BibTeX records: Yajin Zhou

download as .bib file

@article{DBLP:journals/tse/GaoXDCYZJ24,
  author       = {Zicong Gao and
                  Hao Xiong and
                  Weiyu Dong and
                  Rui Chang and
                  Rui Yang and
                  Yajin Zhou and
                  Liehui Jiang},
  title        = {FA-Fuzz: {A} Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based
                  Fuzzing},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {50},
  number       = {1},
  pages        = {1--15},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSE.2023.3326144},
  doi          = {10.1109/TSE.2023.3326144},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/GaoXDCYZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-04662,
  author       = {Pengcheng Xia and
                  Zhou Yu and
                  Kailong Wang and
                  Kai Ma and
                  Shuo Chen and
                  Xiapu Luo and
                  Yajin Zhou and
                  Lei Wu and
                  Guangdong Bai and
                  Haoyu Wang},
  title        = {The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency
                  Abuses on the Dark Web},
  journal      = {CoRR},
  volume       = {abs/2401.04662},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.04662},
  doi          = {10.48550/ARXIV.2401.04662},
  eprinttype    = {arXiv},
  eprint       = {2401.04662},
  timestamp    = {Thu, 01 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-04662.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taco/HeZCLZLZLJLCZ23,
  author       = {Bowen He and
                  Xiao Zheng and
                  Yuan Chen and
                  Weinan Li and
                  Yajin Zhou and
                  Xin Long and
                  Pengcheng Zhang and
                  Xiaowei Lu and
                  Linquan Jiang and
                  Qiang Liu and
                  Dennis Cai and
                  Xiantao Zhang},
  title        = {DxPU: Large-scale Disaggregated {GPU} Pools in the Datacenter},
  journal      = {{ACM} Trans. Archit. Code Optim.},
  volume       = {20},
  number       = {4},
  pages        = {55:1--55:23},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617995},
  doi          = {10.1145/3617995},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/taco/HeZCLZLZLJLCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LinWCWZR23,
  author       = {Jian Lin and
                  Dingding Wang and
                  Rui Chang and
                  Lei Wu and
                  Yajin Zhou and
                  Kui Ren},
  title        = {EnBinDiff: Identifying Data-Only Patches for Binaries},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {1},
  pages        = {343--359},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2021.3133500},
  doi          = {10.1109/TDSC.2021.3133500},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LinWCWZR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HeGSSZWL23,
  author       = {Yi He and
                  Yacong Gu and
                  Purui Su and
                  Kun Sun and
                  Yajin Zhou and
                  Zhi Wang and
                  Qi Li},
  title        = {A Systematic Study of Android Non-SDK (Hidden) Service {API} Security},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1609--1623},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3160872},
  doi          = {10.1109/TDSC.2022.3160872},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HeGSSZWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/JiangDZCZLWLR23,
  author       = {Muhui Jiang and
                  Qinming Dai and
                  Wenlong Zhang and
                  Rui Chang and
                  Yajin Zhou and
                  Xiapu Luo and
                  Ruoyu Wang and
                  Yang Liu and
                  Kui Ren},
  title        = {A Comprehensive Study on {ARM} Disassembly Tools},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {4},
  pages        = {1683--1703},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2022.3187811},
  doi          = {10.1109/TSE.2022.3187811},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/JiangDZCZLWLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/QianHLWLWZH23,
  author       = {Peng Qian and
                  Jianting He and
                  Lingling Lu and
                  Siwei Wu and
                  Zhipeng Lu and
                  Lei Wu and
                  Yajin Zhou and
                  Qinming He},
  title        = {Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability
                  Identification, and Attack Detection},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {7},
  pages        = {3793--3810},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2023.3271417},
  doi          = {10.1109/TSE.2023.3271417},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/QianHLWLWZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/YuanHCZS023,
  author       = {Ziqi Yuan and
                  Siyu Hong and
                  Rui Chang and
                  Yajin Zhou and
                  Wenbo Shen and
                  Kui Ren},
  editor       = {Tor M. Aamodt and
                  Natalie D. Enright Jerger and
                  Michael M. Swift},
  title        = {VDom: Fast and Unlimited Virtual Domains on Multiple Architectures},
  booktitle    = {Proceedings of the 28th {ACM} International Conference on Architectural
                  Support for Programming Languages and Operating Systems, Volume 2,
                  {ASPLOS} 2023, Vancouver, BC, Canada, March 25-29, 2023},
  pages        = {905--919},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3575693.3575735},
  doi          = {10.1145/3575693.3575735},
  timestamp    = {Thu, 02 Feb 2023 08:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/asplos/YuanHCZS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeCCHHWCWZ23,
  author       = {Bowen He and
                  Yuan Chen and
                  Zhuo Chen and
                  Xiaohui Hu and
                  Yufeng Hu and
                  Lei Wu and
                  Rui Chang and
                  Haoyu Wang and
                  Yajin Zhou},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {TxPhishScope: Towards Detecting and Understanding Transaction-based
                  Phishing on Ethereum},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {120--134},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623210},
  doi          = {10.1145/3576915.3623210},
  timestamp    = {Wed, 13 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HeCCHHWCWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaYLZSZ023,
  author       = {Boyang Ma and
                  Yilin Yang and
                  Jinku Li and
                  Fengwei Zhang and
                  Wenbo Shen and
                  Yajin Zhou and
                  Jianfeng Ma},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Travelling the Hypervisor and {SSD:} {A} Tag-Based Approach Against
                  Crypto Ransomware with Fine-Grained Data Recovery},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {341--355},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616665},
  doi          = {10.1145/3576915.3616665},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MaYLZSZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/WuCZWZ23,
  author       = {Huamao Wu and
                  Yuan Chen and
                  Yajin Zhou and
                  Yifei Wang and
                  Lubo Zhang},
  title        = {DriverJar: Lightweight Device Driver Isolation for {ARM}},
  booktitle    = {60th {ACM/IEEE} Design Automation Conference, {DAC} 2023, San Francisco,
                  CA, USA, July 9-13, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DAC56929.2023.10247974},
  doi          = {10.1109/DAC56929.2023.10247974},
  timestamp    = {Sun, 24 Sep 2023 13:31:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/WuCZWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/ChenLHWZHLWLQ23,
  author       = {Zhuo Chen and
                  Jie Liu and
                  Yubo Hu and
                  Lei Wu and
                  Yajin Zhou and
                  Yiling He and
                  Xianhao Liao and
                  Ke Wang and
                  Jinku Li and
                  Zhan Qin},
  editor       = {Ren{\'{e}} Just and
                  Gordon Fraser},
  title        = {DeUEDroid: Detecting Underground Economy Apps Based on {UTG} Similarity},
  booktitle    = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July
                  17-21, 2023},
  pages        = {223--235},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3597926.3598051},
  doi          = {10.1145/3597926.3598051},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/ChenLHWZHLWLQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MaZWZCXWR23,
  author       = {Lin Ma and
                  Duoming Zhou and
                  Hanjie Wu and
                  Yajin Zhou and
                  Rui Chang and
                  Hao Xiong and
                  Lei Wu and
                  Kui Ren},
  title        = {When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup
                  Bugs in Linux Kernel},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2138--2154},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179356},
  doi          = {10.1109/SP46215.2023.10179356},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MaZWZCXWR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiuTZP23,
  author       = {Qiang Liu and
                  Flavio Toffalini and
                  Yajin Zhou and
                  Mathias Payer},
  title        = {ViDeZZo: Dependency-aware Virtual Device Fuzzing},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {3228--3245},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179354},
  doi          = {10.1109/SP46215.2023.10179354},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiuTZP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XuLHLZ023,
  author       = {Jinyan Xu and
                  Yiyuan Liu and
                  Sirui He and
                  Haoran Lin and
                  Yajin Zhou and
                  Cong Wang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced
                  Synchronizable Co-simulation},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {1307--1324},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/xu-jinyan},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/XuLHLZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-12645,
  author       = {Peng Qian and
                  Jianting He and
                  Lingling Lu and
                  Siwei Wu and
                  Zhipeng Lu and
                  Lei Wu and
                  Yajin Zhou and
                  Qinming He},
  title        = {Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability
                  Identification, and Attack Detection},
  journal      = {CoRR},
  volume       = {abs/2304.12645},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.12645},
  doi          = {10.48550/ARXIV.2304.12645},
  eprinttype    = {arXiv},
  eprint       = {2304.12645},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-12645.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-04648,
  author       = {Bowen He and
                  Xiao Zheng and
                  Yuan Chen and
                  Weinan Li and
                  Yajin Zhou and
                  Xin Long and
                  Pengcheng Zhang and
                  Xiaowei Lu and
                  Linquan Jiang and
                  Qiang Liu and
                  Dennis Cai and
                  Xiantao Zhang},
  title        = {DxPU: Large Scale Disaggregated {GPU} Pools in the Datacenter},
  journal      = {CoRR},
  volume       = {abs/2310.04648},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.04648},
  doi          = {10.48550/ARXIV.2310.04648},
  eprinttype    = {arXiv},
  eprint       = {2310.04648},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-04648.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-04941,
  author       = {Jiaqi Li and
                  Ke Wang and
                  Yaoguang Chen and
                  Yajin Zhou and
                  Lei Wu and
                  Jiashui Wang},
  title        = {Detecting {DBMS} Bugs with Context-Sensitive Instantiation and Multi-Plan
                  Execution},
  journal      = {CoRR},
  volume       = {abs/2312.04941},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.04941},
  doi          = {10.48550/ARXIV.2312.04941},
  eprinttype    = {arXiv},
  eprint       = {2312.04941},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-04941.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhouZCLZLRTZ22,
  author       = {Zhelei Zhou and
                  Bingsheng Zhang and
                  Yuan Chen and
                  Jiaqi Li and
                  Yajin Zhou and
                  Yibiao Lu and
                  Kui Ren and
                  Phuc Thai and
                  Hong{-}Sheng Zhou},
  title        = {Scriptable and composable SNARKs in the trusted hardware model},
  journal      = {J. Comput. Secur.},
  volume       = {30},
  number       = {6},
  pages        = {757--793},
  year         = {2022},
  url          = {https://doi.org/10.3233/JCS-210167},
  doi          = {10.3233/JCS-210167},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhouZCLZLRTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HeZZLSGJ22,
  author       = {Yi He and
                  Yuan Zhou and
                  Yajin Zhou and
                  Qi Li and
                  Kun Sun and
                  Yacong Gu and
                  Yong Jiang},
  title        = {{JNI} Global References Are Still Vulnerable: Attacks and Defenses},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {607--619},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2995542},
  doi          = {10.1109/TDSC.2020.2995542},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HeZZLSGJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/QiuYWZLM22,
  author       = {Jun Qiu and
                  Xuewu Yang and
                  Huamao Wu and
                  Yajin Zhou and
                  Jinku Li and
                  Jianfeng Ma},
  title        = {LibCapsule: Complete Confinement of Third-Party Libraries in Android
                  Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {2873--2889},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3075817},
  doi          = {10.1109/TDSC.2021.3075817},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/QiuYWZLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/WuWZLWLWR22,
  author       = {Siwei Wu and
                  Lei Wu and
                  Yajin Zhou and
                  Runhuai Li and
                  Zhi Wang and
                  Xiapu Luo and
                  Cong Wang and
                  Kui Ren},
  title        = {Time-travel Investigation: Toward Building a Scalable Attack Detection
                  Framework on Ethereum},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {31},
  number       = {3},
  pages        = {54:1--54:33},
  year         = {2022},
  url          = {https://doi.org/10.1145/3505263},
  doi          = {10.1145/3505263},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/WuWZLWLWR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/XueZLYWZM22,
  author       = {Lei Xue and
                  Hao Zhou and
                  Xiapu Luo and
                  Le Yu and
                  Dinghao Wu and
                  Yajin Zhou and
                  Xiaobo Ma},
  title        = {PackerGrind: An Adaptive Unpacking System for Android Apps},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {48},
  number       = {2},
  pages        = {551--570},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSE.2020.2996433},
  doi          = {10.1109/TSE.2020.2996433},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/XueZLYWZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/TangWZLZZYSK22,
  author       = {Yutian Tang and
                  Haoyu Wang and
                  Xian Zhan and
                  Xiapu Luo and
                  Yajin Zhou and
                  Hao Zhou and
                  Qiben Yan and
                  Yulei Sui and
                  Jacky Keung},
  title        = {A Systematical Study on Application Performance Management Libraries
                  for Apps},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {48},
  number       = {8},
  pages        = {3044--3065},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSE.2021.3077654},
  doi          = {10.1109/TSE.2021.3077654},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/TangWZLZZYSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/JiangXZHZWL022,
  author       = {Muhui Jiang and
                  Tianyi Xu and
                  Yajin Zhou and
                  Yufeng Hu and
                  Ming Zhong and
                  Lei Wu and
                  Xiapu Luo and
                  Kui Ren},
  editor       = {Babak Falsafi and
                  Michael Ferdman and
                  Shan Lu and
                  Thomas F. Wenisch},
  title        = {{EXAMINER:} automatically locating inconsistent instructions between
                  real devices and {CPU} emulators for {ARM}},
  booktitle    = {{ASPLOS} '22: 27th {ACM} International Conference on Architectural
                  Support for Programming Languages and Operating Systems, Lausanne,
                  Switzerland, 28 February 2022 - 4 March 2022},
  pages        = {846--858},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3503222.3507736},
  doi          = {10.1145/3503222.3507736},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/JiangXZHZWL022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/XuLYSZC0022,
  author       = {Jinyan Xu and
                  Haoran Lin and
                  Ziqi Yuan and
                  Wenbo Shen and
                  Yajin Zhou and
                  Rui Chang and
                  Lei Wu and
                  Kui Ren},
  editor       = {Rob Oshana},
  title        = {RegVault: hardware assisted selective data randomization for operating
                  system kernels},
  booktitle    = {{DAC} '22: 59th {ACM/IEEE} Design Automation Conference, San Francisco,
                  California, USA, July 10 - 14, 2022},
  pages        = {715--720},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3489517.3530549},
  doi          = {10.1145/3489517.3530549},
  timestamp    = {Thu, 25 Aug 2022 14:23:32 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/XuLYSZC0022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/ZhouLZZS022,
  author       = {Xia Zhou and
                  Jiaqi Li and
                  Wenlong Zhang and
                  Yajin Zhou and
                  Wenbo Shen and
                  Kui Ren},
  editor       = {Y{\'{e}}rom{-}David Bromberg and
                  Anne{-}Marie Kermarrec and
                  Christos Kozyrakis},
  title        = {{OPEC:} operation-based security isolation for bare-metal embedded
                  systems},
  booktitle    = {EuroSys '22: Seventeenth European Conference on Computer Systems,
                  Rennes, France, April 5 - 8, 2022},
  pages        = {317--333},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3492321.3519573},
  doi          = {10.1145/3492321.3519573},
  timestamp    = {Wed, 13 Apr 2022 13:48:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/ZhouLZZS022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/ZhouWLWZZC22,
  author       = {Hao Zhou and
                  Shuohan Wu and
                  Xiapu Luo and
                  Ting Wang and
                  Yajin Zhou and
                  Chao Zhang and
                  Haipeng Cai},
  editor       = {Sukyoung Ryu and
                  Yannis Smaragdakis},
  title        = {NCScope: hardware-assisted analyzer for native code in Android apps},
  booktitle    = {{ISSTA} '22: 31st {ACM} {SIGSOFT} International Symposium on Software
                  Testing and Analysis, Virtual Event, South Korea, July 18 - 22, 2022},
  pages        = {629--641},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3533767.3534410},
  doi          = {10.1145/3533767.3534410},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/ZhouWLWZZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Zhou0L0Z022,
  author       = {Hao Zhou and
                  Haoyu Wang and
                  Xiapu Luo and
                  Ting Chen and
                  Yajin Zhou and
                  Ting Wang},
  title        = {Uncovering Cross-Context Inconsistent Access Control Enforcement in
                  Android},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-190/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Zhou0L0Z022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangFWZ0Y22,
  author       = {Dabao Wang and
                  Hang Feng and
                  Siwei Wu and
                  Yajin Zhou and
                  Lei Wu and
                  Xingliang Yuan},
  title        = {Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval
                  of {ERC20} Tokens on Ethereum},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {99--114},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545963},
  doi          = {10.1145/3545948.3545963},
  timestamp    = {Thu, 20 Oct 2022 10:46:43 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangFWZ0Y22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001LLZLYLZG22,
  author       = {Lei Xue and
                  Yangyang Liu and
                  Tianqi Li and
                  Kaifa Zhao and
                  Jianfeng Li and
                  Le Yu and
                  Xiapu Luo and
                  Yajin Zhou and
                  Guofei Gu},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {{SAID:} State-aware Defense Against Injection Attacks on In-vehicle
                  Network},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1921--1938},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/xue-lei},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0001LLZLYLZG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YuLJL0ZZ0GNW22,
  author       = {Le Yu and
                  Yangyang Liu and
                  Pengfei Jing and
                  Xiapu Luo and
                  Lei Xue and
                  Kaifa Zhao and
                  Yajin Zhou and
                  Ting Wang and
                  Guofei Gu and
                  Sen Nie and
                  Shi Wu},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1939--1956},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/yu-le},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/YuLJL0ZZ0GNW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenLXZ00022,
  author       = {Yuan Chen and
                  Jiaqi Li and
                  Guorui Xu and
                  Yajin Zhou and
                  Zhi Wang and
                  Cong Wang and
                  Kui Ren},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {SGXLock: Towards Efficiently Establishing Mutual Distrust Between
                  Host Application and Enclave for {SGX}},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4129--4146},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/chen-yuan},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChenLXZ00022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-09374,
  author       = {Yi He and
                  Yacong Gu and
                  Purui Su and
                  Kun Sun and
                  Yajin Zhou and
                  Zhi Wang and
                  Qi Li},
  title        = {A Systematic Study of Android Non-SDK (Hidden) Service {API} Security},
  journal      = {CoRR},
  volume       = {abs/2203.09374},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.09374},
  doi          = {10.48550/ARXIV.2203.09374},
  eprinttype    = {arXiv},
  eprint       = {2203.09374},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-09374.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-01790,
  author       = {Dabao Wang and
                  Hang Feng and
                  Siwei Wu and
                  Yajin Zhou and
                  Lei Wu and
                  Xingliang Yuan},
  title        = {Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval
                  of {ERC20} Tokens on Ethereum},
  journal      = {CoRR},
  volume       = {abs/2207.01790},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.01790},
  doi          = {10.48550/ARXIV.2207.01790},
  eprinttype    = {arXiv},
  eprint       = {2207.01790},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-01790.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-01837,
  author       = {Jingyi Guo and
                  Min Zheng and
                  Yajin Zhou and
                  Haoyu Wang and
                  Lei Wu and
                  Xiapu Luo and
                  Kui Ren},
  title        = {iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps},
  journal      = {CoRR},
  volume       = {abs/2207.01837},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.01837},
  doi          = {10.48550/ARXIV.2207.01837},
  eprinttype    = {arXiv},
  eprint       = {2207.01837},
  timestamp    = {Wed, 14 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-01837.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-01317,
  author       = {Zhuo Chen and
                  Jie Liu and
                  Yubo Hu and
                  Lei Wu and
                  Yajin Zhou and
                  Xianhao Liao and
                  Ke Wang},
  title        = {Illegal But Not Malware: An Underground Economy App Detection System
                  Based on Usage Scenario},
  journal      = {CoRR},
  volume       = {abs/2209.01317},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.01317},
  doi          = {10.48550/ARXIV.2209.01317},
  eprinttype    = {arXiv},
  eprint       = {2209.01317},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-01317.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-07911,
  author       = {Haoran Lin and
                  Yajin Zhou and
                  Lei Wu},
  title        = {Operation-level Concurrent Transaction Execution for Blockchains},
  journal      = {CoRR},
  volume       = {abs/2211.07911},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.07911},
  doi          = {10.48550/ARXIV.2211.07911},
  eprinttype    = {arXiv},
  eprint       = {2211.07911},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-07911.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/WangHWXLWZLSGX21,
  author       = {Liu Wang and
                  Ren He and
                  Haoyu Wang and
                  Pengcheng Xia and
                  Yuanchun Li and
                  Lei Wu and
                  Yajin Zhou and
                  Xiapu Luo and
                  Yulei Sui and
                  Yao Guo and
                  Guoai Xu},
  title        = {Beyond the virus: a first look at coronavirus-themed Android malware},
  journal      = {Empir. Softw. Eng.},
  volume       = {26},
  number       = {4},
  pages        = {82},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10664-021-09974-4},
  doi          = {10.1007/S10664-021-09974-4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ese/WangHWXLWZLSGX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhengWWFSLZ21,
  author       = {Wei Zheng and
                  Ying Wu and
                  Xiaoxue Wu and
                  Chen Feng and
                  Yulei Sui and
                  Xiapu Luo and
                  Yajin Zhou},
  title        = {A survey of Intel {SGX} and its applications},
  journal      = {Frontiers Comput. Sci.},
  volume       = {15},
  number       = {3},
  pages        = {153808},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11704-019-9096-y},
  doi          = {10.1007/S11704-019-9096-Y},
  timestamp    = {Sun, 03 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhengWWFSLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhongZC21,
  author       = {Ming Zhong and
                  Yajin Zhou and
                  Gang Chen},
  title        = {A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs
                  in Social Network},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5542543:1--5542543:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5542543},
  doi          = {10.1155/2021/5542543},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhongZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhongZC21,
  author       = {Ming Zhong and
                  Yajin Zhou and
                  Gang Chen},
  title        = {Sequential Model Based Intrusion Detection System for IoT Servers
                  Using Deep Learning Methods},
  journal      = {Sensors},
  volume       = {21},
  number       = {4},
  pages        = {1113},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21041113},
  doi          = {10.3390/S21041113},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhongZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuWZGLLX21,
  author       = {Yangyu Hu and
                  Haoyu Wang and
                  Yajin Zhou and
                  Yao Guo and
                  Li Li and
                  Bingxuan Luo and
                  Fangren Xu},
  title        = {Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating
                  Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {3},
  pages        = {1033--1050},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2908939},
  doi          = {10.1109/TDSC.2019.2908939},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuWZGLLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CuiZWWDW21,
  author       = {Helei Cui and
                  Yajin Zhou and
                  Cong Wang and
                  Xinyu Wang and
                  Yuefeng Du and
                  Qian Wang},
  title        = {{PPSB:} An Open and Flexible Platform for Privacy-Preserving Safe
                  Browsing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {1762--1778},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2937783},
  doi          = {10.1109/TDSC.2019.2937783},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CuiZWWDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsys/MaXSZXSC021,
  author       = {Lin Ma and
                  Jinyan Xu and
                  Jiadong Sun and
                  Yajin Zhou and
                  Xun Xie and
                  Wenbo Shen and
                  Rui Chang and
                  Kui Ren},
  editor       = {Haryadi S. Gunawi and
                  Xiaosong Ma},
  title        = {Revisiting challenges for selective data protection of real applications},
  booktitle    = {APSys '21: 12th {ACM} {SIGOPS} Asia-Pacific Workshop on Systems, Hong
                  Kong, China, August 24-25, 2021},
  pages        = {138--145},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3476886.3477504},
  doi          = {10.1145/3476886.3477504},
  timestamp    = {Mon, 23 Aug 2021 08:26:58 +0200},
  biburl       = {https://dblp.org/rec/conf/apsys/MaXSZXSC021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiangMZLZWLW021,
  author       = {Muhui Jiang and
                  Lin Ma and
                  Yajin Zhou and
                  Qiang Liu and
                  Cen Zhang and
                  Zhi Wang and
                  Xiapu Luo and
                  Lei Wu and
                  Kui Ren},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {{ECMO:} Peripheral Transplantation to Rehost Embedded Linux Kernels},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {734--748},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484753},
  doi          = {10.1145/3460120.3484753},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JiangMZLZWLW021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangCLZTZ021,
  author       = {Bingsheng Zhang and
                  Yuan Chen and
                  Jiaqi Li and
                  Yajin Zhou and
                  Phuc Thai and
                  Hong{-}Sheng Zhou and
                  Kui Ren},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Succinct Scriptable {NIZK} via Trusted Hardware},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {430--451},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_21},
  doi          = {10.1007/978-3-030-88418-5\_21},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhangCLZTZ021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/0001YYJLWZ21,
  author       = {Lei Xue and
                  Yuxiao Yan and
                  Luyi Yan and
                  Muhui Jiang and
                  Xiapu Luo and
                  Dinghao Wu and
                  Yajin Zhou},
  editor       = {Cristian Cadar and
                  Xiangyu Zhang},
  title        = {Parema: an unpacking framework for demystifying VM-based Android packers},
  booktitle    = {{ISSTA} '21: 30th {ACM} {SIGSOFT} International Symposium on Software
                  Testing and Analysis, Virtual Event, Denmark, July 11-17, 2021},
  pages        = {152--164},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460319.3464839},
  doi          = {10.1145/3460319.3464839},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/0001YYJLWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/ZhouWWLZC021,
  author       = {Hao Zhou and
                  Haoyu Wang and
                  Shuohan Wu and
                  Xiapu Luo and
                  Yajin Zhou and
                  Ting Chen and
                  Ting Wang},
  title        = {Finding the Missing Piece: Permission Specification Analysis for Android
                  {NDK}},
  booktitle    = {36th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2021, Melbourne, Australia, November 15-19, 2021},
  pages        = {505--516},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ASE51524.2021.9678843},
  doi          = {10.1109/ASE51524.2021.9678843},
  timestamp    = {Wed, 14 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/ZhouWWLZC021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/LiuZMJZWSLL021,
  author       = {Qiang Liu and
                  Cen Zhang and
                  Lin Ma and
                  Muhui Jiang and
                  Yajin Zhou and
                  Lei Wu and
                  Wenbo Shen and
                  Xiapu Luo and
                  Yang Liu and
                  Kui Ren},
  title        = {FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels
                  through Model-Guided Kernel Execution},
  booktitle    = {36th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2021, Melbourne, Australia, November 15-19, 2021},
  pages        = {792--804},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ASE51524.2021.9678653},
  doi          = {10.1109/ASE51524.2021.9678653},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/LiuZMJZWSLL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhengBZZQ21,
  author       = {Min Zheng and
                  Xiaolong Bai and
                  Yajin Zhou and
                  Chao Zhang and
                  Fuping Qu},
  title        = {{POP} and {PUSH:} Demystifying and Defending against (Mach) Port-oriented
                  Programming},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/pop-and-push-demystifying-and-defending-against-mach-port-oriented-programming/},
  timestamp    = {Tue, 31 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhengBZZQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seed/ZhangYCZ21,
  author       = {Xingjian Zhang and
                  Ziqi Yuan and
                  Rui Chang and
                  Yajin Zhou},
  title        = {Seeds of {SEED:} H\({}^{\mbox{2}}\)Cache: Building a Hybrid Randomized
                  Cache Hierarchy for Mitigating Cache Side-Channel Attacks},
  booktitle    = {2021 International Symposium on Secure and Private Execution Environment
                  Design (SEED), Washington, DC, USA, September 20-21, 2021},
  pages        = {29--36},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SEED51797.2021.00014},
  doi          = {10.1109/SEED51797.2021.00014},
  timestamp    = {Tue, 08 Nov 2022 13:30:39 +0100},
  biburl       = {https://dblp.org/rec/conf/seed/ZhangYCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/GaoWXWZLT21,
  author       = {Bingyu Gao and
                  Haoyu Wang and
                  Pengcheng Xia and
                  Siwei Wu and
                  Yajin Zhou and
                  Xiapu Luo and
                  Gareth Tyson},
  editor       = {Longbo Huang and
                  Anshul Gandhi and
                  Negar Kiyavash and
                  Jia Wang},
  title        = {Tracking Counterfeit Cryptocurrency End-to-end},
  booktitle    = {{SIGMETRICS} '21: {ACM} {SIGMETRICS} / International Conference on
                  Measurement and Modeling of Computer Systems, Virtual Event, China,
                  June 14-18, 2021},
  pages        = {33--34},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3410220.3456282},
  doi          = {10.1145/3410220.3456282},
  timestamp    = {Thu, 24 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/GaoWXWZLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/ChenGLCZZZ21,
  author       = {Yang Chen and
                  Zhongxin Guo and
                  Runhuai Li and
                  Shuo Chen and
                  Lidong Zhou and
                  Yajin Zhou and
                  Xian Zhang},
  editor       = {Robbert van Renesse and
                  Nickolai Zeldovich},
  title        = {Forerunner: Constraint-based Speculative Transaction Execution for
                  Ethereum},
  booktitle    = {{SOSP} '21: {ACM} {SIGOPS} 28th Symposium on Operating Systems Principles,
                  Virtual Event / Koblenz, Germany, October 26-29, 2021},
  pages        = {570--587},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3477132.3483564},
  doi          = {10.1145/3477132.3483564},
  timestamp    = {Tue, 01 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/ChenGLCZZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/XueZLZSGZA21,
  author       = {Lei Xue and
                  Hao Zhou and
                  Xiapu Luo and
                  Yajin Zhou and
                  Yang Shi and
                  Guofei Gu and
                  Fengwei Zhang and
                  Man Ho Au},
  title        = {Happer: Unpacking Android Apps via a Hardware-Assisted Approach},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1641--1658},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00105},
  doi          = {10.1109/SP40001.2021.00105},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/XueZLZSGZA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/WuHZWLW0021,
  author       = {Lei Wu and
                  Yufeng Hu and
                  Yajin Zhou and
                  Haoyu Wang and
                  Xiapu Luo and
                  Zhi Wang and
                  Fan Zhang and
                  Kui Ren},
  editor       = {Jure Leskovec and
                  Marko Grobelnik and
                  Marc Najork and
                  Jie Tang and
                  Leila Zia},
  title        = {Towards Understanding and Demystifying Bitcoin Mixing Services},
  booktitle    = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia,
                  April 19-23, 2021},
  pages        = {33--44},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442381.3449880},
  doi          = {10.1145/3442381.3449880},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/WuHZWLW0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-11286,
  author       = {Yutian Tang and
                  Haoyu Wang and
                  Xian Zhan and
                  Xiapu Luo and
                  Yajin Zhou and
                  Hao Zhou and
                  Qiben Yan and
                  Yulei Sui and
                  Jacky Keung},
  title        = {A Systematical Study on Application Performance Management Libraries
                  for Apps},
  journal      = {CoRR},
  volume       = {abs/2103.11286},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.11286},
  eprinttype    = {arXiv},
  eprint       = {2103.11286},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-11286.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-15068,
  author       = {Siwei Wu and
                  Dabao Wang and
                  Jianting He and
                  Yajin Zhou and
                  Lei Wu and
                  Xingliang Yuan and
                  Qinming He and
                  Kui Ren},
  title        = {DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications},
  journal      = {CoRR},
  volume       = {abs/2104.15068},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.15068},
  eprinttype    = {arXiv},
  eprint       = {2104.15068},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-15068.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-14251,
  author       = {Lin Ma and
                  Jinyan Xu and
                  Jiadong Sun and
                  Yajin Zhou and
                  Xun Xie and
                  Wenbo Shen and
                  Rui Chang and
                  Kui Ren},
  title        = {Revisiting Challenges for Selective Data Protection of Real Applications},
  journal      = {CoRR},
  volume       = {abs/2105.14251},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.14251},
  eprinttype    = {arXiv},
  eprint       = {2105.14251},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-14251.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-14273,
  author       = {Muhui Jiang and
                  Tianyi Xu and
                  Yajin Zhou and
                  Yufeng Hu and
                  Ming Zhong and
                  Lei Wu and
                  Xiapu Luo and
                  Kui Ren},
  title        = {Examiner: Automatically Locating Inconsistent Instructions Between
                  Real Devices and {CPU} Emulators for {ARM}},
  journal      = {CoRR},
  volume       = {abs/2105.14273},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.14273},
  eprinttype    = {arXiv},
  eprint       = {2105.14273},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-14273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-14295,
  author       = {Muhui Jiang and
                  Lin Ma and
                  Yajin Zhou and
                  Qiang Liu and
                  Cen Zhang and
                  Zhi Wang and
                  Xiapu Luo and
                  Lei Wu and
                  Kui Ren},
  title        = {{ECMO:} Peripheral Transplantation to Rehost Embedded Linux Kernels},
  journal      = {CoRR},
  volume       = {abs/2105.14295},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.14295},
  eprinttype    = {arXiv},
  eprint       = {2105.14295},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-14295.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-14298,
  author       = {Dingding Wang and
                  Muhui Jiang and
                  Rui Chang and
                  Yajin Zhou and
                  Baolei Hou and
                  Xiapu Luo and
                  Lei Wu and
                  Kui Ren},
  title        = {A Measurement Study on the (In)security of End-of-Life (EoL) Embedded
                  Devices},
  journal      = {CoRR},
  volume       = {abs/2105.14298},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.14298},
  eprinttype    = {arXiv},
  eprint       = {2105.14298},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-14298.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-05756,
  author       = {Zhuo Chen and
                  Lei Wu and
                  Jing Cheng and
                  Yubo Hu and
                  Yajin Zhou and
                  Zhushou Tang and
                  Yexuan Chen and
                  Jinku Li and
                  Kui Ren},
  title        = {Lifting The Grey Curtain: {A} First Look at the Ecosystem of {CULPRITWARE}},
  journal      = {CoRR},
  volume       = {abs/2106.05756},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.05756},
  eprinttype    = {arXiv},
  eprint       = {2106.05756},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-05756.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pomacs/GaoWXWZLT20,
  author       = {Bingyu Gao and
                  Haoyu Wang and
                  Pengcheng Xia and
                  Siwei Wu and
                  Yajin Zhou and
                  Xiapu Luo and
                  Gareth Tyson},
  title        = {Tracking Counterfeit Cryptocurrency End-to-end},
  journal      = {Proc. {ACM} Meas. Anal. Comput. Syst.},
  volume       = {4},
  number       = {3},
  pages        = {50:1--50:28},
  year         = {2020},
  url          = {https://doi.org/10.1145/3428335},
  doi          = {10.1145/3428335},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pomacs/GaoWXWZLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuLZM20,
  author       = {Xiaonan Zhu and
                  Jinku Li and
                  Yajin Zhou and
                  Jianfeng Ma},
  title        = {AdCapsule: Practical Confinement of Advertisements in Android Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {479--492},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2814999},
  doi          = {10.1109/TDSC.2018.2814999},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhuLZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangDYZR20,
  author       = {Fan Zhang and
                  Xiaofei Dong and
                  Bolin Yang and
                  Yajin Zhou and
                  Kui Ren},
  title        = {A Systematic Evaluation of Wavelet-Based Attack Framework on Random
                  Delay Countermeasures},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1407--1422},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2941774},
  doi          = {10.1109/TIFS.2019.2941774},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangDYZR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuFHH0QZ020,
  author       = {Wen{-}jie Lu and
                  Yixuan Fang and
                  Zhicong Huang and
                  Cheng Hong and
                  Chaochao Chen and
                  Hunter Qu and
                  Yajin Zhou and
                  Kui Ren},
  editor       = {Benyu Zhang and
                  Raluca Ada Popa and
                  Matei Zaharia and
                  Guofei Gu and
                  Shouling Ji},
  title        = {Faster Secure Multiparty Computation of Adaptive Gradient Descent},
  booktitle    = {PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine
                  Learning in Practice, Virtual Event, USA, November, 2020},
  pages        = {47--49},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411501.3419427},
  doi          = {10.1145/3411501.3419427},
  timestamp    = {Wed, 17 Nov 2021 13:40:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuFHH0QZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/SunZSZ020,
  author       = {Jiadong Sun and
                  Xia Zhou and
                  Wenbo Shen and
                  Yajin Zhou and
                  Kui Ren},
  editor       = {Vassil Roussev and
                  Bhavani Thuraisingham and
                  Barbara Carminati and
                  Murat Kantarcioglu},
  title        = {{PESC:} {A} Per System-Call Stack Canary Design for Linux Kernel},
  booktitle    = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security
                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},
  pages        = {365--375},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374664.3375734},
  doi          = {10.1145/3374664.3375734},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/SunZSZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/XiaWLWZBXHL20,
  author       = {Pengcheng Xia and
                  Haoyu Wang and
                  Xiapu Luo and
                  Lei Wu and
                  Yajin Zhou and
                  Guangdong Bai and
                  Guoai Xu and
                  Gang Huang and
                  Xuanzhe Liu},
  title        = {Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency
                  Scams},
  booktitle    = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston,
                  MA, USA, November 16-19, 2020},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/eCrime51433.2020.9493255},
  doi          = {10.1109/ECRIME51433.2020.9493255},
  timestamp    = {Mon, 09 Aug 2021 09:09:23 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/XiaWLWZBXHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/00010LJ0ZWC020,
  author       = {Kui Ren and
                  Yu Guo and
                  Jiaqi Li and
                  Xiaohua Jia and
                  Cong Wang and
                  Yajin Zhou and
                  Sheng Wang and
                  Ning Cao and
                  Feifei Li},
  title        = {HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data
                  Outsourcing Services},
  booktitle    = {40th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2020, Singapore, November 29 - December 1, 2020},
  pages        = {23--33},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDCS47774.2020.00014},
  doi          = {10.1109/ICDCS47774.2020.00014},
  timestamp    = {Sat, 06 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/00010LJ0ZWC020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/JiangZLWL020,
  author       = {Muhui Jiang and
                  Yajin Zhou and
                  Xiapu Luo and
                  Ruoyu Wang and
                  Yang Liu and
                  Kui Ren},
  editor       = {Sarfraz Khurshid and
                  Corina S. Pasareanu},
  title        = {An empirical study on {ARM} disassembly tools},
  booktitle    = {{ISSTA} '20: 29th {ACM} {SIGSOFT} International Symposium on Software
                  Testing and Analysis, Virtual Event, USA, July 18-22, 2020},
  pages        = {401--414},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395363.3397377},
  doi          = {10.1145/3395363.3397377},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/JiangZLWL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/ZhouWZLTXW20,
  author       = {Hao Zhou and
                  Haoyu Wang and
                  Yajin Zhou and
                  Xiapu Luo and
                  Yutian Tang and
                  Lei Xue and
                  Ting Wang},
  title        = {Demystifying Diehard Android Apps},
  booktitle    = {35th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2020, Melbourne, Australia, September 21-25, 2020},
  pages        = {187--198},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3324884.3416637},
  doi          = {10.1145/3324884.3416637},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/ZhouWZLTXW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-08278,
  author       = {Lei Wu and
                  Siwei Wu and
                  Yajin Zhou and
                  Runhuai Li and
                  Zhi Wang and
                  Xiapu Luo and
                  Cong Wang and
                  Kui Ren},
  title        = {EthScope: {A} Transaction-centric Security Analytics Framework to
                  Detect Malicious Smart Contracts on Ethereum},
  journal      = {CoRR},
  volume       = {abs/2005.08278},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.08278},
  eprinttype    = {arXiv},
  eprint       = {2005.08278},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-08278.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-14619,
  author       = {Ren He and
                  Haoyu Wang and
                  Pengcheng Xia and
                  Liu Wang and
                  Yuanchun Li and
                  Lei Wu and
                  Yajin Zhou and
                  Xiapu Luo and
                  Yao Guo and
                  Guoai Xu},
  title        = {Beyond the Virus: {A} First Look at Coronavirus-themed Mobile Malware},
  journal      = {CoRR},
  volume       = {abs/2005.14619},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.14619},
  eprinttype    = {arXiv},
  eprint       = {2005.14619},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-14619.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-13639,
  author       = {Pengcheng Xia and
                  Haoyu Wang and
                  Xiapu Luo and
                  Lei Wu and
                  Yajin Zhou and
                  Guangdong Bai and
                  Guoai Xu and
                  Gang Huang and
                  Xuanzhe Liu},
  title        = {Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency
                  Scams},
  journal      = {CoRR},
  volume       = {abs/2007.13639},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.13639},
  eprinttype    = {arXiv},
  eprint       = {2007.13639},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-13639.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-12252,
  author       = {Dabao Wang and
                  Siwei Wu and
                  Ziling Lin and
                  Lei Wu and
                  Xingliang Yuan and
                  Yajin Zhou and
                  Haoyu Wang and
                  Kui Ren},
  title        = {Towards understanding flash loan and its applications in defi ecosystem},
  journal      = {CoRR},
  volume       = {abs/2010.12252},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.12252},
  eprinttype    = {arXiv},
  eprint       = {2010.12252},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-12252.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-12400,
  author       = {Yuan Chen and
                  Jiaqi Li and
                  Guorui Xu and
                  Yajin Zhou and
                  Zhi Wang and
                  Cong Wang and
                  Kui Ren},
  title        = {Towards Efficiently Establishing Mutual Distrust Between Host Application
                  and Enclave for {SGX}},
  journal      = {CoRR},
  volume       = {abs/2010.12400},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.12400},
  eprinttype    = {arXiv},
  eprint       = {2010.12400},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-12400.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-16274,
  author       = {Lei Wu and
                  Yufeng Hu and
                  Yajin Zhou and
                  Haoyu Wang and
                  Xiapu Luo and
                  Zhi Wang and
                  Fan Zhang and
                  Kui Ren},
  title        = {Towards Understanding and Demystifying Bitcoin Mixing Services},
  journal      = {CoRR},
  volume       = {abs/2010.16274},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.16274},
  eprinttype    = {arXiv},
  eprint       = {2010.16274},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-16274.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-02673,
  author       = {Bingyu Gao and
                  Haoyu Wang and
                  Pengcheng Xia and
                  Siwei Wu and
                  Yajin Zhou and
                  Xiapu Luo and
                  Gareth Tyson},
  title        = {Tracking Counterfeit Cryptocurrency End-to-end},
  journal      = {CoRR},
  volume       = {abs/2011.02673},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.02673},
  eprinttype    = {arXiv},
  eprint       = {2011.02673},
  timestamp    = {Mon, 09 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-02673.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangQWCZ19,
  author       = {Xiaoguang Wang and
                  Yong Qi and
                  Zhi Wang and
                  Yue Chen and
                  Yajin Zhou},
  title        = {Design and Implementation of SecPod, {A} Framework for Virtualization-Based
                  Security Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {1},
  pages        = {44--57},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2675991},
  doi          = {10.1109/TDSC.2017.2675991},
  timestamp    = {Wed, 19 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangQWCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XueQZLZSC19,
  author       = {Lei Xue and
                  Chenxiong Qian and
                  Hao Zhou and
                  Xiapu Luo and
                  Yajin Zhou and
                  Yuru Shao and
                  Alvin T. S. Chan},
  title        = {NDroid: Toward Tracking Information Flows Across Multiple Android
                  Contexts},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {3},
  pages        = {814--828},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2866347},
  doi          = {10.1109/TIFS.2018.2866347},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XueQZLZSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaoHWQZBW19,
  author       = {Mengchen Cao and
                  Xiantong Hou and
                  Tao Wang and
                  Hunter Qu and
                  Yajin Zhou and
                  Xiaolong Bai and
                  Fuwei Wang},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Different is Good: Detecting the Use of Uninitialized Variables through
                  Differential Replay},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1883--1897},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3345654},
  doi          = {10.1145/3319535.3345654},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaoHWQZBW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuanWYZW019,
  author       = {Huayi Duan and
                  Cong Wang and
                  Xingliang Yuan and
                  Yajin Zhou and
                  Qian Wang and
                  Kui Ren},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2351--2367},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3339814},
  doi          = {10.1145/3319535.3339814},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DuanWYZW019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KhandakerNL0ZC19,
  author       = {Mustakimur Khandaker and
                  Abu Naser and
                  Wenqing Liu and
                  Zhi Wang and
                  Yajin Zhou and
                  Yueqiang Cheng},
  title        = {Adaptive Call-Site Sensitive Control Flow Integrity},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {95--110},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00017},
  doi          = {10.1109/EUROSP.2019.00017},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/KhandakerNL0ZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/CuiDQWZ19,
  author       = {Helei Cui and
                  Huayi Duan and
                  Zhan Qin and
                  Cong Wang and
                  Yajin Zhou},
  title        = {{SPEED:} Accelerating Enclave Applications Via Secure Deduplication},
  booktitle    = {39th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019},
  pages        = {1072--1082},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDCS.2019.00110},
  doi          = {10.1109/ICDCS.2019.00110},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/CuiDQWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/TangZZLXZY19,
  author       = {Yutian Tang and
                  Xian Zhan and
                  Hao Zhou and
                  Xiapu Luo and
                  Zhou Xu and
                  Yajin Zhou and
                  Qiben Yan},
  title        = {Demystifying Application Performance Management Libraries for Android},
  booktitle    = {34th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2019, San Diego, CA, USA, November 11-15, 2019},
  pages        = {682--685},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ASE.2019.00069},
  doi          = {10.1109/ASE.2019.00069},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/TangZZLXZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChengHLZLLR19,
  author       = {Zhen Cheng and
                  Xinrui Hou and
                  Runhuai Li and
                  Yajin Zhou and
                  Xiapu Luo and
                  Jinku Li and
                  Kui Ren},
  title        = {Towards a First Step to Understand the Cryptocurrency Stealing Attack
                  on Ethereum},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {47--60},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/cheng},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ChengHLZLLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-03538,
  author       = {Xiaoxuan Lou and
                  Fan Zhang and
                  Zheng Leong Chua and
                  Zhenkai Liang and
                  Yueqiang Cheng and
                  Yajin Zhou},
  title        = {Understanding Rowhammer Attacks through the Lens of a Unified Reference
                  Framework},
  journal      = {CoRR},
  volume       = {abs/1901.03538},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.03538},
  eprinttype    = {arXiv},
  eprint       = {1901.03538},
  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-03538.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-01981,
  author       = {Zhen Cheng and
                  Xinrui Hou and
                  Runhuai Li and
                  Yajin Zhou and
                  Xiapu Luo and
                  Jinku Li and
                  Kui Ren},
  title        = {Towards a First Step to Understand the Cryptocurrency Stealing Attack
                  on Ethereum},
  journal      = {CoRR},
  volume       = {abs/1904.01981},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.01981},
  eprinttype    = {arXiv},
  eprint       = {1904.01981},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-01981.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-10666,
  author       = {Yutian Yang and
                  Songbo Zhu and
                  Wenbo Shen and
                  Yajin Zhou and
                  Jiadong Sun and
                  Kui Ren},
  title        = {{ARM} Pointer Authentication based Forward-Edge and Backward-Edge
                  Control Flow Integrity for Kernels},
  journal      = {CoRR},
  volume       = {abs/1912.10666},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.10666},
  eprinttype    = {arXiv},
  eprint       = {1912.10666},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-10666.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiYZM18,
  author       = {Jinku Li and
                  Yangtian Ye and
                  Yajin Zhou and
                  Jianfeng Ma},
  title        = {CodeTracker: {A} Lightweight Approach to Track and Protect Authorization
                  Codes in {SMS} Messages},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {10107--10120},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2804321},
  doi          = {10.1109/ACCESS.2018.2804321},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiYZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/CuiZWLR18,
  author       = {Helei Cui and
                  Yajin Zhou and
                  Cong Wang and
                  Qi Li and
                  Kui Ren},
  title        = {Towards Privacy-Preserving Malware Detection Systems for Android},
  booktitle    = {24th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2018, Singapore, December 11-13, 2018},
  pages        = {545--552},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/PADSW.2018.8644924},
  doi          = {10.1109/PADSW.2018.8644924},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/CuiZWLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-04901,
  author       = {Yangyu Hu and
                  Haoyu Wang and
                  Yajin Zhou and
                  Yao Guo and
                  Li Li and
                  Bingxuan Luo and
                  Fangren Xu},
  title        = {Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating
                  Applications},
  journal      = {CoRR},
  volume       = {abs/1807.04901},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.04901},
  eprinttype    = {arXiv},
  eprint       = {1807.04901},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-04901.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/BuXXZTX17,
  author       = {Wenqi Bu and
                  Minhui Xue and
                  Lihua Xu and
                  Yajin Zhou and
                  Zhushou Tang and
                  Tao Xie},
  editor       = {Eric Bodden and
                  Wilhelm Sch{\"{a}}fer and
                  Arie van Deursen and
                  Andrea Zisman},
  title        = {When program analysis meets mobile security: an industrial study of
                  misusing Android internet sockets},
  booktitle    = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
  pages        = {842--847},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3106237.3117764},
  doi          = {10.1145/3106237.3117764},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/BuXXZTX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XueZCLG17,
  author       = {Lei Xue and
                  Yajin Zhou and
                  Ting Chen and
                  Xiapu Luo and
                  Guofei Gu},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for
                  {ART}},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {289--306},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/xue},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XueZCLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/JiangSZ16,
  author       = {Xuxian Jiang and
                  Kapil Singh and
                  Yajin Zhou},
  editor       = {Sema Oktug and
                  Mehmet Ulema and
                  Cicek Cavdar and
                  Lisandro Zambenedetti Granville and
                  Carlos Raniery Paula dos Santos},
  title        = {AppShell: Making data protection practical for lost or stolen Android
                  devices},
  booktitle    = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2016, Istanbul, Turkey, April 25-29, 2016},
  pages        = {502--508},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NOMS.2016.7502850},
  doi          = {10.1109/NOMS.2016.7502850},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/JiangSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SunLZ16,
  author       = {Mingshen Sun and
                  John C. S. Lui and
                  Yajin Zhou},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Blender: Self-randomizing Address Space Layout for Android Apps},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {457--480},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_21},
  doi          = {10.1007/978-3-319-45719-2\_21},
  timestamp    = {Fri, 27 Dec 2019 21:24:31 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/SunLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouPWWJ15,
  author       = {Yajin Zhou and
                  Kunal Patel and
                  Lei Wu and
                  Zhi Wang and
                  Xuxian Jiang},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Hybrid User-level Sandboxing of Third-party Android Apps},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {19--30},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714598},
  doi          = {10.1145/2714576.2714598},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouPWWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/WangCWQZ15,
  author       = {Xiaoguang Wang and
                  Yue Chen and
                  Zhi Wang and
                  Yong Qi and
                  Yajin Zhou},
  editor       = {Shan Lu and
                  Erik Riedel},
  title        = {SecPod: a Framework for Virtualization-based Security Systems},
  booktitle    = {2015 {USENIX} Annual Technical Conference, {USENIX} {ATC} '15, July
                  8-10, Santa Clara, CA, {USA}},
  pages        = {347--360},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/atc15/technical-session/presentation/wang-xiaoguang},
  timestamp    = {Mon, 01 Feb 2021 08:43:30 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/WangCWQZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhouWWJ15,
  author       = {Yajin Zhou and
                  Lei Wu and
                  Zhi Wang and
                  Xuxian Jiang},
  title        = {Harvesting developer credentials in Android apps},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {23:1--23:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766499},
  doi          = {10.1145/2766498.2766499},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhouWWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouWCW14,
  author       = {Yajin Zhou and
                  Xiaoguang Wang and
                  Yue Chen and
                  Zhi Wang},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {ARMlock: Hardware-based Fault Isolation for {ARM}},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {558--569},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660344},
  doi          = {10.1145/2660267.2660344},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouWCW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhouWZJ14,
  author       = {Wu Zhou and
                  Zhi Wang and
                  Yajin Zhou and
                  Xuxian Jiang},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {{DIVILAR:} diversifying intermediate language for anti-repackaging
                  on android platform},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {199--210},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557558},
  doi          = {10.1145/2557547.2557558},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhouWZJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WuZPLJ14,
  author       = {Chiachih Wu and
                  Yajin Zhou and
                  Kunal Patel and
                  Zhenkai Liang and
                  Xuxian Jiang},
  title        = {AirBag: Boosting Smartphone Resistance to Malware Infection},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/airbag-boosting-smartphone-resistance-malware-infection},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WuZPLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZhouSJ14,
  author       = {Yajin Zhou and
                  Kapil Singh and
                  Xuxian Jiang},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Owner-Centric Protection of Unstructured Data on Smartphones},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_4},
  doi          = {10.1007/978-3-319-08593-7\_4},
  timestamp    = {Wed, 25 Sep 2019 18:21:56 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ZhouSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/JiangZ13,
  author       = {Xuxian Jiang and
                  Yajin Zhou},
  title        = {Android Malware},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-7394-7},
  doi          = {10.1007/978-1-4614-7394-7},
  isbn         = {978-1-4614-7393-0},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/JiangZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuGZWJ13,
  author       = {Lei Wu and
                  Michael C. Grace and
                  Yajin Zhou and
                  Chiachih Wu and
                  Xuxian Jiang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {The impact of vendor customizations on android security},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {623--634},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516728},
  doi          = {10.1145/2508859.2516728},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WuGZWJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhouZGJZ13,
  author       = {Wu Zhou and
                  Yajin Zhou and
                  Michael C. Grace and
                  Xuxian Jiang and
                  Shihong Zou},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {Fast, scalable detection of "Piggybacked" mobile applications},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {185--196},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435377},
  doi          = {10.1145/2435349.2435377},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhouZGJZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhouJ13,
  author       = {Yajin Zhou and
                  Xuxian Jiang},
  title        = {Detecting Passive Content Leaks and Pollution in Android Applications},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/detecting-passive-content-leaks-and-pollution-android-applications},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhouJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhouZJN12,
  author       = {Wu Zhou and
                  Yajin Zhou and
                  Xuxian Jiang and
                  Peng Ning},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Detecting repackaged smartphone applications in third-party android
                  marketplaces},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {317--326},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133640},
  doi          = {10.1145/2133601.2133640},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhouZJN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/GraceZZZJ12,
  author       = {Michael C. Grace and
                  Yajin Zhou and
                  Qiang Zhang and
                  Shihong Zou and
                  Xuxian Jiang},
  editor       = {Nigel Davies and
                  Srinivasan Seshan and
                  Lin Zhong},
  title        = {RiskRanker: scalable and accurate zero-day android malware detection},
  booktitle    = {The 10th International Conference on Mobile Systems, Applications,
                  and Services, MobiSys'12, Ambleside, United Kingdom - June 25 - 29,
                  2012},
  pages        = {281--294},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2307636.2307663},
  doi          = {10.1145/2307636.2307663},
  timestamp    = {Thu, 31 Oct 2019 15:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/GraceZZZJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GraceZWJ12,
  author       = {Michael C. Grace and
                  Yajin Zhou and
                  Zhi Wang and
                  Xuxian Jiang},
  title        = {Systematic Detection of Capability Leaks in Stock Android Smartphones},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/systematic-detection-capability-leaks-stock-android-smartphones},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GraceZWJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhouWZJ12,
  author       = {Yajin Zhou and
                  Zhi Wang and
                  Wu Zhou and
                  Xuxian Jiang},
  title        = {Hey, You, Get Off of My Market: Detecting Malicious Apps in Official
                  and Alternative Android Markets},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/hey-you-get-my-market-detecting-malicious-apps-official-and-alternative-android-markets},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhouWZJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhouJ12,
  author       = {Yajin Zhou and
                  Xuxian Jiang},
  title        = {Dissecting Android Malware: Characterization and Evolution},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {95--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.16},
  doi          = {10.1109/SP.2012.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhouJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZhouZJF11,
  author       = {Yajin Zhou and
                  Xinwen Zhang and
                  Xuxian Jiang and
                  Vincent W. Freeh},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Taming Information-Stealing Smartphone Applications (on Android)},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {93--107},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_7},
  doi          = {10.1007/978-3-642-21599-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ZhouZJF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijia/ChenLMYMLZM07,
  author       = {Wanming Chen and
                  Huawei Liang and
                  Tao Mei and
                  Zhuhong You and
                  Shifu Miao and
                  Shuai Li and
                  Yajin Zhou and
                  Max Q.{-}H. Meng},
  title        = {Design and Implementation of Wireless Sensor Network for Robot Navigation},
  journal      = {Int. J. Inf. Acquis.},
  volume       = {4},
  number       = {1},
  pages        = {77--89},
  year         = {2007},
  url          = {https://doi.org/10.1142/S0219878907001186},
  doi          = {10.1142/S0219878907001186},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijia/ChenLMYMLZM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/robio/LiMCLYZSLJG07,
  author       = {Shuai Li and
                  Max Q.{-}H. Meng and
                  Wanming Chen and
                  Yangming Li and
                  Zhuhong You and
                  Yajin Zhou and
                  Lei Sun and
                  Huawei Liang and
                  Kai Jiang and
                  Qinglei Guo},
  title        = {{SP-NN:} {A} novel neural network approach for path planning},
  booktitle    = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO}
                  2007, Sanya, China, 15-28 December 2007},
  pages        = {1355--1360},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ROBIO.2007.4522361},
  doi          = {10.1109/ROBIO.2007.4522361},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/robio/LiMCLYZSLJG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics