A dataset of open-source android applications DE Krutz, M Mirakhorli, SA Malachowsky, A Ruiz, J Peterson, A Filipski, ... 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 522-525, 2015 | 55 | 2015 |
Using a real world project in a software testing course DE Krutz, SA Malachowsky, T Reichlmayr Proceedings of the 45th ACM technical symposium on Computer science …, 2014 | 30 | 2014 |
CCCD: Concolic code clone detection DE Krutz, E Shihab 2013 20th Working Conference on Reverse Engineering (WCRE), 489-490, 2013 | 30 | 2013 |
A code clone oracle DE Krutz, W Le Proceedings of the 11th Working Conference on Mining Software Repositories …, 2014 | 22 | 2014 |
Who added that permission to my app? an analysis of developer permission changes in open source android apps DE Krutz, N Munaiah, A Peruma, MW Mkaouer 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering …, 2017 | 11 | 2017 |
M-perm: A lightweight detector for android permission gaps P Chester, C Jones, MW Mkaouer, DE Krutz 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering …, 2017 | 9 | 2017 |
Examining the relationship between security metrics and user ratings of mobile apps: a case study DE Krutz, N Munaiah, A Meneely, SA Malachowsky Proceedings of the International Workshop on App Market Analytics, 8-14, 2016 | 8 | 2016 |
Darwin: a static analysis dataset of malicious and benign android apps N Munaiah, C Klimkowsky, S McRae, A Blaine, SA Malachowsky, C Perez, ... Proceedings of the International Workshop on App Market Analytics, 26-29, 2016 | 8 | 2016 |
Instilling a software engineering mindset through freshman seminar MJ Lutz, JR Vallino, K Martinez, DE Krutz 2012 Frontiers in Education Conference Proceedings, 1-6, 2012 | 8 | 2012 |
Investigating user perception and comprehension of android permission models A Peruma, J Palmerino, DE Krutz Proceedings of the 5th International Conference on Mobile Software …, 2018 | 7 | 2018 |
P-lint: A permission smell detector for android applications C Dennis, DE Krutz, MW Mkaouer 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering …, 2017 | 7 | 2017 |
Apps for everyone: mobile accessibility learning modules YN El-Glaly, A Peruma, DE Krutz, JS Hawker ACM Inroads 9 (2), 30-33, 2018 | 5 | 2018 |
An insider threat activity in a software security course DE Krutz, A Meneely, SA Malachowsky 2015 IEEE Frontiers in Education Conference (FIE), 1-6, 2015 | 5 | 2015 |
Enhancing the educational experience for deaf and hard of hearing students in software engineering DE Krutz, SA Malachowsky, SD Jones, JA Kaplan 2015 IEEE Frontiers in Education Conference (FIE), 1-9, 2015 | 5 | 2015 |
Examining the Effectiveness of Using Concolic Analysis to Detect Code Clones DE Krutz, SA Malachowsky, E Shihab Symposium on Applied Computing, 2015 | 5 | 2015 |
An empirical history of permission requests and mistakes in open source android apps GL Scoccia, A Peruma, V Pujols, B Christians, D Krutz 2019 IEEE/ACM 16th International Conference on Mining Software Repositories …, 2019 | 4 | 2019 |
Cate: Concolic android testing using java pathfinder for android applications P McAfee, MW Mkaouer, DE Krutz 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering …, 2017 | 4 | 2017 |
Bug of the day: Reinforcing the importance of testing DE Krutz, M Lutz 2013 IEEE Frontiers in Education Conference (FIE), 1795-1799, 2013 | 4 | 2013 |
Permission Issues in Open-Source Android Apps: An Exploratory Study GL Scoccia, A Peruma, V Pujols, I Malavolta, DE Krutz 2019 19th International Working Conference on Source Code Analysis and …, 2019 | 3 | 2019 |
Understanding the relationship between quality and security: a large-scale analysis of Android applications A Peruma, D Krutz 2018 IEEE/ACM 1st International Workshop on Security Awareness from Design …, 2018 | 3 | 2018 |