A. Ali-Gombe
Title
Cited by
Cited by
Year
Aspectdroid: Android app analysis system
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
322016
Opseq: Android malware fingerprinting
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-12, 2015
302015
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming
AI Ali-Gombe, B Saltaformaggio, D Xu, GG Richard III
computers & security 73, 235-248, 2018
252018
“Tipped Off by Your Memory Allocator”: Device-Wide User Activity Sequencing from Android Memory Images
R Bhatia, B Saltaformaggio, SJ Yang, A Ali-Gombe, X Zhang, D Xu, ...
142018
DroidScraper: a tool for Android in-memory object recovery and reconstruction
A Ali-Gombe, S Sudhakaran, A Case, GG Richard III
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
102019
Memory forensics and the windows subsystem for linux
N Lewis, A Case, A Ali-Gombe, GG Richard III
Digital Investigation 26, S3-S11, 2018
92018
Robust fingerprinting for relocatable code
I Ahmed, V Roussev, A Ali Gombe
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
82015
HookTracer: A System for Automated and Accessible API Hooks Analysis
A Case, MM Jalalzai, M Firoz-Ul-Amin, RD Maggio, A Ali-Gombe, M Sun, ...
Digital Investigation 29, S104-S112, 2019
72019
Volatile Memory Message Carving: A" per process basis" Approach
AI Ali-Gombe
62012
Hooktracer: Automatic detection and analysis of keystroke loggers using memory forensics
A Case, RD Maggio, M Firoz-Ul-Amin, MM Jalalzai, A Ali-Gombe, M Sun, ...
Computers & Security 96, 101872, 2020
32020
Don't touch that column: Portable, fine-grained access control for android's native content providers
A Ali-Gombe, GG Richard III, I Ahmed, V Roussev
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
32016
App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts
A Ali-Gombe, A Tambaoan, A Gurfolino, GG Richard III
Annual Computer Security Applications Conference, 28-41, 2020
22020
Cross-Platform Malware: Study of the Forthcoming Hazard Adaptation and Behavior
B Zahran, S Nicholson, A Ali-gombe
Proceedings of the International Conference on Security and Management (SAM …, 2019
22019
AmpleDroid Recovering Large Object Files from Android Application Memory
S Sudhakaran, A Ali-Gombe, A Orgah, A Case, GG Richard III
IEEE International Workshop on Information Forensics and Security (IEEE …, 2020
12020
Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications
AI Ali-Gombe
12017
Digital Investigation and the Trojan Defense, Revisited
GG Richard, A Case, M Manna, EAM Hahne, A Ali-Gombe
Crime Science and Digital Forensics, 67-84, 2021
2021
Modern macOS userland runtime analysis
M Manna, A Case, A Ali-Gombe, GG Richard III
Forensic Science International: Digital Investigation 38, 301221, 2021
2021
Security of IT/OT Convergence: Design and Implementation Challenges
B Zahran, A Hussaini, A Ali-Gombe
The 2021 World Congress in Computer Science, Computer Engineering, and …, 2021
2021
IIoT-ARAS: IIoT/ICS Automated Risk Assessment System for Prediction and Prevention
B Zahran, A Hussaini, A Ali-Gombe
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
2021
Object Allocation Pattern as an Indicator for Maliciousness-An Exploratory Analysis
A Hussaini, B Zahran, A Ali-Gombe
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20