![]() | DIALLO, A., DIOP, A., KABORE, A. K., PILGUN, A., SAMHI, J., BISSYANDE, T., & KLEIN, J. (in press). On the security of pre-installed Android apps in low-cost devices [Paper presentation]. 17th EAI International Conference on Africa Internet infrastructure and Services (EAI AFRICOMM), Ile-Ife, Nigeria. Peer reviewed |
![]() | DIALLO, A., WAR, A., Diouf, M. A., SAMHI, J., Arzt, S., BISSYANDE, T., & KLEIN, J. (2025). Security Assessment of Mobile Banking Apps in West African Economic and Monetary Union. In Cybersecurity4D conference (pp. 13). IEEE. doi:10.1109/c4d65382.2025.11306468 Peer reviewed |
![]() | SUN, T., ALECCI, M., SONG, Y., TANG, X., KIM, K., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2025). RAML: Toward Retrieval-Augmented Localization of Malicious Payloads in Android Apps. In The 40th IEEE/ACM International Conference on Automated Software Engineering, ASE 2025. IEEE/ACM. Peer reviewed |
![]() | ALECCI, M., SAMHI, J., Miltenberger, M., Arzt, S., BISSYANDE, T., & KLEIN, J. (2025). DamFlow: Preventing a Flood of Irrelevant Data Flows in Android Apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3772002 Peer Reviewed verified by ORBi |
![]() | SUN, T., ALECCI, M., PILGUN, A., SONG, Y., TANG, X., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2025). MalLoc: Toward Fine-grained Android Malicious Payload Localization via LLMs. In The 41st International Conference on Software Maintenance and Evolution (ICSME) 2025 conference. IEEE. doi:10.1109/ICSME64153.2025.00076 Peer reviewed |
![]() | ALECCI, M., SANNIER, N., CECI, M., ABUALHAIJA, S., SAMHI, J., BIANCULLI, D., BISSYANDE, T. F. D. A., & KLEIN, J. (2025). Toward LLM-Driven GDPR Compliance Checking for Android Apps. In Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering (FSE Companion '25) (pp. 606-610). ACM - Association for Computing Machinery. doi:10.1145/3696630.3728508 Peer reviewed Dataset: https://zenodo.org/records/15168296 |
![]() | Da Silva, L., SAMHI, J., & Khomh, F. (2025). LLMs and Stack Overflow discussions: Reliability, impact, and challenges. Journal of Systems and Software, 112541. doi:10.1016/j.jss.2025.112541 Peer Reviewed verified by ORBi Dataset: https://zenodo.org/records/15086542 |
![]() | DIALLO, A., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (01 July 2025). (In)Security of mobile apps in developing countries: a systematic literature review. Empirical Software Engineering, 30 (5). doi:10.1007/s10664-025-10689-z Peer Reviewed verified by ORBi |
![]() | SAMHI, J., Marc Miltenberger, ALECCI, M., Steven Arzt, BISSYANDE, T. F. D. A., & KLEIN, J. (2025). Do you have 5 min? Improving Call Graph Analysis with Runtime Information. In Do you have 5 min? Improving Call Graph Analysis with Runtime Information. New York, United States: Association for Computing Machinery. doi:10.1145/3696630.3728495 Peer reviewed |
![]() | SAMHI, J., Just, R., Ernst, M. D., BISSYANDE, T., & KLEIN, J. (2025). Resolving Conditional Implicit Calls to Improve Static and Dynamic Analysis in Android Apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3729168 Peer Reviewed verified by ORBi Dataset: https://zenodo.org/records/10474310 |
DIALLO, A., WAR, A., DIOUF, M. A., SAMHI, J., ARZT, S., BISSYANDE, T. F., & KLEIN, J. (2025). Security Assessment of Mobile Banking Apps in West African Economic and Monetary Union [Paper presentation]. 1st Cybersecurity4D conference, Eastern Cape, South Africa. |
![]() | RUIZ JIMÉNEZ, P. J., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2025). Dissecting APKs from Google Play: Trends, Insights and Security Implications. IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). doi:10.1109/SANER64311.2025.00074 Peer reviewed |
![]() | SAMHI, J., Just, R., BISSYANDE, T. F. D. A., Ernst, M. D., & KLEIN, J. (2024). Call Graph Soundness in Android Static Analysis. In M. Christakis (Ed.), ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. Association for Computing Machinery, Inc. doi:10.1145/3650212.3680333 Peer reviewed |
![]() | SAMHI, J., & Zeller, A. (2024). AndroLog: Android Instrumentation and Code Coverage Analysis. In M. d�Amorim (Ed.), FSE Companion - Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering. Association for Computing Machinery, Inc. doi:10.1145/3663529.3663806 Peer reviewed |
![]() | SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). AndroLibZoo: A Reliable Dataset of Libraries Based on Software Dependency Analysis. In Proceedings - 2024 IEEE/ACM 21st International Conference on Mining Software Repositories, MSR 2024. Institute of Electrical and Electronics Engineers Inc. doi:10.1145/3643991.3644866 Peer reviewed |
![]() | ALECCI, M., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Revisiting Android App Categorization. In ICSE '24: Proceedings of the 46th International Conference on Software Engineering. IEEE Press. doi:10.1145/3597503.3639094 Peer reviewed |
DIALLO, A., SAMHI, J., Bissyandé, T., & KLEIN, J. (2024). (In)Security of Mobile Apps in Developing Countries: A Systematic Literature Review. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/62414. doi:10.48550/arXiv.2405.05117 |
![]() | Yonghui, L., Xiao Chen, Pei Liu, SAMHI, J., John Grundy, Chunyang Chen, & Li Li. (2024). Demystifying React Native Android Apps for Static Analysis. ACM Transactions on Software Engineering and Methodology. Peer Reviewed verified by ORBi |
![]() | Kober, M., SAMHI, J., Arzt, S., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Sensitive and Personal Data: What Exactly Are You Talking About? In 10th International Conference on Mobile Software Engineering and Systems 2023 (pp. 70-74). IEEE. doi:10.1109/MOBILSoft59058.2023.00016 Peer reviewed |
SAMHI, J. (April 2023). Les nouvelles tendances en matière de sécurité pour les serveurs Linux. Linux Pratique, 137. |
SAMHI, J. (April 2023). Les plateformes de bug bounty. Multi-System & Internet Security Cookbook, 127. |
SAMHI, J. (2023). Les web shells : tout ce que vous devez savoir. Linux Pratique. |
![]() | SAMHI, J., Kober, K., KABORE, A. K., Arzt, S., BISSYANDE, T. F. D. A., & KLEIN, J. (2023). Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection. In 30th IEEE International Conference on Software Analysis, Evolution and Reengineering. Peer reviewed |
SAMHI, J. (24 February 2023). USB Drop Attacks. Multi-System & Internet Security Cookbook, 126. |
SAMHI, J. (24 February 2023). Cryptojacking. Multi-System & Internet Security Cookbook, 126. |
![]() | SAMHI, J. (2023). Analyzing the Unanalyzable: an Application to Android Apps [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/54372 |
![]() | Sun, X., Chen, X., Li, L., Cai, H., Grundy, J., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). Demystifying Hidden Sensitive Operations in Android apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3574158 Peer Reviewed verified by ORBi |
SAMHI, J. (September 2022). Analyse Statique et Automatisée de Code. Multi-System & Internet Security Cookbook, 123. |
![]() | SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs. In 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022). doi:10.1145/3524842.3528020 Peer reviewed |
![]() | SAMHI, J., Li, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3510135 Peer reviewed |
![]() | SAMHI, J., GAO, J., DAOUDI, N., Graux, P., Hoyez, H., Sun, X., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2022). JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis. In 44th International Conference on Software Engineering (ICSE 2022). doi:10.1145/3510003.3512766 Peer reviewed |
![]() | SAMHI, J., & BARTEL, A. (2021). On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2021.3108057 Peer Reviewed verified by ORBi |
SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (May 2021). Les dangers de pastebin. Multi-System & Internet Security Cookbook, 115. |
![]() | SAMHI, J., BARTEL, A., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). RAICC: Revealing Atypical Inter-Component Communication in Android Apps. In 43rd International Conference on Software Engineering (ICSE). doi:10.1109/ICSE43902.2021.00126 Peer reviewed |
![]() | SAMHI, J., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). A First Look at Android Applications in Google Play related to Covid-19. Empirical Software Engineering. doi:10.1007/s10664-021-09943-x Peer Reviewed verified by ORBi |
![]() | DAOUDI, N., SAMHI, J., KABORE, A. K., ALLIX, K., BISSYANDE, T. F. D. A., & KLEIN, J. (2021). DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode. In Communications in Computer and Information Science. Springer. doi:10.1007/978-3-030-87839-9_4 Peer reviewed |
SAMHI, J., & BARTEL, A. (September 2020). Désamorcer des bombes logiques. Multi-System & Internet Security Cookbook, 111. |