Protection of user data in hosted application environments M Christodorescu, D Pendarakis, KK Singh US Patent 9,245,126, 2016 | 200 | 2016 |
Biometric authentication on a mobile device: a study of user effort, error and task disruption S Trewin, C Swart, L Koved, J Martino, K Singh, S Ben-David Proceedings of the 28th Annual Computer Security Applications Conference ¡¦, 2012 | 189 | 2012 |
Evaluating bluetooth as a medium for botnet command and control K Singh, S Sangal, N Jain, P Traynor, W Lee International Conference on Detection of Intrusions and Malware, and ¡¦, 2010 | 118 | 2010 |
xBook: Redesigning Privacy Control in Social Networking Platforms. K Singh, S Bhola, W Lee USENIX Security Symposium, 249-266, 2009 | 114 | 2009 |
On the incoherencies in web browser access control policies K Singh, A Moshchuk, HJ Wang, W Lee 2010 IEEE Symposium on Security and Privacy, 463-478, 2010 | 108 | 2010 |
Trust/value/risk-based access control policy PC Cheng, L Koved, KK Singh US Patent 9,432,375, 2016 | 62 | 2016 |
Adaptive behavior profiling and anomaly scoring through continuous learning PC Cheng, L Koved, KK Singh US Patent 9,807,105, 2017 | 56 | 2017 |
{PolicyLint}: Investigating Internal Privacy Policy Contradictions on Google Play B Andow, SY Mahmud, W Wang, J Whitaker, W Enck, B Reaves, K Singh, ... 28th USENIX security symposium (USENIX security 19), 585-602, 2019 | 55 | 2019 |
APHIDS: A mobile agent-based programmable hybrid intrusion detection system K Deeter, K Singh, S Wilson, L Filipozzi, S Vuong International Workshop on Mobile Agents for Telecommunication Applications ¡¦, 2004 | 53 | 2004 |
Evaluating email¡¯s feasibility for botnet command and control K Singh, A Srivastava, J Giffin, W Lee 2008 IEEE International Conference on Dependable Systems and Networks With ¡¦, 2008 | 42 | 2008 |
Practical context-aware permission control for hybrid mobile applications K Singh International Workshop on Recent Advances in Intrusion Detection, 307-327, 2013 | 40 | 2013 |
Context-aware permission control of hybrid mobile applications KK Singh US Patent 9,275,221, 2016 | 36 | 2016 |
Actions speak louder than words:{Entity-Sensitive} privacy policy and data flow analysis with {PoliCheck} B Andow, SY Mahmud, J Whitaker, W Enck, B Reaves, K Singh, ... 29th USENIX Security Symposium (USENIX Security 20), 985-1002, 2020 | 34 | 2020 |
Understanding precision in host based intrusion detection M Sharif, K Singh, J Giffin, W Lee International Workshop on Recent Advances in Intrusion Detection, 21-41, 2007 | 34 | 2007 |
VulnerableMe: Measuring systemic weaknesses in mobile browser security C Amrutkar, K Singh, A Verma, P Traynor International Conference on Information Systems Security, 16-34, 2012 | 33 | 2012 |
Uiref: analysis of sensitive user inputs in android applications B Andow, A Acharya, D Li, W Enck, K Singh, T Xie Proceedings of the 10th ACM Conference on Security and Privacy in Wireless ¡¦, 2017 | 31 | 2017 |
Method and apparatus for server-side authentication and authorization for mobile clients without client-side application modification L Koved, KK Singh US Patent 9,088,555, 2015 | 30 | 2015 |
Webcapsule: Towards a lightweight forensic engine for web browsers C Neasbitt, B Li, R Perdisci, L Lu, K Singh, K Li Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications ¡¦, 2015 | 27 | 2015 |
Practical end-to-end web content integrity K Singh, HJ Wang, A Moshchuk, C Jackson, W Lee Proceedings of the 21st international conference on World Wide Web, 659-668, 2012 | 24 | 2012 |
Network data collection and response system SN Chari, PC Cheng, X Hu, L Koved, JR Rao, R Sailer, DL Schales, ... US Patent 9,854,057, 2017 | 19 | 2017 |