Luke Deshotels
Cited by
Cited by
Droidlegacy: Automated familial classification of android malware
L Deshotels, V Notani, A Lakhotia
Proceedings of ACM SIGPLAN on program protection and reverse engineering …, 2014
Inaudible Sound as a Covert Channel in Mobile Devices
L Deshotels
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
A study of security isolation techniques
R Shu, P Wang, SA Gorski III, B Andow, A Nadkarni, L Deshotels, J Gionta, ...
ACM Computing Surveys (CSUR) 49 (3), 1-37, 2016
Sandscout: Automatic detection of flaws in ios sandbox profiles
L Deshotels, R Deaconescu, M Chiroiu, L Davi, W Enck, AR Sadeghi
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Program Structure-Based Feature Selection for Android Malware Analysis
A Walenstein, L Deshotels, A Lakhotia
4th International Conference on Security and Privacy in Mobile Information …, 2012
Kobold: Evaluating decentralized access control for remote NSXPC methods on iOS
L Deshotels, C Carabas, J Beichler, R Deaconescu, W Enck
2020 IEEE Symposium on Security and Privacy (SP), 1056-1070, 2020
iOracle: Automated evaluation of access control policies in iOS
L Deshotels, R Deaconescu, C Carabas, I Manda, W Enck, M Chiroiu, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Sandblaster: Reversing the apple sandbox
R Deaconescu, L Deshotels, M Bucicoiu, W Enck, L Davi, AR Sadeghi
arXiv preprint arXiv:1608.04303, 2016
Automated Evaluation of Access Control in the iPhone Operating System
LA Deshotels
North Carolina State University, 2018
Application and Evaluation of Artificial Intelligence Algorithms for StarCraft
L Deshotels
Algorithmic and Architectural Gaming Design: Implementation and Development …, 2012
iOS Security Framework: Understanding the Security of Mobile Phone Platforms
W Enck, R Deaconescu, M Chiroiu, L Deshotels
The system can't perform the operation now. Try again later.
Articles 1–11