\emphVulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation. Gajrani, J., Tripathi, M., Laxmi, V., Somani, G., Zemmari, A., & Gaur, M. S. DTRAP, 1(2):10:1–10:25, 2020. Paper doi bibtex @article{DBLP:journals/dtrap/GajraniTL0ZG20,
author = {Jyoti Gajrani and
Meenakshi Tripathi and
Vijay Laxmi and
Gaurav Somani and
Akka Zemmari and
Manoj Singh Gaur},
title = {\emph{Vulvet}: Vetting of Vulnerabilities in Android Apps to Thwart
Exploitation},
journal = {{DTRAP}},
volume = {1},
number = {2},
pages = {10:1--10:25},
year = {2020},
url = {https://doi.org/10.1145/3376121},
doi = {10.1145/3376121},
timestamp = {Tue, 26 Nov 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/dtrap/GajraniTL0ZG20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"oRxH26X7XLJLzsX3B","bibbaseid":"gajrani-tripathi-laxmi-somani-zemmari-gaur-emphvulvetvettingofvulnerabilitiesinandroidappstothwartexploitation-2020","author_short":["Gajrani, J.","Tripathi, M.","Laxmi, V.","Somani, G.","Zemmari, A.","Gaur, M. S."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Jyoti"],"propositions":[],"lastnames":["Gajrani"],"suffixes":[]},{"firstnames":["Meenakshi"],"propositions":[],"lastnames":["Tripathi"],"suffixes":[]},{"firstnames":["Vijay"],"propositions":[],"lastnames":["Laxmi"],"suffixes":[]},{"firstnames":["Gaurav"],"propositions":[],"lastnames":["Somani"],"suffixes":[]},{"firstnames":["Akka"],"propositions":[],"lastnames":["Zemmari"],"suffixes":[]},{"firstnames":["Manoj","Singh"],"propositions":[],"lastnames":["Gaur"],"suffixes":[]}],"title":"\\emphVulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation","journal":"DTRAP","volume":"1","number":"2","pages":"10:1–10:25","year":"2020","url":"https://doi.org/10.1145/3376121","doi":"10.1145/3376121","timestamp":"Tue, 26 Nov 2024 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/dtrap/GajraniTL0ZG20.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/dtrap/GajraniTL0ZG20,\n author = {Jyoti Gajrani and\n Meenakshi Tripathi and\n Vijay Laxmi and\n Gaurav Somani and\n Akka Zemmari and\n Manoj Singh Gaur},\n title = {\\emph{Vulvet}: Vetting of Vulnerabilities in Android Apps to Thwart\n Exploitation},\n journal = {{DTRAP}},\n volume = {1},\n number = {2},\n pages = {10:1--10:25},\n year = {2020},\n url = {https://doi.org/10.1145/3376121},\n doi = {10.1145/3376121},\n timestamp = {Tue, 26 Nov 2024 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/dtrap/GajraniTL0ZG20.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Gajrani, J.","Tripathi, M.","Laxmi, V.","Somani, G.","Zemmari, A.","Gaur, M. S."],"key":"DBLP:journals/dtrap/GajraniTL0ZG20","id":"DBLP:journals/dtrap/GajraniTL0ZG20","bibbaseid":"gajrani-tripathi-laxmi-somani-zemmari-gaur-emphvulvetvettingofvulnerabilitiesinandroidappstothwartexploitation-2020","role":"author","urls":{"Paper":"https://doi.org/10.1145/3376121"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://dblp.org/pers/tb2/g/Gaur:Manoj_Singh","dataSources":["dvnZAb5DbKvsvGk9M"],"keywords":[],"search_terms":["emphvulvet","vetting","vulnerabilities","android","apps","thwart","exploitation","gajrani","tripathi","laxmi","somani","zemmari","gaur"],"title":"\\emphVulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation","year":2020}