Alireza Sadeghi
Alireza Sadeghi
Verified email at - Homepage
Cited by
Cited by
Reducing combinatorics in GUI testing of android applications
N Mirzaei, J Garcia, H Bagheri, A Sadeghi, S Malek
Proceedings of the 38th international conference on software engineering …, 2016
Covert: Compositional analysis of android inter-app permission leakage
H Bagheri, A Sadeghi, J Garcia, S Malek
IEEE transactions on Software Engineering 41 (9), 866-886, 2015
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software
A Sadeghi, H Bagheri, J Garcia, S Malek
IEEE Transactions on Software Engineering, 2016
Ecodroid: An approach for energy-based ranking of android apps
RJ Behrouz, A Sadeghi, J Garcia, S Malek, P Ammann
2015 IEEE/ACM 4th International Workshop on Green and Sustainable Software, 8-14, 2015
Energy-aware test-suite minimization for android apps
R Jabbarvand, A Sadeghi, H Bagheri, S Malek
Proceedings of the 25th International Symposium on Software Testing and …, 2016
Patdroid: permission-aware gui testing of android
A Sadeghi, R Jabbarvand, S Malek
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
Practical, formal synthesis and automatic enforcement of security policies for android
H Bagheri, A Sadeghi, R Jabbarvand, S Malek
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
Analysis of android inter-app security vulnerabilities using covert
A Sadeghi, H Bagheri, S Malek
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015
A temporal permission analysis and enforcement framework for android
A Sadeghi, R Jabbarvand, N Ghorbani, H Bagheri, S Malek
Proceedings of the 40th International Conference on Software Engineering …, 2018
Software architectural principles in contemporary mobile software: from conception to practice
H Bagheri, J Garcia, A Sadeghi, S Malek, N Medvidovic
Journal of Systems and Software 119, 31-44, 2016
Automated dynamic enforcement of synthesized security policies in android
H Bagheri, A Sadeghi, R Jabbarvand, S Malek
George Mason University, Tech. Rep. GMU-CS-TR-2015-5, 2015
Mining the categorized software repositories to improve the analysis of security vulnerabilities
A Sadeghi, N Esfahani, S Malek
Fundamental Approaches to Software Engineering: 17th International …, 2014
Architecture modeling and analysis of security in android systems
B Schmerl, J Gennari, A Sadeghi, H Bagheri, S Malek, J Cámara, ...
Software Architecture: 10th European Conference, ECSA 2016, Copenhagen …, 2016
Ensuring the consistency of adaptation through inter-and intra-component dependency analysis
A Sadeghi, N Esfahani, S Malek
ACM Transactions on Software Engineering and Methodology (TOSEM) 26 (1), 1-27, 2017
Emphasizing experiences in teaching software engineering courses
SH Mirian-Hosseinabadi, Z Aghakasiri, A Sadeghi, P Delfani, ...
2010 2nd International Conference on Education Technology and Computer 2, V2 …, 2010
Mbtdd: Model based test driven development
A Sadeghi, SH Mirian-Hosseinabadi
International Journal of Software Engineering and Knowledge Engineering 22 …, 2012
Efficient permission-aware analysis of android apps
A Sadeghi
University of California, Irvine, 2018
Mining Mobile App Markets for Prioritization of Security Assessment Effort
A Sadeghi, N Esfahani, S Malek
2nd International Workshop on App Market Analytics (WAMA 2017), 2017
Automated detection and mitigation of inter-application security vulnerabilities in android (invited talk)
S Malek, H Bagheri, A Sadeghi
Proceedings of the 2nd International Workshop on Software Development …, 2014
Security and software engineering
S Malek, H Bagheri, J Garcia, A Sadeghi
Handbook of Software Engineering, 445-489, 2019
The system can't perform the operation now. Try again later.
Articles 1–20