Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yajin Zhou
@article{DBLP:journals/tse/GaoXDCYZJ24, author = {Zicong Gao and Hao Xiong and Weiyu Dong and Rui Chang and Rui Yang and Yajin Zhou and Liehui Jiang}, title = {FA-Fuzz: {A} Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing}, journal = {{IEEE} Trans. Software Eng.}, volume = {50}, number = {1}, pages = {1--15}, year = {2024}, url = {https://doi.org/10.1109/TSE.2023.3326144}, doi = {10.1109/TSE.2023.3326144}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/GaoXDCYZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-04662, author = {Pengcheng Xia and Zhou Yu and Kailong Wang and Kai Ma and Shuo Chen and Xiapu Luo and Yajin Zhou and Lei Wu and Guangdong Bai and Haoyu Wang}, title = {The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web}, journal = {CoRR}, volume = {abs/2401.04662}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.04662}, doi = {10.48550/ARXIV.2401.04662}, eprinttype = {arXiv}, eprint = {2401.04662}, timestamp = {Thu, 01 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-04662.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taco/HeZCLZLZLJLCZ23, author = {Bowen He and Xiao Zheng and Yuan Chen and Weinan Li and Yajin Zhou and Xin Long and Pengcheng Zhang and Xiaowei Lu and Linquan Jiang and Qiang Liu and Dennis Cai and Xiantao Zhang}, title = {DxPU: Large-scale Disaggregated {GPU} Pools in the Datacenter}, journal = {{ACM} Trans. Archit. Code Optim.}, volume = {20}, number = {4}, pages = {55:1--55:23}, year = {2023}, url = {https://doi.org/10.1145/3617995}, doi = {10.1145/3617995}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/taco/HeZCLZLZLJLCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LinWCWZR23, author = {Jian Lin and Dingding Wang and Rui Chang and Lei Wu and Yajin Zhou and Kui Ren}, title = {EnBinDiff: Identifying Data-Only Patches for Binaries}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {1}, pages = {343--359}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2021.3133500}, doi = {10.1109/TDSC.2021.3133500}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LinWCWZR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HeGSSZWL23, author = {Yi He and Yacong Gu and Purui Su and Kun Sun and Yajin Zhou and Zhi Wang and Qi Li}, title = {A Systematic Study of Android Non-SDK (Hidden) Service {API} Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1609--1623}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3160872}, doi = {10.1109/TDSC.2022.3160872}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HeGSSZWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/JiangDZCZLWLR23, author = {Muhui Jiang and Qinming Dai and Wenlong Zhang and Rui Chang and Yajin Zhou and Xiapu Luo and Ruoyu Wang and Yang Liu and Kui Ren}, title = {A Comprehensive Study on {ARM} Disassembly Tools}, journal = {{IEEE} Trans. Software Eng.}, volume = {49}, number = {4}, pages = {1683--1703}, year = {2023}, url = {https://doi.org/10.1109/TSE.2022.3187811}, doi = {10.1109/TSE.2022.3187811}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/JiangDZCZLWLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/QianHLWLWZH23, author = {Peng Qian and Jianting He and Lingling Lu and Siwei Wu and Zhipeng Lu and Lei Wu and Yajin Zhou and Qinming He}, title = {Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection}, journal = {{IEEE} Trans. Software Eng.}, volume = {49}, number = {7}, pages = {3793--3810}, year = {2023}, url = {https://doi.org/10.1109/TSE.2023.3271417}, doi = {10.1109/TSE.2023.3271417}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/QianHLWLWZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/YuanHCZS023, author = {Ziqi Yuan and Siyu Hong and Rui Chang and Yajin Zhou and Wenbo Shen and Kui Ren}, editor = {Tor M. Aamodt and Natalie D. Enright Jerger and Michael M. Swift}, title = {VDom: Fast and Unlimited Virtual Domains on Multiple Architectures}, booktitle = {Proceedings of the 28th {ACM} International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2, {ASPLOS} 2023, Vancouver, BC, Canada, March 25-29, 2023}, pages = {905--919}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3575693.3575735}, doi = {10.1145/3575693.3575735}, timestamp = {Thu, 02 Feb 2023 08:17:52 +0100}, biburl = {https://dblp.org/rec/conf/asplos/YuanHCZS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeCCHHWCWZ23, author = {Bowen He and Yuan Chen and Zhuo Chen and Xiaohui Hu and Yufeng Hu and Lei Wu and Rui Chang and Haoyu Wang and Yajin Zhou}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {120--134}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623210}, doi = {10.1145/3576915.3623210}, timestamp = {Wed, 13 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeCCHHWCWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaYLZSZ023, author = {Boyang Ma and Yilin Yang and Jinku Li and Fengwei Zhang and Wenbo Shen and Yajin Zhou and Jianfeng Ma}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Travelling the Hypervisor and {SSD:} {A} Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {341--355}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616665}, doi = {10.1145/3576915.3616665}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MaYLZSZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/WuCZWZ23, author = {Huamao Wu and Yuan Chen and Yajin Zhou and Yifei Wang and Lubo Zhang}, title = {DriverJar: Lightweight Device Driver Isolation for {ARM}}, booktitle = {60th {ACM/IEEE} Design Automation Conference, {DAC} 2023, San Francisco, CA, USA, July 9-13, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DAC56929.2023.10247974}, doi = {10.1109/DAC56929.2023.10247974}, timestamp = {Sun, 24 Sep 2023 13:31:06 +0200}, biburl = {https://dblp.org/rec/conf/dac/WuCZWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/ChenLHWZHLWLQ23, author = {Zhuo Chen and Jie Liu and Yubo Hu and Lei Wu and Yajin Zhou and Yiling He and Xianhao Liao and Ke Wang and Jinku Li and Zhan Qin}, editor = {Ren{\'{e}} Just and Gordon Fraser}, title = {DeUEDroid: Detecting Underground Economy Apps Based on {UTG} Similarity}, booktitle = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July 17-21, 2023}, pages = {223--235}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3597926.3598051}, doi = {10.1145/3597926.3598051}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issta/ChenLHWZHLWLQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MaZWZCXWR23, author = {Lin Ma and Duoming Zhou and Hanjie Wu and Yajin Zhou and Rui Chang and Hao Xiong and Lei Wu and Kui Ren}, title = {When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2138--2154}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179356}, doi = {10.1109/SP46215.2023.10179356}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/MaZWZCXWR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiuTZP23, author = {Qiang Liu and Flavio Toffalini and Yajin Zhou and Mathias Payer}, title = {ViDeZZo: Dependency-aware Virtual Device Fuzzing}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {3228--3245}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179354}, doi = {10.1109/SP46215.2023.10179354}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiuTZP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XuLHLZ023, author = {Jinyan Xu and Yiyuan Liu and Sirui He and Haoran Lin and Yajin Zhou and Cong Wang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {1307--1324}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/xu-jinyan}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/XuLHLZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-12645, author = {Peng Qian and Jianting He and Lingling Lu and Siwei Wu and Zhipeng Lu and Lei Wu and Yajin Zhou and Qinming He}, title = {Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection}, journal = {CoRR}, volume = {abs/2304.12645}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.12645}, doi = {10.48550/ARXIV.2304.12645}, eprinttype = {arXiv}, eprint = {2304.12645}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-12645.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-04648, author = {Bowen He and Xiao Zheng and Yuan Chen and Weinan Li and Yajin Zhou and Xin Long and Pengcheng Zhang and Xiaowei Lu and Linquan Jiang and Qiang Liu and Dennis Cai and Xiantao Zhang}, title = {DxPU: Large Scale Disaggregated {GPU} Pools in the Datacenter}, journal = {CoRR}, volume = {abs/2310.04648}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.04648}, doi = {10.48550/ARXIV.2310.04648}, eprinttype = {arXiv}, eprint = {2310.04648}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-04648.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-04941, author = {Jiaqi Li and Ke Wang and Yaoguang Chen and Yajin Zhou and Lei Wu and Jiashui Wang}, title = {Detecting {DBMS} Bugs with Context-Sensitive Instantiation and Multi-Plan Execution}, journal = {CoRR}, volume = {abs/2312.04941}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.04941}, doi = {10.48550/ARXIV.2312.04941}, eprinttype = {arXiv}, eprint = {2312.04941}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-04941.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZhouZCLZLRTZ22, author = {Zhelei Zhou and Bingsheng Zhang and Yuan Chen and Jiaqi Li and Yajin Zhou and Yibiao Lu and Kui Ren and Phuc Thai and Hong{-}Sheng Zhou}, title = {Scriptable and composable SNARKs in the trusted hardware model}, journal = {J. Comput. Secur.}, volume = {30}, number = {6}, pages = {757--793}, year = {2022}, url = {https://doi.org/10.3233/JCS-210167}, doi = {10.3233/JCS-210167}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZhouZCLZLRTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HeZZLSGJ22, author = {Yi He and Yuan Zhou and Yajin Zhou and Qi Li and Kun Sun and Yacong Gu and Yong Jiang}, title = {{JNI} Global References Are Still Vulnerable: Attacks and Defenses}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {607--619}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2995542}, doi = {10.1109/TDSC.2020.2995542}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HeZZLSGJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/QiuYWZLM22, author = {Jun Qiu and Xuewu Yang and Huamao Wu and Yajin Zhou and Jinku Li and Jianfeng Ma}, title = {LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {2873--2889}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3075817}, doi = {10.1109/TDSC.2021.3075817}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/QiuYWZLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/WuWZLWLWR22, author = {Siwei Wu and Lei Wu and Yajin Zhou and Runhuai Li and Zhi Wang and Xiapu Luo and Cong Wang and Kui Ren}, title = {Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {31}, number = {3}, pages = {54:1--54:33}, year = {2022}, url = {https://doi.org/10.1145/3505263}, doi = {10.1145/3505263}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/WuWZLWLWR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/XueZLYWZM22, author = {Lei Xue and Hao Zhou and Xiapu Luo and Le Yu and Dinghao Wu and Yajin Zhou and Xiaobo Ma}, title = {PackerGrind: An Adaptive Unpacking System for Android Apps}, journal = {{IEEE} Trans. Software Eng.}, volume = {48}, number = {2}, pages = {551--570}, year = {2022}, url = {https://doi.org/10.1109/TSE.2020.2996433}, doi = {10.1109/TSE.2020.2996433}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/XueZLYWZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/TangWZLZZYSK22, author = {Yutian Tang and Haoyu Wang and Xian Zhan and Xiapu Luo and Yajin Zhou and Hao Zhou and Qiben Yan and Yulei Sui and Jacky Keung}, title = {A Systematical Study on Application Performance Management Libraries for Apps}, journal = {{IEEE} Trans. Software Eng.}, volume = {48}, number = {8}, pages = {3044--3065}, year = {2022}, url = {https://doi.org/10.1109/TSE.2021.3077654}, doi = {10.1109/TSE.2021.3077654}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/TangWZLZZYSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/JiangXZHZWL022, author = {Muhui Jiang and Tianyi Xu and Yajin Zhou and Yufeng Hu and Ming Zhong and Lei Wu and Xiapu Luo and Kui Ren}, editor = {Babak Falsafi and Michael Ferdman and Shan Lu and Thomas F. Wenisch}, title = {{EXAMINER:} automatically locating inconsistent instructions between real devices and {CPU} emulators for {ARM}}, booktitle = {{ASPLOS} '22: 27th {ACM} International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022 - 4 March 2022}, pages = {846--858}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3503222.3507736}, doi = {10.1145/3503222.3507736}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asplos/JiangXZHZWL022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/XuLYSZC0022, author = {Jinyan Xu and Haoran Lin and Ziqi Yuan and Wenbo Shen and Yajin Zhou and Rui Chang and Lei Wu and Kui Ren}, editor = {Rob Oshana}, title = {RegVault: hardware assisted selective data randomization for operating system kernels}, booktitle = {{DAC} '22: 59th {ACM/IEEE} Design Automation Conference, San Francisco, California, USA, July 10 - 14, 2022}, pages = {715--720}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3489517.3530549}, doi = {10.1145/3489517.3530549}, timestamp = {Thu, 25 Aug 2022 14:23:32 +0200}, biburl = {https://dblp.org/rec/conf/dac/XuLYSZC0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/ZhouLZZS022, author = {Xia Zhou and Jiaqi Li and Wenlong Zhang and Yajin Zhou and Wenbo Shen and Kui Ren}, editor = {Y{\'{e}}rom{-}David Bromberg and Anne{-}Marie Kermarrec and Christos Kozyrakis}, title = {{OPEC:} operation-based security isolation for bare-metal embedded systems}, booktitle = {EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5 - 8, 2022}, pages = {317--333}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3492321.3519573}, doi = {10.1145/3492321.3519573}, timestamp = {Wed, 13 Apr 2022 13:48:01 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/ZhouLZZS022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/ZhouWLWZZC22, author = {Hao Zhou and Shuohan Wu and Xiapu Luo and Ting Wang and Yajin Zhou and Chao Zhang and Haipeng Cai}, editor = {Sukyoung Ryu and Yannis Smaragdakis}, title = {NCScope: hardware-assisted analyzer for native code in Android apps}, booktitle = {{ISSTA} '22: 31st {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18 - 22, 2022}, pages = {629--641}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3533767.3534410}, doi = {10.1145/3533767.3534410}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issta/ZhouWLWZZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Zhou0L0Z022, author = {Hao Zhou and Haoyu Wang and Xiapu Luo and Ting Chen and Yajin Zhou and Ting Wang}, title = {Uncovering Cross-Context Inconsistent Access Control Enforcement in Android}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-190/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Zhou0L0Z022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangFWZ0Y22, author = {Dabao Wang and Hang Feng and Siwei Wu and Yajin Zhou and Lei Wu and Xingliang Yuan}, title = {Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of {ERC20} Tokens on Ethereum}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {99--114}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545963}, doi = {10.1145/3545948.3545963}, timestamp = {Thu, 20 Oct 2022 10:46:43 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangFWZ0Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001LLZLYLZG22, author = {Lei Xue and Yangyang Liu and Tianqi Li and Kaifa Zhao and Jianfeng Li and Le Yu and Xiapu Luo and Yajin Zhou and Guofei Gu}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {{SAID:} State-aware Defense Against Injection Attacks on In-vehicle Network}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1921--1938}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/xue-lei}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0001LLZLYLZG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YuLJL0ZZ0GNW22, author = {Le Yu and Yangyang Liu and Pengfei Jing and Xiapu Luo and Lei Xue and Kaifa Zhao and Yajin Zhou and Ting Wang and Guofei Gu and Sen Nie and Shi Wu}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1939--1956}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/yu-le}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/YuLJL0ZZ0GNW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenLXZ00022, author = {Yuan Chen and Jiaqi Li and Guorui Xu and Yajin Zhou and Zhi Wang and Cong Wang and Kui Ren}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for {SGX}}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4129--4146}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/chen-yuan}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenLXZ00022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-09374, author = {Yi He and Yacong Gu and Purui Su and Kun Sun and Yajin Zhou and Zhi Wang and Qi Li}, title = {A Systematic Study of Android Non-SDK (Hidden) Service {API} Security}, journal = {CoRR}, volume = {abs/2203.09374}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.09374}, doi = {10.48550/ARXIV.2203.09374}, eprinttype = {arXiv}, eprint = {2203.09374}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-09374.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-01790, author = {Dabao Wang and Hang Feng and Siwei Wu and Yajin Zhou and Lei Wu and Xingliang Yuan}, title = {Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of {ERC20} Tokens on Ethereum}, journal = {CoRR}, volume = {abs/2207.01790}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.01790}, doi = {10.48550/ARXIV.2207.01790}, eprinttype = {arXiv}, eprint = {2207.01790}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-01790.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-01837, author = {Jingyi Guo and Min Zheng and Yajin Zhou and Haoyu Wang and Lei Wu and Xiapu Luo and Kui Ren}, title = {iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps}, journal = {CoRR}, volume = {abs/2207.01837}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.01837}, doi = {10.48550/ARXIV.2207.01837}, eprinttype = {arXiv}, eprint = {2207.01837}, timestamp = {Wed, 14 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-01837.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-01317, author = {Zhuo Chen and Jie Liu and Yubo Hu and Lei Wu and Yajin Zhou and Xianhao Liao and Ke Wang}, title = {Illegal But Not Malware: An Underground Economy App Detection System Based on Usage Scenario}, journal = {CoRR}, volume = {abs/2209.01317}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.01317}, doi = {10.48550/ARXIV.2209.01317}, eprinttype = {arXiv}, eprint = {2209.01317}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-01317.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-07911, author = {Haoran Lin and Yajin Zhou and Lei Wu}, title = {Operation-level Concurrent Transaction Execution for Blockchains}, journal = {CoRR}, volume = {abs/2211.07911}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.07911}, doi = {10.48550/ARXIV.2211.07911}, eprinttype = {arXiv}, eprint = {2211.07911}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-07911.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/WangHWXLWZLSGX21, author = {Liu Wang and Ren He and Haoyu Wang and Pengcheng Xia and Yuanchun Li and Lei Wu and Yajin Zhou and Xiapu Luo and Yulei Sui and Yao Guo and Guoai Xu}, title = {Beyond the virus: a first look at coronavirus-themed Android malware}, journal = {Empir. Softw. Eng.}, volume = {26}, number = {4}, pages = {82}, year = {2021}, url = {https://doi.org/10.1007/s10664-021-09974-4}, doi = {10.1007/S10664-021-09974-4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ese/WangHWXLWZLSGX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhengWWFSLZ21, author = {Wei Zheng and Ying Wu and Xiaoxue Wu and Chen Feng and Yulei Sui and Xiapu Luo and Yajin Zhou}, title = {A survey of Intel {SGX} and its applications}, journal = {Frontiers Comput. Sci.}, volume = {15}, number = {3}, pages = {153808}, year = {2021}, url = {https://doi.org/10.1007/s11704-019-9096-y}, doi = {10.1007/S11704-019-9096-Y}, timestamp = {Sun, 03 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhengWWFSLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhongZC21, author = {Ming Zhong and Yajin Zhou and Gang Chen}, title = {A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5542543:1--5542543:13}, year = {2021}, url = {https://doi.org/10.1155/2021/5542543}, doi = {10.1155/2021/5542543}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhongZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhongZC21, author = {Ming Zhong and Yajin Zhou and Gang Chen}, title = {Sequential Model Based Intrusion Detection System for IoT Servers Using Deep Learning Methods}, journal = {Sensors}, volume = {21}, number = {4}, pages = {1113}, year = {2021}, url = {https://doi.org/10.3390/s21041113}, doi = {10.3390/S21041113}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ZhongZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuWZGLLX21, author = {Yangyu Hu and Haoyu Wang and Yajin Zhou and Yao Guo and Li Li and Bingxuan Luo and Fangren Xu}, title = {Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1033--1050}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2908939}, doi = {10.1109/TDSC.2019.2908939}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuWZGLLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CuiZWWDW21, author = {Helei Cui and Yajin Zhou and Cong Wang and Xinyu Wang and Yuefeng Du and Qian Wang}, title = {{PPSB:} An Open and Flexible Platform for Privacy-Preserving Safe Browsing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1762--1778}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2937783}, doi = {10.1109/TDSC.2019.2937783}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CuiZWWDW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsys/MaXSZXSC021, author = {Lin Ma and Jinyan Xu and Jiadong Sun and Yajin Zhou and Xun Xie and Wenbo Shen and Rui Chang and Kui Ren}, editor = {Haryadi S. Gunawi and Xiaosong Ma}, title = {Revisiting challenges for selective data protection of real applications}, booktitle = {APSys '21: 12th {ACM} {SIGOPS} Asia-Pacific Workshop on Systems, Hong Kong, China, August 24-25, 2021}, pages = {138--145}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3476886.3477504}, doi = {10.1145/3476886.3477504}, timestamp = {Mon, 23 Aug 2021 08:26:58 +0200}, biburl = {https://dblp.org/rec/conf/apsys/MaXSZXSC021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiangMZLZWLW021, author = {Muhui Jiang and Lin Ma and Yajin Zhou and Qiang Liu and Cen Zhang and Zhi Wang and Xiapu Luo and Lei Wu and Kui Ren}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {{ECMO:} Peripheral Transplantation to Rehost Embedded Linux Kernels}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {734--748}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484753}, doi = {10.1145/3460120.3484753}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiangMZLZWLW021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhangCLZTZ021, author = {Bingsheng Zhang and Yuan Chen and Jiaqi Li and Yajin Zhou and Phuc Thai and Hong{-}Sheng Zhou and Kui Ren}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Succinct Scriptable {NIZK} via Trusted Hardware}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {430--451}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_21}, doi = {10.1007/978-3-030-88418-5\_21}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ZhangCLZTZ021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/0001YYJLWZ21, author = {Lei Xue and Yuxiao Yan and Luyi Yan and Muhui Jiang and Xiapu Luo and Dinghao Wu and Yajin Zhou}, editor = {Cristian Cadar and Xiangyu Zhang}, title = {Parema: an unpacking framework for demystifying VM-based Android packers}, booktitle = {{ISSTA} '21: 30th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, Virtual Event, Denmark, July 11-17, 2021}, pages = {152--164}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460319.3464839}, doi = {10.1145/3460319.3464839}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issta/0001YYJLWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/ZhouWWLZC021, author = {Hao Zhou and Haoyu Wang and Shuohan Wu and Xiapu Luo and Yajin Zhou and Ting Chen and Ting Wang}, title = {Finding the Missing Piece: Permission Specification Analysis for Android {NDK}}, booktitle = {36th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2021, Melbourne, Australia, November 15-19, 2021}, pages = {505--516}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ASE51524.2021.9678843}, doi = {10.1109/ASE51524.2021.9678843}, timestamp = {Wed, 14 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/ZhouWWLZC021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/LiuZMJZWSLL021, author = {Qiang Liu and Cen Zhang and Lin Ma and Muhui Jiang and Yajin Zhou and Lei Wu and Wenbo Shen and Xiapu Luo and Yang Liu and Kui Ren}, title = {FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution}, booktitle = {36th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2021, Melbourne, Australia, November 15-19, 2021}, pages = {792--804}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ASE51524.2021.9678653}, doi = {10.1109/ASE51524.2021.9678653}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/LiuZMJZWSLL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhengBZZQ21, author = {Min Zheng and Xiaolong Bai and Yajin Zhou and Chao Zhang and Fuping Qu}, title = {{POP} and {PUSH:} Demystifying and Defending against (Mach) Port-oriented Programming}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/pop-and-push-demystifying-and-defending-against-mach-port-oriented-programming/}, timestamp = {Tue, 31 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ZhengBZZQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seed/ZhangYCZ21, author = {Xingjian Zhang and Ziqi Yuan and Rui Chang and Yajin Zhou}, title = {Seeds of {SEED:} H\({}^{\mbox{2}}\)Cache: Building a Hybrid Randomized Cache Hierarchy for Mitigating Cache Side-Channel Attacks}, booktitle = {2021 International Symposium on Secure and Private Execution Environment Design (SEED), Washington, DC, USA, September 20-21, 2021}, pages = {29--36}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SEED51797.2021.00014}, doi = {10.1109/SEED51797.2021.00014}, timestamp = {Tue, 08 Nov 2022 13:30:39 +0100}, biburl = {https://dblp.org/rec/conf/seed/ZhangYCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/GaoWXWZLT21, author = {Bingyu Gao and Haoyu Wang and Pengcheng Xia and Siwei Wu and Yajin Zhou and Xiapu Luo and Gareth Tyson}, editor = {Longbo Huang and Anshul Gandhi and Negar Kiyavash and Jia Wang}, title = {Tracking Counterfeit Cryptocurrency End-to-end}, booktitle = {{SIGMETRICS} '21: {ACM} {SIGMETRICS} / International Conference on Measurement and Modeling of Computer Systems, Virtual Event, China, June 14-18, 2021}, pages = {33--34}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3410220.3456282}, doi = {10.1145/3410220.3456282}, timestamp = {Thu, 24 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/GaoWXWZLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/ChenGLCZZZ21, author = {Yang Chen and Zhongxin Guo and Runhuai Li and Shuo Chen and Lidong Zhou and Yajin Zhou and Xian Zhang}, editor = {Robbert van Renesse and Nickolai Zeldovich}, title = {Forerunner: Constraint-based Speculative Transaction Execution for Ethereum}, booktitle = {{SOSP} '21: {ACM} {SIGOPS} 28th Symposium on Operating Systems Principles, Virtual Event / Koblenz, Germany, October 26-29, 2021}, pages = {570--587}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3477132.3483564}, doi = {10.1145/3477132.3483564}, timestamp = {Tue, 01 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sosp/ChenGLCZZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/XueZLZSGZA21, author = {Lei Xue and Hao Zhou and Xiapu Luo and Yajin Zhou and Yang Shi and Guofei Gu and Fengwei Zhang and Man Ho Au}, title = {Happer: Unpacking Android Apps via a Hardware-Assisted Approach}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1641--1658}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00105}, doi = {10.1109/SP40001.2021.00105}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/XueZLZSGZA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/WuHZWLW0021, author = {Lei Wu and Yufeng Hu and Yajin Zhou and Haoyu Wang and Xiapu Luo and Zhi Wang and Fan Zhang and Kui Ren}, editor = {Jure Leskovec and Marko Grobelnik and Marc Najork and Jie Tang and Leila Zia}, title = {Towards Understanding and Demystifying Bitcoin Mixing Services}, booktitle = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021}, pages = {33--44}, publisher = {{ACM} / {IW3C2}}, year = {2021}, url = {https://doi.org/10.1145/3442381.3449880}, doi = {10.1145/3442381.3449880}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/WuHZWLW0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-11286, author = {Yutian Tang and Haoyu Wang and Xian Zhan and Xiapu Luo and Yajin Zhou and Hao Zhou and Qiben Yan and Yulei Sui and Jacky Keung}, title = {A Systematical Study on Application Performance Management Libraries for Apps}, journal = {CoRR}, volume = {abs/2103.11286}, year = {2021}, url = {https://arxiv.org/abs/2103.11286}, eprinttype = {arXiv}, eprint = {2103.11286}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-11286.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-15068, author = {Siwei Wu and Dabao Wang and Jianting He and Yajin Zhou and Lei Wu and Xingliang Yuan and Qinming He and Kui Ren}, title = {DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications}, journal = {CoRR}, volume = {abs/2104.15068}, year = {2021}, url = {https://arxiv.org/abs/2104.15068}, eprinttype = {arXiv}, eprint = {2104.15068}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-15068.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-14251, author = {Lin Ma and Jinyan Xu and Jiadong Sun and Yajin Zhou and Xun Xie and Wenbo Shen and Rui Chang and Kui Ren}, title = {Revisiting Challenges for Selective Data Protection of Real Applications}, journal = {CoRR}, volume = {abs/2105.14251}, year = {2021}, url = {https://arxiv.org/abs/2105.14251}, eprinttype = {arXiv}, eprint = {2105.14251}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-14251.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-14273, author = {Muhui Jiang and Tianyi Xu and Yajin Zhou and Yufeng Hu and Ming Zhong and Lei Wu and Xiapu Luo and Kui Ren}, title = {Examiner: Automatically Locating Inconsistent Instructions Between Real Devices and {CPU} Emulators for {ARM}}, journal = {CoRR}, volume = {abs/2105.14273}, year = {2021}, url = {https://arxiv.org/abs/2105.14273}, eprinttype = {arXiv}, eprint = {2105.14273}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-14273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-14295, author = {Muhui Jiang and Lin Ma and Yajin Zhou and Qiang Liu and Cen Zhang and Zhi Wang and Xiapu Luo and Lei Wu and Kui Ren}, title = {{ECMO:} Peripheral Transplantation to Rehost Embedded Linux Kernels}, journal = {CoRR}, volume = {abs/2105.14295}, year = {2021}, url = {https://arxiv.org/abs/2105.14295}, eprinttype = {arXiv}, eprint = {2105.14295}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-14295.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-14298, author = {Dingding Wang and Muhui Jiang and Rui Chang and Yajin Zhou and Baolei Hou and Xiapu Luo and Lei Wu and Kui Ren}, title = {A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices}, journal = {CoRR}, volume = {abs/2105.14298}, year = {2021}, url = {https://arxiv.org/abs/2105.14298}, eprinttype = {arXiv}, eprint = {2105.14298}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-14298.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-05756, author = {Zhuo Chen and Lei Wu and Jing Cheng and Yubo Hu and Yajin Zhou and Zhushou Tang and Yexuan Chen and Jinku Li and Kui Ren}, title = {Lifting The Grey Curtain: {A} First Look at the Ecosystem of {CULPRITWARE}}, journal = {CoRR}, volume = {abs/2106.05756}, year = {2021}, url = {https://arxiv.org/abs/2106.05756}, eprinttype = {arXiv}, eprint = {2106.05756}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-05756.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pomacs/GaoWXWZLT20, author = {Bingyu Gao and Haoyu Wang and Pengcheng Xia and Siwei Wu and Yajin Zhou and Xiapu Luo and Gareth Tyson}, title = {Tracking Counterfeit Cryptocurrency End-to-end}, journal = {Proc. {ACM} Meas. Anal. Comput. Syst.}, volume = {4}, number = {3}, pages = {50:1--50:28}, year = {2020}, url = {https://doi.org/10.1145/3428335}, doi = {10.1145/3428335}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pomacs/GaoWXWZLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuLZM20, author = {Xiaonan Zhu and Jinku Li and Yajin Zhou and Jianfeng Ma}, title = {AdCapsule: Practical Confinement of Advertisements in Android Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {479--492}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2814999}, doi = {10.1109/TDSC.2018.2814999}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuLZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangDYZR20, author = {Fan Zhang and Xiaofei Dong and Bolin Yang and Yajin Zhou and Kui Ren}, title = {A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1407--1422}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2941774}, doi = {10.1109/TIFS.2019.2941774}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangDYZR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuFHH0QZ020, author = {Wen{-}jie Lu and Yixuan Fang and Zhicong Huang and Cheng Hong and Chaochao Chen and Hunter Qu and Yajin Zhou and Kui Ren}, editor = {Benyu Zhang and Raluca Ada Popa and Matei Zaharia and Guofei Gu and Shouling Ji}, title = {Faster Secure Multiparty Computation of Adaptive Gradient Descent}, booktitle = {PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, Virtual Event, USA, November, 2020}, pages = {47--49}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411501.3419427}, doi = {10.1145/3411501.3419427}, timestamp = {Wed, 17 Nov 2021 13:40:25 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuFHH0QZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/SunZSZ020, author = {Jiadong Sun and Xia Zhou and Wenbo Shen and Yajin Zhou and Kui Ren}, editor = {Vassil Roussev and Bhavani Thuraisingham and Barbara Carminati and Murat Kantarcioglu}, title = {{PESC:} {A} Per System-Call Stack Canary Design for Linux Kernel}, booktitle = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020}, pages = {365--375}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3374664.3375734}, doi = {10.1145/3374664.3375734}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/SunZSZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/XiaWLWZBXHL20, author = {Pengcheng Xia and Haoyu Wang and Xiapu Luo and Lei Wu and Yajin Zhou and Guangdong Bai and Guoai Xu and Gang Huang and Xuanzhe Liu}, title = {Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--14}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493255}, doi = {10.1109/ECRIME51433.2020.9493255}, timestamp = {Mon, 09 Aug 2021 09:09:23 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/XiaWLWZBXHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/00010LJ0ZWC020, author = {Kui Ren and Yu Guo and Jiaqi Li and Xiaohua Jia and Cong Wang and Yajin Zhou and Sheng Wang and Ning Cao and Feifei Li}, title = {HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services}, booktitle = {40th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2020, Singapore, November 29 - December 1, 2020}, pages = {23--33}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDCS47774.2020.00014}, doi = {10.1109/ICDCS47774.2020.00014}, timestamp = {Sat, 06 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/00010LJ0ZWC020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/JiangZLWL020, author = {Muhui Jiang and Yajin Zhou and Xiapu Luo and Ruoyu Wang and Yang Liu and Kui Ren}, editor = {Sarfraz Khurshid and Corina S. Pasareanu}, title = {An empirical study on {ARM} disassembly tools}, booktitle = {{ISSTA} '20: 29th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, Virtual Event, USA, July 18-22, 2020}, pages = {401--414}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395363.3397377}, doi = {10.1145/3395363.3397377}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issta/JiangZLWL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/ZhouWZLTXW20, author = {Hao Zhou and Haoyu Wang and Yajin Zhou and Xiapu Luo and Yutian Tang and Lei Xue and Ting Wang}, title = {Demystifying Diehard Android Apps}, booktitle = {35th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2020, Melbourne, Australia, September 21-25, 2020}, pages = {187--198}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1145/3324884.3416637}, doi = {10.1145/3324884.3416637}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/ZhouWZLTXW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-08278, author = {Lei Wu and Siwei Wu and Yajin Zhou and Runhuai Li and Zhi Wang and Xiapu Luo and Cong Wang and Kui Ren}, title = {EthScope: {A} Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum}, journal = {CoRR}, volume = {abs/2005.08278}, year = {2020}, url = {https://arxiv.org/abs/2005.08278}, eprinttype = {arXiv}, eprint = {2005.08278}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-08278.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-14619, author = {Ren He and Haoyu Wang and Pengcheng Xia and Liu Wang and Yuanchun Li and Lei Wu and Yajin Zhou and Xiapu Luo and Yao Guo and Guoai Xu}, title = {Beyond the Virus: {A} First Look at Coronavirus-themed Mobile Malware}, journal = {CoRR}, volume = {abs/2005.14619}, year = {2020}, url = {https://arxiv.org/abs/2005.14619}, eprinttype = {arXiv}, eprint = {2005.14619}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-14619.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-13639, author = {Pengcheng Xia and Haoyu Wang and Xiapu Luo and Lei Wu and Yajin Zhou and Guangdong Bai and Guoai Xu and Gang Huang and Xuanzhe Liu}, title = {Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams}, journal = {CoRR}, volume = {abs/2007.13639}, year = {2020}, url = {https://arxiv.org/abs/2007.13639}, eprinttype = {arXiv}, eprint = {2007.13639}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-13639.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-12252, author = {Dabao Wang and Siwei Wu and Ziling Lin and Lei Wu and Xingliang Yuan and Yajin Zhou and Haoyu Wang and Kui Ren}, title = {Towards understanding flash loan and its applications in defi ecosystem}, journal = {CoRR}, volume = {abs/2010.12252}, year = {2020}, url = {https://arxiv.org/abs/2010.12252}, eprinttype = {arXiv}, eprint = {2010.12252}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-12252.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-12400, author = {Yuan Chen and Jiaqi Li and Guorui Xu and Yajin Zhou and Zhi Wang and Cong Wang and Kui Ren}, title = {Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for {SGX}}, journal = {CoRR}, volume = {abs/2010.12400}, year = {2020}, url = {https://arxiv.org/abs/2010.12400}, eprinttype = {arXiv}, eprint = {2010.12400}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-12400.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-16274, author = {Lei Wu and Yufeng Hu and Yajin Zhou and Haoyu Wang and Xiapu Luo and Zhi Wang and Fan Zhang and Kui Ren}, title = {Towards Understanding and Demystifying Bitcoin Mixing Services}, journal = {CoRR}, volume = {abs/2010.16274}, year = {2020}, url = {https://arxiv.org/abs/2010.16274}, eprinttype = {arXiv}, eprint = {2010.16274}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-16274.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-02673, author = {Bingyu Gao and Haoyu Wang and Pengcheng Xia and Siwei Wu and Yajin Zhou and Xiapu Luo and Gareth Tyson}, title = {Tracking Counterfeit Cryptocurrency End-to-end}, journal = {CoRR}, volume = {abs/2011.02673}, year = {2020}, url = {https://arxiv.org/abs/2011.02673}, eprinttype = {arXiv}, eprint = {2011.02673}, timestamp = {Mon, 09 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-02673.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangQWCZ19, author = {Xiaoguang Wang and Yong Qi and Zhi Wang and Yue Chen and Yajin Zhou}, title = {Design and Implementation of SecPod, {A} Framework for Virtualization-Based Security Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {44--57}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2675991}, doi = {10.1109/TDSC.2017.2675991}, timestamp = {Wed, 19 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangQWCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XueQZLZSC19, author = {Lei Xue and Chenxiong Qian and Hao Zhou and Xiapu Luo and Yajin Zhou and Yuru Shao and Alvin T. S. Chan}, title = {NDroid: Toward Tracking Information Flows Across Multiple Android Contexts}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {3}, pages = {814--828}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2866347}, doi = {10.1109/TIFS.2018.2866347}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XueQZLZSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaoHWQZBW19, author = {Mengchen Cao and Xiantong Hou and Tao Wang and Hunter Qu and Yajin Zhou and Xiaolong Bai and Fuwei Wang}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1883--1897}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3345654}, doi = {10.1145/3319535.3345654}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaoHWQZBW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuanWYZW019, author = {Huayi Duan and Cong Wang and Xingliang Yuan and Yajin Zhou and Qian Wang and Kui Ren}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2351--2367}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3339814}, doi = {10.1145/3319535.3339814}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DuanWYZW019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KhandakerNL0ZC19, author = {Mustakimur Khandaker and Abu Naser and Wenqing Liu and Zhi Wang and Yajin Zhou and Yueqiang Cheng}, title = {Adaptive Call-Site Sensitive Control Flow Integrity}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {95--110}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00017}, doi = {10.1109/EUROSP.2019.00017}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/KhandakerNL0ZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/CuiDQWZ19, author = {Helei Cui and Huayi Duan and Zhan Qin and Cong Wang and Yajin Zhou}, title = {{SPEED:} Accelerating Enclave Applications Via Secure Deduplication}, booktitle = {39th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019}, pages = {1072--1082}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDCS.2019.00110}, doi = {10.1109/ICDCS.2019.00110}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/CuiDQWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/TangZZLXZY19, author = {Yutian Tang and Xian Zhan and Hao Zhou and Xiapu Luo and Zhou Xu and Yajin Zhou and Qiben Yan}, title = {Demystifying Application Performance Management Libraries for Android}, booktitle = {34th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2019, San Diego, CA, USA, November 11-15, 2019}, pages = {682--685}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ASE.2019.00069}, doi = {10.1109/ASE.2019.00069}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/TangZZLXZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChengHLZLLR19, author = {Zhen Cheng and Xinrui Hou and Runhuai Li and Yajin Zhou and Xiapu Luo and Jinku Li and Kui Ren}, title = {Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {47--60}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/cheng}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/ChengHLZLLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-03538, author = {Xiaoxuan Lou and Fan Zhang and Zheng Leong Chua and Zhenkai Liang and Yueqiang Cheng and Yajin Zhou}, title = {Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework}, journal = {CoRR}, volume = {abs/1901.03538}, year = {2019}, url = {http://arxiv.org/abs/1901.03538}, eprinttype = {arXiv}, eprint = {1901.03538}, timestamp = {Tue, 03 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-03538.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-01981, author = {Zhen Cheng and Xinrui Hou and Runhuai Li and Yajin Zhou and Xiapu Luo and Jinku Li and Kui Ren}, title = {Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum}, journal = {CoRR}, volume = {abs/1904.01981}, year = {2019}, url = {http://arxiv.org/abs/1904.01981}, eprinttype = {arXiv}, eprint = {1904.01981}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-01981.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-10666, author = {Yutian Yang and Songbo Zhu and Wenbo Shen and Yajin Zhou and Jiadong Sun and Kui Ren}, title = {{ARM} Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels}, journal = {CoRR}, volume = {abs/1912.10666}, year = {2019}, url = {http://arxiv.org/abs/1912.10666}, eprinttype = {arXiv}, eprint = {1912.10666}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-10666.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiYZM18, author = {Jinku Li and Yangtian Ye and Yajin Zhou and Jianfeng Ma}, title = {CodeTracker: {A} Lightweight Approach to Track and Protect Authorization Codes in {SMS} Messages}, journal = {{IEEE} Access}, volume = {6}, pages = {10107--10120}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2804321}, doi = {10.1109/ACCESS.2018.2804321}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiYZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/CuiZWLR18, author = {Helei Cui and Yajin Zhou and Cong Wang and Qi Li and Kui Ren}, title = {Towards Privacy-Preserving Malware Detection Systems for Android}, booktitle = {24th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2018, Singapore, December 11-13, 2018}, pages = {545--552}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/PADSW.2018.8644924}, doi = {10.1109/PADSW.2018.8644924}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/CuiZWLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-04901, author = {Yangyu Hu and Haoyu Wang and Yajin Zhou and Yao Guo and Li Li and Bingxuan Luo and Fangren Xu}, title = {Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications}, journal = {CoRR}, volume = {abs/1807.04901}, year = {2018}, url = {http://arxiv.org/abs/1807.04901}, eprinttype = {arXiv}, eprint = {1807.04901}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-04901.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/BuXXZTX17, author = {Wenqi Bu and Minhui Xue and Lihua Xu and Yajin Zhou and Zhushou Tang and Tao Xie}, editor = {Eric Bodden and Wilhelm Sch{\"{a}}fer and Arie van Deursen and Andrea Zisman}, title = {When program analysis meets mobile security: an industrial study of misusing Android internet sockets}, booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017}, pages = {842--847}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3106237.3117764}, doi = {10.1145/3106237.3117764}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/BuXXZTX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XueZCLG17, author = {Lei Xue and Yajin Zhou and Ting Chen and Xiapu Luo and Guofei Gu}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for {ART}}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {289--306}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/xue}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/XueZCLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/JiangSZ16, author = {Xuxian Jiang and Kapil Singh and Yajin Zhou}, editor = {Sema Oktug and Mehmet Ulema and Cicek Cavdar and Lisandro Zambenedetti Granville and Carlos Raniery Paula dos Santos}, title = {AppShell: Making data protection practical for lost or stolen Android devices}, booktitle = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2016, Istanbul, Turkey, April 25-29, 2016}, pages = {502--508}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NOMS.2016.7502850}, doi = {10.1109/NOMS.2016.7502850}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/JiangSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SunLZ16, author = {Mingshen Sun and John C. S. Lui and Yajin Zhou}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Blender: Self-randomizing Address Space Layout for Android Apps}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {457--480}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_21}, doi = {10.1007/978-3-319-45719-2\_21}, timestamp = {Fri, 27 Dec 2019 21:24:31 +0100}, biburl = {https://dblp.org/rec/conf/raid/SunLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouPWWJ15, author = {Yajin Zhou and Kunal Patel and Lei Wu and Zhi Wang and Xuxian Jiang}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Hybrid User-level Sandboxing of Third-party Android Apps}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {19--30}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714598}, doi = {10.1145/2714576.2714598}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhouPWWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/WangCWQZ15, author = {Xiaoguang Wang and Yue Chen and Zhi Wang and Yong Qi and Yajin Zhou}, editor = {Shan Lu and Erik Riedel}, title = {SecPod: a Framework for Virtualization-based Security Systems}, booktitle = {2015 {USENIX} Annual Technical Conference, {USENIX} {ATC} '15, July 8-10, Santa Clara, CA, {USA}}, pages = {347--360}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/atc15/technical-session/presentation/wang-xiaoguang}, timestamp = {Mon, 01 Feb 2021 08:43:30 +0100}, biburl = {https://dblp.org/rec/conf/usenix/WangCWQZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhouWWJ15, author = {Yajin Zhou and Lei Wu and Zhi Wang and Xuxian Jiang}, title = {Harvesting developer credentials in Android apps}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {23:1--23:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766499}, doi = {10.1145/2766498.2766499}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ZhouWWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouWCW14, author = {Yajin Zhou and Xiaoguang Wang and Yue Chen and Zhi Wang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {ARMlock: Hardware-based Fault Isolation for {ARM}}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {558--569}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660344}, doi = {10.1145/2660267.2660344}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouWCW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhouWZJ14, author = {Wu Zhou and Zhi Wang and Yajin Zhou and Xuxian Jiang}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {{DIVILAR:} diversifying intermediate language for anti-repackaging on android platform}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {199--210}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557558}, doi = {10.1145/2557547.2557558}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhouWZJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WuZPLJ14, author = {Chiachih Wu and Yajin Zhou and Kunal Patel and Zhenkai Liang and Xuxian Jiang}, title = {AirBag: Boosting Smartphone Resistance to Malware Infection}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/airbag-boosting-smartphone-resistance-malware-infection}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WuZPLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ZhouSJ14, author = {Yajin Zhou and Kapil Singh and Xuxian Jiang}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Owner-Centric Protection of Unstructured Data on Smartphones}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {55--73}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_4}, doi = {10.1007/978-3-319-08593-7\_4}, timestamp = {Wed, 25 Sep 2019 18:21:56 +0200}, biburl = {https://dblp.org/rec/conf/trust/ZhouSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/JiangZ13, author = {Xuxian Jiang and Yajin Zhou}, title = {Android Malware}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-7394-7}, doi = {10.1007/978-1-4614-7394-7}, isbn = {978-1-4614-7393-0}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/JiangZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuGZWJ13, author = {Lei Wu and Michael C. Grace and Yajin Zhou and Chiachih Wu and Xuxian Jiang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {The impact of vendor customizations on android security}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {623--634}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516728}, doi = {10.1145/2508859.2516728}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WuGZWJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhouZGJZ13, author = {Wu Zhou and Yajin Zhou and Michael C. Grace and Xuxian Jiang and Shihong Zou}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {Fast, scalable detection of "Piggybacked" mobile applications}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {185--196}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435377}, doi = {10.1145/2435349.2435377}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhouZGJZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhouJ13, author = {Yajin Zhou and Xuxian Jiang}, title = {Detecting Passive Content Leaks and Pollution in Android Applications}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/detecting-passive-content-leaks-and-pollution-android-applications}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhouJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhouZJN12, author = {Wu Zhou and Yajin Zhou and Xuxian Jiang and Peng Ning}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Detecting repackaged smartphone applications in third-party android marketplaces}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {317--326}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133640}, doi = {10.1145/2133601.2133640}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhouZJN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/GraceZZZJ12, author = {Michael C. Grace and Yajin Zhou and Qiang Zhang and Shihong Zou and Xuxian Jiang}, editor = {Nigel Davies and Srinivasan Seshan and Lin Zhong}, title = {RiskRanker: scalable and accurate zero-day android malware detection}, booktitle = {The 10th International Conference on Mobile Systems, Applications, and Services, MobiSys'12, Ambleside, United Kingdom - June 25 - 29, 2012}, pages = {281--294}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2307636.2307663}, doi = {10.1145/2307636.2307663}, timestamp = {Thu, 31 Oct 2019 15:55:26 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/GraceZZZJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GraceZWJ12, author = {Michael C. Grace and Yajin Zhou and Zhi Wang and Xuxian Jiang}, title = {Systematic Detection of Capability Leaks in Stock Android Smartphones}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/systematic-detection-capability-leaks-stock-android-smartphones}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GraceZWJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhouWZJ12, author = {Yajin Zhou and Zhi Wang and Wu Zhou and Xuxian Jiang}, title = {Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/hey-you-get-my-market-detecting-malicious-apps-official-and-alternative-android-markets}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhouWZJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhouJ12, author = {Yajin Zhou and Xuxian Jiang}, title = {Dissecting Android Malware: Characterization and Evolution}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {95--109}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.16}, doi = {10.1109/SP.2012.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhouJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ZhouZJF11, author = {Yajin Zhou and Xinwen Zhang and Xuxian Jiang and Vincent W. Freeh}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Taming Information-Stealing Smartphone Applications (on Android)}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {93--107}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_7}, doi = {10.1007/978-3-642-21599-5\_7}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/ZhouZJF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijia/ChenLMYMLZM07, author = {Wanming Chen and Huawei Liang and Tao Mei and Zhuhong You and Shifu Miao and Shuai Li and Yajin Zhou and Max Q.{-}H. Meng}, title = {Design and Implementation of Wireless Sensor Network for Robot Navigation}, journal = {Int. J. Inf. Acquis.}, volume = {4}, number = {1}, pages = {77--89}, year = {2007}, url = {https://doi.org/10.1142/S0219878907001186}, doi = {10.1142/S0219878907001186}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijia/ChenLMYMLZM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/robio/LiMCLYZSLJG07, author = {Shuai Li and Max Q.{-}H. Meng and Wanming Chen and Yangming Li and Zhuhong You and Yajin Zhou and Lei Sun and Huawei Liang and Kai Jiang and Qinglei Guo}, title = {{SP-NN:} {A} novel neural network approach for path planning}, booktitle = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO} 2007, Sanya, China, 15-28 December 2007}, pages = {1355--1360}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ROBIO.2007.4522361}, doi = {10.1109/ROBIO.2007.4522361}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/robio/LiMCLYZSLJG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.