Login / Signup
Sufatrio
Publication Activity (10 Years)
Years Active: 1999-2022
Publications (10 Years): 4
Top Topics
Hierarchically Organized
Mobile Environments
Penetration Testing
Control Flow
Top Venues
Comput. Secur.
ACM Comput. Surv.
ACE
ESORICS (2)
</>
Publications
</>
Sufatrio
,
Jan Vykopal
,
Ee-Chien Chang
Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications.
ACE
(2022)
Vivek Balachandran
,
Sufatrio
,
Darell J. J. Tan
,
Vrizlynn L. L. Thing
Control flow obfuscation for Android applications.
Comput. Secur.
61 (2016)
Sufatrio
,
Tong-Wei Chua
,
Darell J. J. Tan
,
Vrizlynn L. L. Thing
Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments.
ESORICS (2)
(2015)
Sufatrio
,
Darell J. J. Tan
,
Tong-Wei Chua
,
Vrizlynn L. L. Thing
Securing Android: A Survey, Taxonomy, and Challenges.
ACM Comput. Surv.
47 (4) (2015)
Sufatrio
,
Roland H. C. Yap
Quantifying the Effects of More Timely Certificate Revocation on Lightweight Mobile Devices.
Metrisec@ESEM
(2011)
Sufatrio
,
Roland H. C. Yap
Trusted Principal-Hosted Certificate Revocation.
IFIPTM
(2011)
Sufatrio
,
Roland H. C. Yap
Extending BAN Logic for Reasoning with Modern PKI-Based Protocols.
NPC Workshops
(2008)
Felix Halim
,
Rajiv Ramnath
,
Sufatrio
,
Yongzheng Wu
,
Roland H. C. Yap
A Lightweight Binary Authentication System for Windows.
IFIPTM
(2008)
Rajiv Ramnath
,
Sufatrio
,
Roland H. C. Yap
,
Yongzheng Wu
WinResMon: A Tool for Discovering Software Dependencies, Configuration, and Requirements in Microsoft Windows.
LISA
(2006)
Sufatrio
,
Roland H. C. Yap
Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks.
RAID
(2005)
Sufatrio
,
Roland H. C. Yap
,
Liming Zhong
A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing.
LISA
(2004)
Sufatrio
,
Kwok-Yan Lam
Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework.
MDA
(1999)
Sufatrio
,
Kwok-Yan Lam
Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication.
ISPAN
(1999)