Santanu Kumar Dash
Santanu Kumar Dash
Verified email at - Homepage
Cited by
Cited by
Droidscribe: Classifying android malware based on runtime behavior
SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ...
2016 IEEE Security and Privacy Workshops (SPW), 252-261, 2016
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware
G Suarez-Tangil, SK Dash, M Ahmadi, J Kinder, G Giacinto, L Cavallaro
Conference on Data and Application Security and Privacy, 2017
Transcend: Detecting concept drift in malware classification models
R Jordaney, K Sharad, SK Dash, Z Wang, D Papini, I Nouretdinov, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 625-642, 2017
Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware
M Hurier, G Suarez-Tangil, SK Dash, TF Bissyandé, Y Le Traon, J Klein, ...
Mining Software Repositories (MSR), 2017
Prescience: Probabilistic guidance on the retraining conundrum for malware detection
A Deo, SK Dash, G Suarez-Tangil, V Vovk, L Cavallaro
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security …, 2016
Instruction cache tuning for embedded multitasking applications
SK Dash, T Srikanthan
IET computers & digital techniques 4 (6), 439-457, 2010
Deep learning to detect redundant method comments
A Louis, SK Dash, ET Barr, C Sutton
arXiv preprint arXiv:1806.04616, 2018
Rapid estimation of instruction cache hit rates using loop profiling
SK Dash, T Srikanthan
2008 International Conference on Application-Specific Systems, Architectures …, 2008
RefiNym: Using Names to Refine Types
SK Dash, M Allamanis, ET Barr
Foundations of Software Engineering (FSE), 2018
A scalable approach to computing representative lowest common ancestor in directed acyclic graphs
SK Dash, SB Scholz, S Herhut, B Christianson
Theoretical Computer Science 513, 25-37, 2013
A Theory of Dual Channel Constraints
C Casalnuovo, ET Barr, SK Dash, P Devanbu
Proceedings of the 42nd International Conference on Software Engineering …, 2020
Checkers: Multi-modal Darwinian API Optimisation
SK Dash, F Wu, M Basios, L Li, L Kanthan
8th International Workshop on Genetic Improvement, 2020
Modeling rtos components for instruction cache hit rate estimation
SK Dash, T Srikanthan
2009 IEEE International Symposium on Circuits and Systems, 2978-2981, 2009
POSIT: Simultaneously Tagging Natural and Programming Languages
PP Partachi, SK Dash, C Treude, ET Barr
42nd International Conference on Software Engineering (ICSE'20), 2020
Where should I comment my code? A dataset and model for predicting locations that need comments
A Louis, SK Dash, ET Barr, MD Ernst, C Sutton
42nd International Conference on Software Engineering (ICSE'20), New Ideas …, 2020
A review of anomaly-based exploratory analysis and detection of exploits in Android
GS Tangil, SK Dash, PG Teodoro, J Camacho, L Cavallaro
Actas de las V Jornadas Nacionales de Ciberseguridad Junio 5-7, 2019 …, 2019
Anomaly-based exploratory analysis and detection of exploits in android mediaserver
G Suárez-Tangil, SK Dash, P García-Teodoro, J Camacho, L Cavallaro
IET Information Security 12 (5), 404-413, 2018
Classifying Android Malware Based on Runtime Behavior
SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ...
Poster: Barometer: Sizing Up Android Applications Through Statistical Evaluation
SK Dash, G Suarez-Tangil, J Kinder, L Cavallaro
Adaptive Constraint Solving for Information Flow Analysis
SK Dash
The system can't perform the operation now. Try again later.
Articles 1–20