Follow
A. Ali-Gombe
Title
Cited by
Cited by
Year
Aspectdroid: Android app analysis system
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
472016
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming
AI Ali-Gombe, B Saltaformaggio, D Xu, GG Richard III
computers & security 73, 235-248, 2018
432018
Opseq: Android malware fingerprinting
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-12, 2015
332015
Memory forensics and the windows subsystem for linux
N Lewis, A Case, A Ali-Gombe, GG Richard III
Digital Investigation 26, S3-S11, 2018
262018
{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction
A Ali-Gombe, S Sudhakaran, A Case, GG Richard III
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
242019
Hooktracer: Automatic detection and analysis of keystroke loggers using memory forensics
A Case, RD Maggio, M Firoz-Ul-Amin, MM Jalalzai, A Ali-Gombe, M Sun, ...
Computers & Security 96, 101872, 2020
182020
HookTracer: A system for automated and accessible API hooks analysis
A Case, MM Jalalzai, M Firoz-Ul-Amin, RD Maggio, A Ali-Gombe, M Sun, ...
Digital Investigation 29, S104-S112, 2019
182019
“Tipped Off by Your Memory Allocator”: Device-Wide User Activity Sequencing from Android Memory Images
R Bhatia, B Saltaformaggio, SJ Yang, A Ali-Gombe, X Zhang, D Xu, ...
182018
Memory analysis of. net and. net core applications
M Manna, A Case, A Ali-Gombe, GG Richard III
Forensic Science International: Digital Investigation 42, 301404, 2022
132022
Robust fingerprinting for relocatable code
I Ahmed, V Roussev, A Ali Gombe
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
112015
Modern macOS userland runtime analysis
M Manna, A Case, A Ali-Gombe, GG Richard III
Forensic Science International: Digital Investigation 38, 301221, 2021
82021
IIoT-ARAS: IIoT/ICS Automated risk assessment system for prediction and prevention
B Zahran, A Hussaini, A Ali-Gombe
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
82021
Don't touch that column: Portable, fine-grained access control for android's native content providers
A Ali-Gombe, GG Richard III, I Ahmed, V Roussev
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
62016
App-agnostic post-execution semantic analysis of Android in-memory forensics artifacts
A Ali-Gombe, A Tambaoan, A Gurfolino, GG Richard III
Proceedings of the 36th Annual Computer Security Applications Conference, 28-41, 2020
52020
Cross-platform malware: study of the forthcoming hazard adaptation and behavior
B Zahran, S Nicholson, A Ali-Gombe
Proceedings of the International Conference on Security and Management (SAM …, 2019
52019
Volatile Memory Message Carving: A" per process basis" Approach
AI Ali-Gombe
52012
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices
R Vijayakanthan, I Ahmed, A Ali-Gombe
Computers & Security 132, 103298, 2023
32023
Security of IT/OT Convergence: Design and Implementation Challenges
B Zahran, A Hussaini, A Ali-Gombe
The 2021 World Congress in Computer Science, Computer Engineering, and …, 2021
32021
AmpleDroid Recovering Large Object Files from Android Application Memory
S Sudhakaran, A Ali-Gombe, A Orgah, A Case, GG Richard III
IEEE International Workshop on Information Forensics and Security (IEEE …, 2020
32020
Transforming memory image to sound wave signals for an effective iot fingerprinting
R Vijayakanthan, I Ahmed, A Ali-Gombe
Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20