
42022
Negative results of fusing code and documentation for learning to accurately identify sensitive source and sink methods: An application to the android framework for data leak …
J Samhi, M Kober, AK Kabore, S Arzt, TF Bissyandé, J Klein
2023 IEEE International Conference on Software Analysis, Evolution and …, 2023
32023
Revisiting android app categorization
M Alecci, J Samhi, TF Bissyandé, J Klein
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
22024
Sensitive and Personal Data: What Exactly Are You Talking About?
M Kober, J Samhi, S Arzt, TF Bissyandé, J Klein
2023 IEEE/ACM 10th International Conference on Mobile Software Engineering …, 2023
12023
Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods
J Samhi, M Kober, AK Kabore, S Arzt, TF Bissyandé, J Klein
2023 30th edition of the IEEE International Conference on Software Analysis …, 2023
12023
AndroLog: Android Instrumentation and Code Coverage Analysis
J Samhi, A Zeller
arXiv preprint arXiv:2404.11223, 2024
2024
AndroLibZoo: A Reliable Dataset of Libraries Based on Software Dependency Analysis
J Samhi, TF Bissyandé, J Klein
Mining Software Repositories, 2024
2024
ChatGPT vs LLaMA: Impact, Reliability, and Challenges in Stack Overflow Discussions
L Da Silva, J Samhi, F Khomh
arXiv preprint arXiv:2402.08801, 2024
2024
Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection
M Alecci, J Samhi, L Li, TF Bissyandé, J Klein
IEEE Transactions on Dependable and Secure Computing, 2024
2024
A Dataset of Android Libraries
J Samhi, M Alecci, TF Bissyandé, J Klein
arXiv preprint arXiv:2307.12609, 2023
2023
USB Drop Attacks
J Samhi
Multi-System & Internet Security Cookbook 126, 2023
2023
Cryptojacking
J Samhi
Multi-System & Internet Security Cookbook 126, 2023
2023
Analyzing the Unanalyzable: an Application to Android Apps
J Samhi
Unilu-University of Luxembourg, Luxembourg, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20