Follow
Hamid Bagheri
Hamid Bagheri
University of Nebraska-Lincoln
Verified email at mit.edu
Title
Cited by
Cited by
Year
Covert: Compositional analysis of android inter-app permission leakage
H Bagheri, A Sadeghi, J Garcia, S Malek
IEEE transactions on Software Engineering 41 (9), 866-886, 2015
1432015
Reducing combinatorics in GUI testing of android applications
N Mirzaei, J Garcia, H Bagheri, A Sadeghi, S Malek
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
1382016
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
A Sadeghi, H Bagheri, J Garcia, S Malek
IEEE Transactions on Software Engineering 43 (6), 492-530, 2016
1352016
Sig-droid: Automated system input generation for android applications
N Mirzaei, H Bagheri, R Mahmood, S Malek
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
762015
Energy-aware test-suite minimization for android apps
R Jabbarvand, A Sadeghi, H Bagheri, S Malek
Proceedings of the 25th International Symposium on Software Testing and …, 2016
682016
Practical, formal synthesis and automatic enforcement of security policies for android
H Bagheri, A Sadeghi, R Jabbarvand, S Malek
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
512016
Big Data: challenges, opportunities and Cloud based solutions
H Bagheri, AA Shaltooki
International Journal of Electrical and Computer Engineering 5 (2), 340, 2015
512015
Analysis of android inter-app security vulnerabilities using covert
A Sadeghi, H Bagheri, S Malek
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015
502015
Detection of design flaws in the android permission protocol through bounded verification
H Bagheri, E Kang, S Malek, D Jackson
International Symposium on Formal Methods, 73-89, 2015
492015
Software architectural principles in contemporary mobile software: from conception to practice
H Bagheri, J Garcia, A Sadeghi, S Malek, N Medvidovic
Journal of Systems and Software 119, 31-44, 2016
412016
A formal approach for detection of security flaws in the android permission system
H Bagheri, E Kang, S Malek, D Jackson
Formal Aspects of Computing 30 (5), 525-544, 2018
392018
A study on the role of software architecture in the evolution and quality of software
E Kouroshfar, M Mirakhorli, H Bagheri, L Xiao, S Malek, Y Cai
2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 246-257, 2015
382015
A temporal permission analysis and enforcement framework for android
A Sadeghi, R Jabbarvand, N Ghorbani, H Bagheri, S Malek
Proceedings of the 40th International Conference on Software Engineering …, 2018
322018
Parallel optical interconnects for enterprise class server clusters: Needs and technology solutions
J Trezza, H Hamster, J Iamartino, H Bagheri, C DeCusatis
IEEE Communications Magazine 41 (2), S36-S42, 2003
322003
Trademaker: Automated dynamic analysis of synthesized tradespaces
H Bagheri, C Tang, K Sullivan
Proceedings of the 36th International Conference on Software Engineering …, 2014
302014
Monarch: Model-based development of software architectures
H Bagheri, K Sullivan
International Conference on Model Driven Engineering Languages and Systems …, 2010
302010
Sentiment analysis of twitter data
H Bagheri, MJ Islam
arXiv preprint arXiv:1711.10377, 2017
292017
Scalable analysis of interaction threats in iot systems
M Alhanahnah, C Stevens, H Bagheri
Proceedings of the 29th ACM SIGSOFT international symposium on software …, 2020
282020
Titanium: efficient analysis of evolving alloy specifications
H Bagheri, S Malek
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
262016
Model-driven synthesis of formally precise, stylized software architectures
H Bagheri, K Sullivan
Formal Aspects of Computing 28 (3), 441-467, 2016
232016
The system can't perform the operation now. Try again later.
Articles 1–20