Saurabh Kumar
Saurabh Kumar
Home
Publications
Talks
Contact
Light
Dark
Automatic
1
Reinforcement-Learning Based Covert Social Influence Operations
How might reinforcement-learning based covert social influence operations (CSIOs) be run, given that the CSIO agent wants to maximize …
Saurabh Kumar
,
Valerio La Gatta
,
Andrea Pugliese
,
ndrew Pulver
,
V.S. Subrahmanian
,
Jiazhi Zhang
,
Youzhi Zhang
Cite
DOI
SCRUBD: Smart Contracts Reentrancy and Unhandled Exceptions Vulnerability Datase
Smart Contracts (SCs) handle transactions in the Ethereum blockchain worth millions of United States dollars, making them a lucrative …
Chavhan Sujeet Yashavant
,
Mitrajsinh Chavda
,
Saurabh Kumar
,
Amey Karkare
,
Angshuman Karmakar
Cite
DOI
Climbing the Influence Tiers on TikTok: A Multimodal Study
Corporate social media analysts break influencers into five tiers of increasing importance: Nano, Micro, Mid, Macro, and Mega. We …
Pier Paolo Tricomi
,
Saurabh Kumar
,
Mauro Conti
,
V.S. Subrahmanian
Preprint
Cite
DOI
KalpaVriksh: Efficient and Cost-effective GUI Application Hosting using Singleton Snapshots
Hosting popular GUI applications in different virtual machines (VMs) in a cloud can provide strong intra-application isolation and …
Sumaiya Shaikh
,
Saurabh Kumar
,
Debadatta Mishra
Cite
DOI
AndroOBFS: Time-tagged Obfuscated Android Malware Dataset with Family Information
With the large-scale adaptation of Android OS and ever-increasing contributions in the Android application space, Android has become …
Saurabh Kumar
,
Debadatta Mishra
,
Biswabandan Panda
,
Sandeep Kumar Shukla
Preprint
Cite
Dataset
Slides
Video
DOI
SniP: An Efficient Stack Tracing Framework for Multi-threaded Programs
Usage of the execution stack at run-time captures the dynamic state of programs and can be used to derive useful insights into the …
Arun KP
,
Saurabh Kumar
,
Debadatta Mishra
,
Biswabandan Panda
Preprint
Cite
Code
DOI
Android Malware Family Classification: What Works -- API Calls, Permissions or API Packages?
With the increased popularity and wide adoption as a mobile OS platform, Android has been a major target for malware authors. Due to …
Saurabh Kumar
,
Debadatta Mishra
,
Sandeep Kumar Shukla
Preprint
Cite
Slides
Video
DOI
DeepDetect: A Practical On-device Android Malware Detector
Over the past few years, Android has become one of the most popular operating systems for smartphones as it is open-source and provides …
Saurabh Kumar
,
Debadatta Mishra
,
Biswabandan Panda
,
Sandeep Kumar Shukla
Preprint
Cite
Dataset
Slides
Video
DOI
Appendix
STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments
Sophisticated malware employs various emulation-detection techniques to bypass the dynamic analysis systems that are running on top of …
Saurabh Kumar
,
Debadatta Mishra
,
Biswabandan Panda
,
Sandeep Kumar Shukla
Preprint
Cite
Slides
Video
DOI
Appendix
Host-Server-Based Malware Detection System for Android Platforms Using Machine Learning
The popularity and openness of Android have made it the easy target of malware operators acting mainly through malware-spreading apps. …
Anam Fatima
,
Saurabh Kumar
,
Malay Kishore Dutta
Cite
DOI
»
Cite
×