Works Published in 2014

search works

Displaying works 1 - 20 of 221 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2014 book

Accuracy of service area estimation methods used for critical infrastructure recovery

In IFIP Advances in Information and Communication Technology (Vol. 441, pp. 173–191). http://www.scopus.com/inward/record.url?eid=2-s2.0-84908286528&partnerID=MN8TOARS

By: O. Pala, D. Wilson, R. Bent, S. Linger & J. Arnold

Contributors: O. Pala, D. Wilson, R. Bent, S. Linger & J. Arnold

Source: ORCID
Added: January 25, 2024

2014 conference paper

Tutorial: Text Analytics for Security

Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 1540–1541.

By: W. Enck & T. Xie

Event: ACM

Source: ORCID
Added: January 2, 2024

2014 conference paper

PREC: practical root exploit containment for android devices

Proceedings of the 4th ACM conference on Data and application security and privacy, 187–198.

By: T. Ho, D. Dean, X. Gu & W. Enck

Event: ACM

Source: ORCID
Added: January 2, 2024

2014 conference paper

SEER: practical memory virus scanning as a service

Proceedings of the 30th Annual Computer Security Applications Conference, 186–195.

By: J. Gionta, A. Azab, W. Enck, P. Ning & X. Zhang

Event: ACM

Source: ORCID
Added: January 2, 2024

2014 conference paper

NativeWrap: ad hoc smartphone application creation for end users

Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, 13–24.

By: A. Nadkarni, V. Tendulkar & W. Enck

Event: ACM

Source: ORCID
Added: January 2, 2024

2014 conference paper

Modeling and sensing risky user behavior on mobile devices

Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 33.

By: Q. Liu, J. Bae, B. Watson, A. McLaughhlin & W. Enck

Event: ACM

Source: ORCID
Added: January 2, 2024

2014 conference paper

Insecure behaviors on mobile devices under stress

Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 31.

By: A. Davis, A. Shashidharan, Q. Liu, W. Enck, A. McLaughlin & B. Watson

Event: ACM

Source: ORCID
Added: January 2, 2024

2014 conference paper

Improving mobile application security via bridging user expectations and application behaviors

Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 32.

By: W. Yang, X. Xiao, R. Pandita, W. Enck & T. Xie

Event: ACM

Source: ORCID
Added: January 2, 2024

2014 report

GraphAudit: Privacy Auditing for Massive Graph Mining

North Carolina State University. Dept. of Computer Science.

By: A. Nadkarni, A. Sheth, U. Weinsberg, N. Taft & W. Enck

Source: ORCID
Added: January 2, 2024

2014 conference paper

Dacsa: A decoupled architecture for cloud security analysis

Proceedings of the 7th Workshop on Cyber Security Experimentation and Test.

By: J. Gionta, A. Azab, W. Enck, P. Ning & X. Zhang

Source: ORCID
Added: January 2, 2024

2014 journal article

An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities

ArXiv Preprint ArXiv:1410.7745.

By: V. Tendulkar & W. Enck

Source: ORCID
Added: January 2, 2024

2014 conference paper

ASM: A Programmable Interface for Extending Android Security.

USENIX Security Symposium, 1005–1019.

By: S. Heuser, A. Nadkarni, W. Enck & A. Sadeghi

Source: ORCID
Added: January 2, 2024

2014 conference paper

${$ASM$}$: A Programmable Interface for Extending Android Security

23rd USENIX Security Symposium (USENIX Security 14), 1005–1019.

By: S. Heuser, A. Nadkarni, W. Enck & A. Sadeghi

Source: ORCID
Added: January 2, 2024

2014 journal article

Spectrum Assignment in Optical Networks: A Multiprocessor Scheduling Perspective

Journal of Optical Communications and Networking, 6(8), 754.

By: S. Talebi, E. Bampis*, G. Lucarelli*, I. Katib* & G. Rouskas*

TL;DR: This work shows that the spectrum assignment (SA) problem in mesh networks transforms to the problem of scheduling multiprocessor tasks on dedicated processors, and develops new constant-ratio approximation algorithms for the SA problem in chains when the number of links is fixed. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: June 26, 2023

2014 conference paper

Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, HVC 2014, Haifa, Israel, November 18-20, 2014. Proceedings

Marcelo D'Amorim

Ed(s): E. Yahav

Source: ORCID
Added: June 21, 2023

2014 conference paper

Compositional solution space quantification for probabilistic software analysis

ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '14, Edinburgh, United Kingdom - June 09 - 11, 2014, 123–132.

By: M. Borges*, A. Filieri*, M. d’Amorim*, C. Pasareanu & W. Visser*

TL;DR: This work presents a compositional statistical approach for the efficient quantification of solution spaces for arbitrarily complex constraints over bounded floating-point domains that leverages interval constraint propagation to improve the accuracy of the estimation by focusing the sampling on the regions of the input domain containing the sought solutions. (via Semantic Scholar)
Source: ORCID
Added: June 21, 2023

2014 conference paper

A Comparative Study of Incremental Constraint Solving Approaches in Symbolic Execution

Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, HVC 2014, Haifa, Israel, November 18-20, 2014. Proceedings, 284–299.

By: T. Liu*, M. Araújo*, M. d’Amorim* & M. Taghdiri*

TL;DR: Results suggest that tools should take advantage of incremental solving support from modern SMT solvers and researchers should look for ways to combine stack- and cache-based approaches to reduce execution cost even further. (via Semantic Scholar)
Source: ORCID
Added: June 21, 2023

2014 conference paper

Quantifying information leaks using reliability analysis

2014 International Symposium on Model Checking of Software, SPIN 2014, Proceedings, San Jose, CA, USA, July 21-23, 2014, 105–108.

By: Q. Phan*, P. Malacaria*, C. Pasareanu* & M. d’Amorim*

TL;DR: A novel application of the reliability analysis technique, namely Quantitative Information Flow analysis (QIF), is reported on, to measure information leakage of a program by using information-theoretic metrics such as Shannon entropy or Renyi entropy. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: ORCID
Added: June 21, 2023

2014 journal article

Efficient static checker for tainted variable attacks

Sci. Comput. Program., 80, 91–105.

By: A. Rimsa*, M. d’Amorim*, F. Pereira* & R. Silva Bigonha*

TL;DR: This paper gives an O(V^2) solution to the problem of detecting tainted flow attacks as an instance of type-checking, and uses Bodik et al.'s extended Static Single Assignment (e-SSA) program representation. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: ORCID
Added: June 21, 2023

2014 conference paper

ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '14, Edinburgh, United Kingdom - June 09 - 11, 2014

http://dl.acm.org/citation.cfm?id=2594291

Marcelo D'Amorim

Ed(s): M. O’Boyle & K. Pingali

Source: ORCID
Added: June 21, 2023

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.