You Get Where You're Looking for: The Impact of Information Sources on Code Security, IEEE Symposium on Security and Privacy, pp.289-305, 2016. ,
Teaching operating systems using android, 43rd ACM technical symposium on Computer Science Education, pp.613-618, 2012. ,
Discovering authentication credentials in volatile memory of Android mobile devices, 12th IFIP Conference on e-Business, e-Services, pp.178-185, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01470532
Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities, 49th ACM Technical Symposium on Computer Science EducationSIGCSE '18, pp.179-184, 2018. ,
An Experience Report: Using Mobile Development To Teach Software Design, 46th ACM Technical Symposium on Computer Science Education-SIGCSE '15, pp.506-511, 2015. ,
Android Security Internals: An In-Depth Guide to Android's Security Architecture, 2014. ,
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones, 9th USENIX Symposium on Operating Systems Design and Implementation. USENIX Association, pp.393-407, 2010. ,
Augmenting Undergraduate Computer Science Education With Programmable Smartwatches, 46th ACM Technical Symposium on Computer Science Education-SIGCSE '15, pp.66-71, 2015. ,
Android Apps Security, 2012. ,
Learning mobile security with android security labware, 44th ACM technical symposium on Computer science education-SIGCSE '15, pp.675-680, 2013. ,
Post-Mortem Memory Analysis of Cold-Booted Android Devices, Eighth International Conference on IT Security Incident Management & IT Forensics, pp.62-75, 2014. ,
A Revision of Bloom's Taxonomy: An Overview, Theory Into Practice, vol.41, pp.212-218, 2002. ,
, Android Internals: A Confectioner's Cookbook, 2015.
Analysis of the communication between colluding applications on modern smartphones, 28th Annual Computer Security Applications Conference, pp.51-60, 2012. ,
Developing a Unique Android App-driven Nifty Middle-School Educational Module on Mobile Security for Driving Basic Information Security Awareness and Generating Interests in Cybersecurity, 49th ACM Technical Symposium on Computer Science Education-SIGCSE '18, pp.1081-1081, 2018. ,
Evaluating the privacy of Android mobile applications under forensic analysis, Computers & Security, vol.42, pp.66-76, 2014. ,
One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android, 9th USENIX Workshop on Offensive Technologies, pp.1-12, 2015. ,
Learning security through insecurity, 2nd International Conference on E-Learning and E-Technologies in Education, pp.143-148, 2013. ,
Data-in-use leakages from Android memory-Test and analysis, 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp.718-725, 2013. ,
Mobile application development classes for the mobile era, conference on Innovation & technology in computer science education, pp.141-146, 2014. ,
Teaching smartphones programming using (Android Java): Pedagogy and innovation, 2012 International Conference on Information Technology Based Higher Education and Training, pp.1-7, 2012. ,
DOI : 10.1109/ithet.2012.6246039
, A Smartphone App for Enhancing Students' Hands-on Learning on Network and DoS Attacks Traffic Generation, 17th Annual Conference on Information Technology Education, pp.48-53, 2016.
, Android based mobile apps for information security hands-on education, vol.22, pp.125-144, 2017.
Detecting Local Covert Channels Using Process Activity Correlation on Android Smartphones, International Journal of Computer Systems Science and Engineering, vol.32, issue.2, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01302828
Teaching mobile computing and mobile security, IEEE Frontiers in Education Conference, pp.1-6, 2016. ,
, Embedded Android: Porting, Extending, and Customizing