Reducing combinatorics in GUI testing of android applications N Mirzaei, J Garcia, H Bagheri, A Sadeghi, S Malek Proceedings of the 38th international conference on software engineering …, 2016 | 180 | 2016 |
Covert: Compositional analysis of android inter-app permission leakage H Bagheri, A Sadeghi, J Garcia, S Malek IEEE transactions on Software Engineering 41 (9), 866-886, 2015 | 179 | 2015 |
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software A Sadeghi, H Bagheri, J Garcia, S Malek IEEE Transactions on Software Engineering 43 (6), 492-530, 2016 | 174 | 2016 |
Sig-droid: Automated system input generation for android applications N Mirzaei, H Bagheri, R Mahmood, S Malek 2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015 | 101 | 2015 |
A formal approach for detection of security flaws in the android permission system H Bagheri, E Kang, S Malek, D Jackson Formal Aspects of Computing 30, 525-544, 2018 | 81 | 2018 |
Energy-aware test-suite minimization for android apps R Jabbarvand, A Sadeghi, H Bagheri, S Malek Proceedings of the 25th International Symposium on Software Testing and …, 2016 | 78 | 2016 |
Scalable analysis of interaction threats in iot systems M Alhanahnah, C Stevens, H Bagheri Proceedings of the 29th ACM SIGSOFT international symposium on software …, 2020 | 73 | 2020 |
Practical, formal synthesis and automatic enforcement of security policies for android H Bagheri, A Sadeghi, R Jabbarvand, S Malek 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 60 | 2016 |
Detection of design flaws in the android permission protocol through bounded verification H Bagheri, E Kang, S Malek, D Jackson FM 2015: Formal Methods: 20th International Symposium, Oslo, Norway, June 24 …, 2015 | 60 | 2015 |
Big Data: challenges, opportunities and Cloud based solutions H Bagheri, AA Shaltooki International Journal of Electrical and Computer Engineering 5 (2), 340, 2015 | 56 | 2015 |
Analysis of android inter-app security vulnerabilities using covert A Sadeghi, H Bagheri, S Malek 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015 | 55 | 2015 |
A study on the role of software architecture in the evolution and quality of software E Kouroshfar, M Mirakhorli, H Bagheri, L Xiao, S Malek, Y Cai 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 246-257, 2015 | 55 | 2015 |
A temporal permission analysis and enforcement framework for android A Sadeghi, R Jabbarvand, N Ghorbani, H Bagheri, S Malek Proceedings of the 40th International Conference on Software Engineering …, 2018 | 51 | 2018 |
Sentiment analysis of twitter data H Bagheri, MJ Islam arXiv preprint arXiv:1711.10377, 2017 | 50 | 2017 |
Software architectural principles in contemporary mobile software: from conception to practice H Bagheri, J Garcia, A Sadeghi, S Malek, N Medvidovic Journal of Systems and Software 119, 31-44, 2016 | 44 | 2016 |
Titanium: efficient analysis of evolving alloy specifications H Bagheri, S Malek Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 37 | 2016 |
Bounded exhaustive search of alloy specification repairs SG Brida, G Regis, G Zheng, H Bagheri, TV Nguyen, N Aguirre, M Frias 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 36 | 2021 |
Trademaker: Automated dynamic analysis of synthesized tradespaces H Bagheri, C Tang, K Sullivan Proceedings of the 36th International Conference on Software Engineering …, 2014 | 36 | 2014 |
Detecting and correcting misclassified sequences in the large-scale public databases H Bagheri, AJ Severin, H Rajan Bioinformatics 36 (18), 4699-4705, 2020 | 34 | 2020 |
Monarch: Model-based development of software architectures H Bagheri, K Sullivan Model Driven Engineering Languages and Systems: 13th International …, 2010 | 32 | 2010 |