Reducing combinatorics in GUI testing of android applications N Mirzaei, J Garcia, H Bagheri, A Sadeghi, S Malek Proceedings of the 38th International Conference on Software Engineering …, 2016 | 168 | 2016 |
Covert: Compositional analysis of android inter-app permission leakage H Bagheri, A Sadeghi, J Garcia, S Malek IEEE transactions on Software Engineering 41 (9), 866-886, 2015 | 166 | 2015 |
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software A Sadeghi, H Bagheri, J Garcia, S Malek IEEE Transactions on Software Engineering 43 (6), 492-530, 2016 | 160 | 2016 |
Sig-droid: Automated system input generation for android applications N Mirzaei, H Bagheri, R Mahmood, S Malek 2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015 | 95 | 2015 |
Energy-aware test-suite minimization for android apps R Jabbarvand, A Sadeghi, H Bagheri, S Malek Proceedings of the 25th International Symposium on Software Testing and …, 2016 | 71 | 2016 |
A formal approach for detection of security flaws in the android permission system H Bagheri, E Kang, S Malek, D Jackson Formal Aspects of Computing 30, 525-544, 2018 | 65 | 2018 |
Scalable analysis of interaction threats in iot systems M Alhanahnah, C Stevens, H Bagheri Proceedings of the 29th ACM SIGSOFT international symposium on software …, 2020 | 57 | 2020 |
Practical, formal synthesis and automatic enforcement of security policies for android H Bagheri, A Sadeghi, R Jabbarvand, S Malek 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 57 | 2016 |
Analysis of android inter-app security vulnerabilities using covert A Sadeghi, H Bagheri, S Malek 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015 | 55 | 2015 |
Detection of design flaws in the android permission protocol through bounded verification H Bagheri, E Kang, S Malek, D Jackson FM 2015: Formal Methods: 20th International Symposium, Oslo, Norway, June 24 …, 2015 | 55 | 2015 |
Big Data: challenges, opportunities and Cloud based solutions H Bagheri, AA Shaltooki International Journal of Electrical and Computer Engineering 5 (2), 340, 2015 | 54 | 2015 |
A temporal permission analysis and enforcement framework for android A Sadeghi, R Jabbarvand, N Ghorbani, H Bagheri, S Malek Proceedings of the 40th International Conference on Software Engineering …, 2018 | 45 | 2018 |
A study on the role of software architecture in the evolution and quality of software E Kouroshfar, M Mirakhorli, H Bagheri, L Xiao, S Malek, Y Cai 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 246-257, 2015 | 44 | 2015 |
Software architectural principles in contemporary mobile software: from conception to practice H Bagheri, J Garcia, A Sadeghi, S Malek, N Medvidovic Journal of Systems and Software 119, 31-44, 2016 | 43 | 2016 |
Sentiment analysis of twitter data H Bagheri, MJ Islam arXiv preprint arXiv:1711.10377, 2017 | 40 | 2017 |
Parallel optical interconnects for enterprise class server clusters: Needs and technology solutions J Trezza, H Hamster, J Iamartino, H Bagheri, C DeCusatis IEEE Communications Magazine 41 (2), S36-S42, 2003 | 32 | 2003 |
Trademaker: Automated dynamic analysis of synthesized tradespaces H Bagheri, C Tang, K Sullivan Proceedings of the 36th International Conference on Software Engineering …, 2014 | 31 | 2014 |
Monarch: Model-based development of software architectures H Bagheri, K Sullivan Model Driven Engineering Languages and Systems: 13th International …, 2010 | 31 | 2010 |
Titanium: efficient analysis of evolving alloy specifications H Bagheri, S Malek Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 29 | 2016 |
Determination and enforcement of least-privilege architecture in android M Hammad, H Bagheri, S Malek 2017 IEEE international conference on software architecture (ICSA), 59-68, 2017 | 26 | 2017 |