ALECCI, M., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Revisiting Android App Categorization. In ICSE '24: Proceedings of the 46th International Conference on Software Engineering. IEEE Press. Peer reviewed |
Kober, M., Samhi, J., Arzt, S., Bissyande, T. F. D. A., & Klein, J. (2023). Sensitive and Personal Data: What Exactly Are You Talking About? In 10th International Conference on Mobile Software Engineering and Systems 2023. Peer reviewed |
Samhi, J. (April 2023). Les plateformes de bug bounty. Multi-System & Internet Security Cookbook, 127. |
Samhi, J. (April 2023). Les nouvelles tendances en matière de sécurité pour les serveurs Linux. Linux Pratique, 137. |
Samhi, J. (2023). Les web shells : tout ce que vous devez savoir. Linux Pratique. |
Samhi, J., Kober, K., Kabore, A. K., Arzt, S., Bissyande, T. F. D. A., & Klein, J. (2023). Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection. In 30th IEEE International Conference on Software Analysis, Evolution and Reengineering. Peer reviewed |
Samhi, J. (24 February 2023). USB Drop Attacks. Multi-System & Internet Security Cookbook, 126. |
Samhi, J. (24 February 2023). Cryptojacking. Multi-System & Internet Security Cookbook, 126. |
Samhi, J. (2023). Analyzing the Unanalyzable: an Application to Android Apps [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/54372 |
Sun, X., Chen, X., Li, L., Cai, H., Grundy, J., Samhi, J., Bissyande, T. F. D. A., & Klein, J. (2022). Demystifying Hidden Sensitive Operations in Android apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3574158 Peer Reviewed verified by ORBi |
Samhi, J. (September 2022). Analyse Statique et Automatisée de Code. Multi-System & Internet Security Cookbook, 123. |
Samhi, J., Bissyande, T. F. D. A., & Klein, J. (2022). TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs. In 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022). doi:10.1145/3524842.3528020 Peer reviewed |
Samhi, J., Gao, J., Daoudi, N., Graux, P., Hoyez, H., Sun, X., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2022). JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3512766 Peer reviewed |
Samhi, J., Li, L., Bissyande, T. F. D. A., & Klein, J. (2022). Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3510135 Peer reviewed |
Samhi, J., & BARTEL, A. (2021). On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2021.3108057 Peer Reviewed verified by ORBi |
Samhi, J., Bissyande, T. F. D. A., & Klein, J. (May 2021). Les dangers de pastebin. Multi-System & Internet Security Cookbook, 115. |
Samhi, J., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2021). RAICC: Revealing Atypical Inter-Component Communication in Android Apps. In 43rd International Conference on Software Engineering (ICSE). doi:10.1109/ICSE43902.2021.00126 Peer reviewed |
Samhi, J., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). A First Look at Android Applications in Google Play related to Covid-19. Empirical Software Engineering. doi:10.1007/s10664-021-09943-x Peer Reviewed verified by ORBi |
Daoudi, N., Samhi, J., Kabore, A. K., Allix, K., Bissyande, T. F. D. A., & Klein, J. (2021). DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode. In Communications in Computer and Information Science. Springer. doi:10.1007/978-3-030-87839-9_4 Peer reviewed |
Samhi, J., & BARTEL, A. (September 2020). Désamorcer des bombes logiques. Multi-System & Internet Security Cookbook, 111. |