A. Ali-Gombe
Cited by
Cited by
Aspectdroid: Android app analysis system
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming
AI Ali-Gombe, B Saltaformaggio, D Xu, GG Richard III
computers & security 73, 235-248, 2018
Opseq: Android malware fingerprinting
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-12, 2015
Memory forensics and the windows subsystem for linux
N Lewis, A Case, A Ali-Gombe, GG Richard III
Digital Investigation 26, S3-S11, 2018
“Tipped Off by Your Memory Allocator”: Device-Wide User Activity Sequencing from Android Memory Images
R Bhatia, B Saltaformaggio, SJ Yang, A Ali-Gombe, X Zhang, D Xu, ...
{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction
A Ali-Gombe, S Sudhakaran, A Case, GG Richard III
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
HookTracer: A system for automated and accessible API hooks analysis
A Case, MM Jalalzai, M Firoz-Ul-Amin, RD Maggio, A Ali-Gombe, M Sun, ...
Digital Investigation 29, S104-S112, 2019
Hooktracer: Automatic detection and analysis of keystroke loggers using memory forensics
A Case, RD Maggio, M Firoz-Ul-Amin, MM Jalalzai, A Ali-Gombe, M Sun, ...
Computers & Security 96, 101872, 2020
Robust fingerprinting for relocatable code
I Ahmed, V Roussev, A Ali Gombe
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
Volatile Memory Message Carving: A" per process basis" Approach
AI Ali-Gombe
Cross-platform malware: study of the forthcoming hazard adaptation and behavior
B Zahran, S Nicholson, A Ali-Gombe
Proceedings of the International Conference on Security and Management (SAM …, 2019
Don't touch that column: Portable, fine-grained access control for android's native content providers
A Ali-Gombe, GG Richard III, I Ahmed, V Roussev
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
IIoT-ARAS: IIoT/ICS Automated Risk Assessment System for Prediction and Prevention
B Zahran, A Hussaini, A Ali-Gombe
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
App-agnostic post-execution semantic analysis of Android in-memory forensics artifacts
A Ali-Gombe, A Tambaoan, A Gurfolino, GG Richard III
Annual Computer Security Applications Conference, 28-41, 2020
AmpleDroid Recovering Large Object Files from Android Application Memory
S Sudhakaran, A Ali-Gombe, A Orgah, A Case, GG Richard III
IEEE International Workshop on Information Forensics and Security (IEEE …, 2020
Intent-Aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps
MR Rahman, E Miller, M Hossain, A Ali-Gombe
arXiv preprint arXiv:2202.06995, 2022
Digital Investigation and the Trojan Defense, Revisited
GG Richard, A Case, M Manna, EAM Hahne, A Ali-Gombe
Crime Science and Digital Forensics, 67-84, 2021
Modern macOS userland runtime analysis
M Manna, A Case, A Ali-Gombe, GG Richard III
Forensic Science International: Digital Investigation 38, 301221, 2021
Seance: Divination of Tool-Breaking Changes in Forensically Important Binaries
RD Maggio, A Case, A Ali-Gombe, GG Richard III
DFRWS USA 2021, 2021
Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications
AI Ali-Gombe
The system can't perform the operation now. Try again later.
Articles 1–20