Profil

SAMHI Jordan

University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX

ORCID
0000-0001-6052-6184
Main Referenced Co-authors
KLEIN, Jacques  (18)
BISSYANDE, Tegawendé  (16)
ALLIX, Kevin  (3)
BARTEL, Alexandre  (3)
ALECCI, Marco  (2)
Main Referenced Keywords
Android Security (8); Static Analysis (7); Android (3); Android apps (3); Software (3);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > TruX - Trustworthy Software Engineering (6)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Other (3)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Trustworthy Software Engineering (TruX) (3)
NCER-FT - FinTech National Centre of Excellence in Research (2)
CISPA Helmholtz Center for Information Security (1)
Main Referenced Disciplines
Computer science (29)

Publications (total 29)

The most downloaded
583 downloads
SAMHI, J. (2023). Analyzing the Unanalyzable: an Application to Android Apps [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/54372 https://hdl.handle.net/10993/54372

The most cited

42 citations (Scopus®)

DAOUDI, N., SAMHI, J., KABORE, A. K., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode. In Communications in Computer and Information Science. Springer. doi:10.1007/978-3-030-87839-9_4 https://hdl.handle.net/10993/48789

ALECCI, M., SANNIER, N., CECI, M., ABUALHAIJA, S., SAMHI, J., BIANCULLI, D., BISSYANDE, T. F. D. A., & KLEIN, J. (In press). Toward LLM-Driven GDPR Compliance Checking for Android Apps. In Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering (FSE Companion '25). ACM - Association for Computing Machinery.
Peer reviewed

DIALLO, A., WAR, A., DIOUF, M. A., SAMHI, J., ARZT, S., BISSYANDE, T. F., & KLEIN, J. (In press). Security Assessment of Mobile Banking Apps in West African Economic and Monetary Union [Paper presentation]. 1st Cybersecurity4D conference, Eastern Cape, South Africa.
Editorial reviewed

SAMHI, J., Just, R., Ernst, M. D., BISSYANDE, T., & KLEIN, J. (2025). Resolving Conditional Implicit Calls to Improve Static and Dynamic Analysis in Android Apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3729168
Peer Reviewed verified by ORBi

RUIZ JIMÉNEZ, P. J., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2025). Dissecting APKs from Google Play: Trends, Insights and Security Implications. IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). doi:10.1109/SANER64311.2025.00074
Peer reviewed

SAMHI, J., Just, R., BISSYANDE, T. F. D. A., Ernst, M. D., & KLEIN, J. (2024). Call Graph Soundness in Android Static Analysis. In M. Christakis (Ed.), ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. Association for Computing Machinery, Inc. doi:10.1145/3650212.3680333
Peer reviewed

SAMHI, J., & Zeller, A. (2024). AndroLog: Android Instrumentation and Code Coverage Analysis. In M. d�Amorim (Ed.), FSE Companion - Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering. Association for Computing Machinery, Inc. doi:10.1145/3663529.3663806
Peer reviewed

SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). AndroLibZoo: A Reliable Dataset of Libraries Based on Software Dependency Analysis. In Proceedings - 2024 IEEE/ACM 21st International Conference on Mining Software Repositories, MSR 2024. Institute of Electrical and Electronics Engineers Inc. doi:10.1145/3643991.3644866
Peer reviewed

ALECCI, M., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Revisiting Android App Categorization. In ICSE '24: Proceedings of the 46th International Conference on Software Engineering. IEEE Press. doi:10.1145/3597503.3639094
Peer reviewed

DIALLO, A., SAMHI, J., Bissyandé, T., & KLEIN, J. (2024). (In)Security of Mobile Apps in Developing Countries: A Systematic Literature Review. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/62414. doi:10.48550/arXiv.2405.05117

Yonghui, L., Xiao Chen, Pei Liu, SAMHI, J., John Grundy, Chunyang Chen, & Li Li. (2024). Demystifying React Native Android Apps for Static Analysis. ACM Transactions on Software Engineering and Methodology.
Peer Reviewed verified by ORBi

Kober, M., SAMHI, J., Arzt, S., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Sensitive and Personal Data: What Exactly Are You Talking About? In 10th International Conference on Mobile Software Engineering and Systems 2023 (pp. 70-74). IEEE. doi:10.1109/MOBILSoft59058.2023.00016
Peer reviewed

SAMHI, J. (April 2023). Les nouvelles tendances en matière de sécurité pour les serveurs Linux. Linux Pratique, 137.

SAMHI, J. (April 2023). Les plateformes de bug bounty. Multi-System & Internet Security Cookbook, 127.

SAMHI, J. (2023). Les web shells : tout ce que vous devez savoir. Linux Pratique.

SAMHI, J., Kober, K., KABORE, A. K., Arzt, S., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection. In 30th IEEE International Conference on Software Analysis, Evolution and Reengineering.
Peer reviewed

SAMHI, J. (24 February 2023). USB Drop Attacks. Multi-System & Internet Security Cookbook, 126.

SAMHI, J. (24 February 2023). Cryptojacking. Multi-System & Internet Security Cookbook, 126.

SAMHI, J. (2023). Analyzing the Unanalyzable: an Application to Android Apps [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/54372

Sun, X., Chen, X., Li, L., Cai, H., Grundy, J., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). Demystifying Hidden Sensitive Operations in Android apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3574158
Peer Reviewed verified by ORBi

SAMHI, J. (September 2022). Analyse Statique et Automatisée de Code. Multi-System & Internet Security Cookbook, 123.

SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs. In 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022). doi:10.1145/3524842.3528020
Peer reviewed

SAMHI, J., Li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3510135
Peer reviewed

SAMHI, J., GAO, J., DAOUDI, N., Graux, P., Hoyez, H., Sun, X., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3512766
Peer reviewed

SAMHI, J., & BARTEL, A. (2021). On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2021.3108057
Peer Reviewed verified by ORBi

SAMHI, J., BARTEL, A., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). RAICC: Revealing Atypical Inter-Component Communication in Android Apps. In 43rd International Conference on Software Engineering (ICSE). doi:10.1109/ICSE43902.2021.00126
Peer reviewed

SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (May 2021). Les dangers de pastebin. Multi-System & Internet Security Cookbook, 115.

SAMHI, J., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). A First Look at Android Applications in Google Play related to Covid-19. Empirical Software Engineering. doi:10.1007/s10664-021-09943-x
Peer Reviewed verified by ORBi

DAOUDI, N., SAMHI, J., KABORE, A. K., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode. In Communications in Computer and Information Science. Springer. doi:10.1007/978-3-030-87839-9_4
Peer reviewed

SAMHI, J., & BARTEL, A. (September 2020). Désamorcer des bombes logiques. Multi-System & Internet Security Cookbook, 111.

Contact ORBilu