![]() ![]() | ALECCI, M., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Revisiting Android App Categorization. In ICSE '24: Proceedings of the 46th International Conference on Software Engineering. IEEE Press. doi:10.1145/3597503.3639094 ![]() |
![]() ![]() | Kober, M., SAMHI, J., Arzt, S., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Sensitive and Personal Data: What Exactly Are You Talking About? In 10th International Conference on Mobile Software Engineering and Systems 2023. ![]() |
SAMHI, J. (April 2023). Les nouvelles tendances en matière de sécurité pour les serveurs Linux. Linux Pratique, 137. |
SAMHI, J. (April 2023). Les plateformes de bug bounty. Multi-System & Internet Security Cookbook, 127. |
SAMHI, J. (2023). Les web shells : tout ce que vous devez savoir. Linux Pratique. |
![]() ![]() | SAMHI, J., Kober, K., KABORE, A. K., Arzt, S., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection. In 30th IEEE International Conference on Software Analysis, Evolution and Reengineering. ![]() |
SAMHI, J. (24 February 2023). USB Drop Attacks. Multi-System & Internet Security Cookbook, 126. |
SAMHI, J. (24 February 2023). Cryptojacking. Multi-System & Internet Security Cookbook, 126. |
![]() ![]() | SAMHI, J. (2023). Analyzing the Unanalyzable: an Application to Android Apps [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/54372 |
![]() ![]() | Sun, X., Chen, X., Li, L., Cai, H., Grundy, J., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). Demystifying Hidden Sensitive Operations in Android apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3574158 ![]() |
SAMHI, J. (September 2022). Analyse Statique et Automatisée de Code. Multi-System & Internet Security Cookbook, 123. |
![]() ![]() | SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs. In 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022). doi:10.1145/3524842.3528020 ![]() |
![]() ![]() | SAMHI, J., GAO, J., DAOUDI, N., Graux, P., Hoyez, H., Sun, X., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3512766 ![]() |
![]() ![]() | SAMHI, J., Li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3510135 ![]() |
![]() ![]() | SAMHI, J., & BARTEL, A. (2021). On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2021.3108057 ![]() |
SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (May 2021). Les dangers de pastebin. Multi-System & Internet Security Cookbook, 115. |
![]() ![]() | SAMHI, J., BARTEL, A., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). RAICC: Revealing Atypical Inter-Component Communication in Android Apps. In 43rd International Conference on Software Engineering (ICSE). doi:10.1109/ICSE43902.2021.00126 ![]() |
![]() ![]() | SAMHI, J., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). A First Look at Android Applications in Google Play related to Covid-19. Empirical Software Engineering. doi:10.1007/s10664-021-09943-x ![]() |
![]() ![]() | DAOUDI, N., SAMHI, J., KABORE, A. K., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode. In Communications in Computer and Information Science. Springer. doi:10.1007/978-3-030-87839-9_4 ![]() |
SAMHI, J., & BARTEL, A. (September 2020). Désamorcer des bombes logiques. Multi-System & Internet Security Cookbook, 111. |