Login / Signup
Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis.
Yousra Aafer
Xiao Zhang
Wenliang Du
Published in:
USENIX Security Symposium (2016)
Keyphrases
</>
general purpose
data sets
data analysis
real time
neural network
data mining
artificial intelligence
database systems
cooperative
ground truth
software engineering
access control
statistical analysis