![]() | SUN, T., ALECCI, M., SONG, Y., TANG, X., KIM, K., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2025). RAML: Toward Retrieval-Augmented Localization of Malicious Payloads in Android Apps. In The 40th IEEE/ACM International Conference on Automated Software Engineering, ASE 2025. IEEE/ACM. Peer reviewed |
![]() | ALECCI, M., SAMHI, J., Miltenberger, M., Arzt, S., BISSYANDE, T., & KLEIN, J. (2025). DamFlow: Preventing a Flood of Irrelevant Data Flows in Android Apps. ACM Transactions on Software Engineering and Methodology. doi:10.1145/3772002 Peer Reviewed verified by ORBi |
![]() | Marchiori, F., ALECCI, M., Pajola, L., & Conti, M. (2025). DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? In 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I. Springer Nature. doi:10.1007/978-3-032-07884-1_12 Peer reviewed |
![]() | SUN, T., ALECCI, M., PILGUN, A., SONG, Y., TANG, X., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2025). MalLoc: Toward Fine-grained Android Malicious Payload Localization via LLMs. In The 41st International Conference on Software Maintenance and Evolution (ICSME) 2025 conference. IEEE. Peer reviewed |
![]() | ALECCI, M., SANNIER, N., CECI, M., ABUALHAIJA, S., SAMHI, J., BIANCULLI, D., BISSYANDE, T. F. D. A., & KLEIN, J. (2025). Toward LLM-Driven GDPR Compliance Checking for Android Apps. In Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering (FSE Companion '25) (pp. 606-610). ACM - Association for Computing Machinery. doi:10.1145/3696630.3728508 Peer reviewed Dataset: https://zenodo.org/records/15168296 |
![]() | SAMHI, J., Marc Miltenberger, ALECCI, M., Steven Arzt, BISSYANDE, T. F. D. A., & KLEIN, J. (2025). Do you have 5 min? Improving Call Graph Analysis with Runtime Information. In Do you have 5 min? Improving Call Graph Analysis with Runtime Information. New York, United States: Association for Computing Machinery. doi:10.1145/3696630.3728495 Peer reviewed |
![]() | ALECCI, M., RUIZ JIMÉNEZ, P. J., Kevin Allix, BISSYANDE, T. F. D. A., & KLEIN, J. (2024). AndroZoo: A Retrospective with a Glimpse into the Future. 2024 IEEE/ACM 21st International Conference on Mining Software Repositories (MSR). doi:10.1145/3643991.3644863 Peer reviewed |
![]() | ALECCI, M., SAMHI, J., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Revisiting Android App Categorization. In ICSE '24: Proceedings of the 46th International Conference on Software Engineering. IEEE Press. doi:10.1145/3597503.3639094 Peer reviewed |
![]() | ALECCI, M., SAMHI, J., LI, L., BISSYANDE, T. F. D. A., & KLEIN, J. (2024). Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2024.3358979 Peer Reviewed verified by ORBi |
![]() | ALECCI, M., Conti, M., Marchiori, F., Martinelli, L., & Pajola, L. (2023). Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023. Association for Computing Machinery. doi:10.1145/3607199.3607227 Peer reviewed |
![]() | ALECCI, M., Attanasio, L., Brighente, A., Conti, M., Losiouk, E., Ochiai, H., & Turrin, F. (2023). Beware of Pickpockets: A Practical Attack against Blocking Cards. In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023. Association for Computing Machinery. doi:10.1145/3607199.3607243 Peer reviewed |