default search action
Yajin Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j35]Xiaohui Hu, Hang Feng, Pengcheng Xia, Gareth Tyson, Lei Wu, Yajin Zhou, Haoyu Wang:
Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain Networks. Proc. ACM Meas. Anal. Comput. Syst. 8(3): 42:1-42:27 (2024) - [j34]Yufeng Hu, Yingshi Sun, Lei Wu, Yajin Zhou, Rui Chang:
Towards Understanding and Analyzing Instant Cryptocurrency Exchanges. Proc. ACM Meas. Anal. Comput. Syst. 8(3): 48:1-48:24 (2024) - [j33]Zhuo Chen, Lei Wu, Yubo Hu, Jing Cheng, Yufeng Hu, Yajin Zhou, Zhushou Tang, Yexuan Chen, Jinku Li, Kui Ren:
Lifting the Grey Curtain: Analyzing the Ecosystem of Android Scam Apps. IEEE Trans. Dependable Secur. Comput. 21(4): 3406-3421 (2024) - [j32]Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Hexiang Wang, Baolei Hou, Lei Wu, Xiapu Luo:
An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices. IEEE Trans. Dependable Secur. Comput. 21(4): 3501-3514 (2024) - [j31]Yutian Yang, Jinjiang Tu, Wenbo Shen, Songbo Zhu, Rui Chang, Yajin Zhou:
kCPA: Towards Sensitive Pointer Full Life Cycle Authentication for OS Kernels. IEEE Trans. Dependable Secur. Comput. 21(4): 3768-3784 (2024) - [j30]Siwei Wu, Zhou Yu, Dabao Wang, Yajin Zhou, Lei Wu, Haoyu Wang, Xingliang Yuan:
DeFiRanger: Detecting DeFi Price Manipulation Attacks. IEEE Trans. Dependable Secur. Comput. 21(4): 4147-4161 (2024) - [j29]Xingjian Zhang, Haochen Gong, Rui Chang, Yajin Zhou:
RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping. IEEE Trans. Inf. Forensics Secur. 19: 3758-3771 (2024) - [j28]Muhui Jiang, Jinan Jiang, Tao Wu, Zuchao Ma, Xiapu Luo, Yajin Zhou:
Understanding Vulnerability Inducing Commits of the Linux Kernel. ACM Trans. Softw. Eng. Methodol. 33(7): 170:1-170:28 (2024) - [j27]Dabao Wang, Bang Wu, Xingliang Yuan, Lei Wu, Yajin Zhou, Helei Cui:
DeFiGuard: A Price Manipulation Detection Service in DeFi Using Graph Neural Networks. IEEE Trans. Serv. Comput. 17(6): 3345-3358 (2024) - [j26]Zicong Gao, Hao Xiong, Weiyu Dong, Rui Chang, Rui Yang, Yajin Zhou, Liehui Jiang:
FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing. IEEE Trans. Software Eng. 50(1): 1-15 (2024) - [j25]Muhui Jiang, Xiaoye Zheng, Rui Chang, Yajin Zhou, Xiapu Luo:
Examiner-Pro: Testing Arm Emulators Across Different Privileges. IEEE Trans. Software Eng. 50(11): 2786-2806 (2024) - [c70]Chaoyuan Peng, Muhui Jiang, Lei Wu, Yajin Zhou:
Toss a Fault to BpfChecker: Revealing Implementation Flaws for eBPF runtimes with Differential Fuzzing. CCS 2024: 3928-3942 - [c69]Hao Xiong, Qinming Dai, Rui Chang, Mingran Qiu, Renxiang Wang, Wenbo Shen, Yajin Zhou:
Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries. ISSTA 2024: 350-362 - [c68]Ziqi Yuan, Siyu Hong, Ruorong Guo, Rui Chang, Mingyu Gao, Wenbo Shen, Yajin Zhou:
LightZone: Lightweight Hardware-Assisted In-Process Isolation for ARM64. Middleware 2024: 467-480 - [c67]Hang Feng, Yufeng Hu, Yinghan Kou, Runhuai Li, Jianfeng Zhu, Lei Wu, Yajin Zhou:
SlimArchive: A Lightweight Architecture for Ethereum Archive Nodes. USENIX ATC 2024: 1257-1272 - [c66]Xingkai Wang, Wenbo Shen, Yujie Bu, Jinmeng Zhou, Yajin Zhou:
DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks. USENIX Security Symposium 2024 - [c65]Jintao Huang, Pengcheng Xia, Jiefeng Li, Kai Ma, Gareth Tyson, Xiapu Luo, Lei Wu, Yajin Zhou, Wei Cai, Haoyu Wang:
Unveiling the Paradox of NFT Prosperity. WWW 2024: 167-177 - [i31]Pengcheng Xia, Zhou Yu, Kailong Wang, Kai Ma, Shuo Chen, Xiapu Luo, Yajin Zhou, Lei Wu, Guangdong Bai, Haoyu Wang:
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web. CoRR abs/2401.04662 (2024) - [i30]Junjie Ma, Muhui Jiang, Jinan Jiang, Xiapu Luo, Yufeng Hu, Yajin Zhou, Qi Wang, Fengwei Zhang:
Demystifying the DAO Governance Process. CoRR abs/2403.11758 (2024) - [i29]Yi He, Yuan Zhou, Yacong Gu, Purui Su, Qi Li, Yajin Zhou, Yong Jiang:
JNI Global References Are Still Vulnerable: Attacks and Defenses. CoRR abs/2405.00526 (2024) - [i28]Dabao Wang, Bang Wu, Xingliang Yuan, Lei Wu, Yajin Zhou, Helei Cui:
DeFiGuard: A Price Manipulation Detection Service in DeFi using Graph Neural Networks. CoRR abs/2406.11157 (2024) - [i27]Zhuo Chen, Yufeng Hu, Bowen He, Dong Luo, Lei Wu, Yajin Zhou:
Dissecting Payload-based Transaction Phishing on Ethereum. CoRR abs/2409.02386 (2024) - 2023
- [j24]Bowen He, Xiao Zheng, Yuan Chen, Weinan Li, Yajin Zhou, Xin Long, Pengcheng Zhang, Xiaowei Lu, Linquan Jiang, Qiang Liu, Dennis Cai, Xiantao Zhang:
DxPU: Large-scale Disaggregated GPU Pools in the Datacenter. ACM Trans. Archit. Code Optim. 20(4): 55:1-55:23 (2023) - [j23]Jian Lin, Dingding Wang, Rui Chang, Lei Wu, Yajin Zhou, Kui Ren:
EnBinDiff: Identifying Data-Only Patches for Binaries. IEEE Trans. Dependable Secur. Comput. 20(1): 343-359 (2023) - [j22]Yi He, Yacong Gu, Purui Su, Kun Sun, Yajin Zhou, Zhi Wang, Qi Li:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. IEEE Trans. Dependable Secur. Comput. 20(2): 1609-1623 (2023) - [j21]Muhui Jiang, Qinming Dai, Wenlong Zhang, Rui Chang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren:
A Comprehensive Study on ARM Disassembly Tools. IEEE Trans. Software Eng. 49(4): 1683-1703 (2023) - [j20]Peng Qian, Jianting He, Lingling Lu, Siwei Wu, Zhipeng Lu, Lei Wu, Yajin Zhou, Qinming He:
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. IEEE Trans. Software Eng. 49(7): 3793-3810 (2023) - [c64]Ziqi Yuan, Siyu Hong, Rui Chang, Yajin Zhou, Wenbo Shen, Kui Ren:
VDom: Fast and Unlimited Virtual Domains on Multiple Architectures. ASPLOS (2) 2023: 905-919 - [c63]Bowen He, Yuan Chen, Zhuo Chen, Xiaohui Hu, Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou:
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum. CCS 2023: 120-134 - [c62]Boyang Ma, Yilin Yang, Jinku Li, Fengwei Zhang, Wenbo Shen, Yajin Zhou, Jianfeng Ma:
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery. CCS 2023: 341-355 - [c61]Huamao Wu, Yuan Chen, Yajin Zhou, Yifei Wang, Lubo Zhang:
DriverJar: Lightweight Device Driver Isolation for ARM. DAC 2023: 1-6 - [c60]Zhuo Chen, Jie Liu, Yubo Hu, Lei Wu, Yajin Zhou, Yiling He, Xianhao Liao, Ke Wang, Jinku Li, Zhan Qin:
DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity. ISSTA 2023: 223-235 - [c59]Lin Ma, Duoming Zhou, Hanjie Wu, Yajin Zhou, Rui Chang, Hao Xiong, Lei Wu, Kui Ren:
When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel. SP 2023: 2138-2154 - [c58]Qiang Liu, Flavio Toffalini, Yajin Zhou, Mathias Payer:
ViDeZZo: Dependency-aware Virtual Device Fuzzing. SP 2023: 3228-3245 - [c57]Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang:
MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation. USENIX Security Symposium 2023: 1307-1324 - [i26]Peng Qian, Jianting He, Lingling Lu, Siwei Wu, Zhipeng Lu, Lei Wu, Yajin Zhou, Qinming He:
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. CoRR abs/2304.12645 (2023) - [i25]Bowen He, Xiao Zheng, Yuan Chen, Weinan Li, Yajin Zhou, Xin Long, Pengcheng Zhang, Xiaowei Lu, Linquan Jiang, Qiang Liu, Dennis Cai, Xiantao Zhang:
DxPU: Large Scale Disaggregated GPU Pools in the Datacenter. CoRR abs/2310.04648 (2023) - [i24]Jiaqi Li, Ke Wang, Yaoguang Chen, Yajin Zhou, Lei Wu, Jiashui Wang:
Detecting DBMS Bugs with Context-Sensitive Instantiation and Multi-Plan Execution. CoRR abs/2312.04941 (2023) - 2022
- [j19]Zhelei Zhou, Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Yibiao Lu, Kui Ren, Phuc Thai, Hong-Sheng Zhou:
Scriptable and composable SNARKs in the trusted hardware model. J. Comput. Secur. 30(6): 757-793 (2022) - [j18]Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun, Yacong Gu, Yong Jiang:
JNI Global References Are Still Vulnerable: Attacks and Defenses. IEEE Trans. Dependable Secur. Comput. 19(1): 607-619 (2022) - [j17]Jun Qiu, Xuewu Yang, Huamao Wu, Yajin Zhou, Jinku Li, Jianfeng Ma:
LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications. IEEE Trans. Dependable Secur. Comput. 19(5): 2873-2889 (2022) - [j16]Siwei Wu, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum. ACM Trans. Softw. Eng. Methodol. 31(3): 54:1-54:33 (2022) - [j15]Lei Xue, Hao Zhou, Xiapu Luo, Le Yu, Dinghao Wu, Yajin Zhou, Xiaobo Ma:
PackerGrind: An Adaptive Unpacking System for Android Apps. IEEE Trans. Software Eng. 48(2): 551-570 (2022) - [j14]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. IEEE Trans. Software Eng. 48(8): 3044-3065 (2022) - [c56]Muhui Jiang, Tianyi Xu, Yajin Zhou, Yufeng Hu, Ming Zhong, Lei Wu, Xiapu Luo, Kui Ren:
EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM. ASPLOS 2022: 846-858 - [c55]Jinyan Xu, Haoran Lin, Ziqi Yuan, Wenbo Shen, Yajin Zhou, Rui Chang, Lei Wu, Kui Ren:
RegVault: hardware assisted selective data randomization for operating system kernels. DAC 2022: 715-720 - [c54]Xia Zhou, Jiaqi Li, Wenlong Zhang, Yajin Zhou, Wenbo Shen, Kui Ren:
OPEC: operation-based security isolation for bare-metal embedded systems. EuroSys 2022: 317-333 - [c53]Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Yajin Zhou, Chao Zhang, Haipeng Cai:
NCScope: hardware-assisted analyzer for native code in Android apps. ISSTA 2022: 629-641 - [c52]Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang:
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android. NDSS 2022 - [c51]Dabao Wang, Hang Feng, Siwei Wu, Yajin Zhou, Lei Wu, Xingliang Yuan:
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum. RAID 2022: 99-114 - [c50]Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu:
SAID: State-aware Defense Against Injection Attacks on In-vehicle Network. USENIX Security Symposium 2022: 1921-1938 - [c49]Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu:
Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols. USENIX Security Symposium 2022: 1939-1956 - [c48]Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:
SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. USENIX Security Symposium 2022: 4129-4146 - [i23]Yi He, Yacong Gu, Purui Su, Kun Sun, Yajin Zhou, Zhi Wang, Qi Li:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. CoRR abs/2203.09374 (2022) - [i22]Dabao Wang, Hang Feng, Siwei Wu, Yajin Zhou, Lei Wu, Xingliang Yuan:
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum. CoRR abs/2207.01790 (2022) - [i21]Jingyi Guo, Min Zheng, Yajin Zhou, Haoyu Wang, Lei Wu, Xiapu Luo, Kui Ren:
iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps. CoRR abs/2207.01837 (2022) - [i20]Zhuo Chen, Jie Liu, Yubo Hu, Lei Wu, Yajin Zhou, Xianhao Liao, Ke Wang:
Illegal But Not Malware: An Underground Economy App Detection System Based on Usage Scenario. CoRR abs/2209.01317 (2022) - [i19]Haoran Lin, Yajin Zhou, Lei Wu:
Operation-level Concurrent Transaction Execution for Blockchains. CoRR abs/2211.07911 (2022) - 2021
- [j13]Liu Wang, Ren He, Haoyu Wang, Pengcheng Xia, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yulei Sui, Yao Guo, Guoai Xu:
Beyond the virus: a first look at coronavirus-themed Android malware. Empir. Softw. Eng. 26(4): 82 (2021) - [j12]Wei Zheng, Ying Wu, Xiaoxue Wu, Chen Feng, Yulei Sui, Xiapu Luo, Yajin Zhou:
A survey of Intel SGX and its applications. Frontiers Comput. Sci. 15(3): 153808 (2021) - [j11]Ming Zhong, Yajin Zhou, Gang Chen:
A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network. Secur. Commun. Networks 2021: 5542543:1-5542543:13 (2021) - [j10]Ming Zhong, Yajin Zhou, Gang Chen:
Sequential Model Based Intrusion Detection System for IoT Servers Using Deep Learning Methods. Sensors 21(4): 1113 (2021) - [j9]Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo, Fangren Xu:
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications. IEEE Trans. Dependable Secur. Comput. 18(3): 1033-1050 (2021) - [j8]Helei Cui, Yajin Zhou, Cong Wang, Xinyu Wang, Yuefeng Du, Qian Wang:
PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing. IEEE Trans. Dependable Secur. Comput. 18(4): 1762-1778 (2021) - [c47]Lin Ma, Jinyan Xu, Jiadong Sun, Yajin Zhou, Xun Xie, Wenbo Shen, Rui Chang, Kui Ren:
Revisiting challenges for selective data protection of real applications. APSys 2021: 138-145 - [c46]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem. SBC@AsiaCCS 2021: 23-28 - [c45]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CCS 2021: 734-748 - [c44]Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Phuc Thai, Hong-Sheng Zhou, Kui Ren:
Succinct Scriptable NIZK via Trusted Hardware. ESORICS (1) 2021: 430-451 - [c43]Lei Xue, Yuxiao Yan, Luyi Yan, Muhui Jiang, Xiapu Luo, Dinghao Wu, Yajin Zhou:
Parema: an unpacking framework for demystifying VM-based Android packers. ISSTA 2021: 152-164 - [c42]Hao Zhou, Haoyu Wang, Shuohan Wu, Xiapu Luo, Yajin Zhou, Ting Chen, Ting Wang:
Finding the Missing Piece: Permission Specification Analysis for Android NDK. ASE 2021: 505-516 - [c41]Qiang Liu, Cen Zhang, Lin Ma, Muhui Jiang, Yajin Zhou, Lei Wu, Wenbo Shen, Xiapu Luo, Yang Liu, Kui Ren:
FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution. ASE 2021: 792-804 - [c40]Min Zheng, Xiaolong Bai, Yajin Zhou, Chao Zhang, Fuping Qu:
POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming. NDSS 2021 - [c39]Xingjian Zhang, Ziqi Yuan, Rui Chang, Yajin Zhou:
Seeds of SEED: H2Cache: Building a Hybrid Randomized Cache Hierarchy for Mitigating Cache Side-Channel Attacks. SEED 2021: 29-36 - [c38]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. SIGMETRICS (Abstracts) 2021: 33-34 - [c37]Yang Chen, Zhongxin Guo, Runhuai Li, Shuo Chen, Lidong Zhou, Yajin Zhou, Xian Zhang:
Forerunner: Constraint-based Speculative Transaction Execution for Ethereum. SOSP 2021: 570-587 - [c36]Lei Xue, Hao Zhou, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang, Man Ho Au:
Happer: Unpacking Android Apps via a Hardware-Assisted Approach. SP 2021: 1641-1658 - [c35]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. WWW 2021: 33-44 - [i18]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. CoRR abs/2103.11286 (2021) - [i17]Siwei Wu, Dabao Wang, Jianting He, Yajin Zhou, Lei Wu, Xingliang Yuan, Qinming He, Kui Ren:
DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications. CoRR abs/2104.15068 (2021) - [i16]Lin Ma, Jinyan Xu, Jiadong Sun, Yajin Zhou, Xun Xie, Wenbo Shen, Rui Chang, Kui Ren:
Revisiting Challenges for Selective Data Protection of Real Applications. CoRR abs/2105.14251 (2021) - [i15]Muhui Jiang, Tianyi Xu, Yajin Zhou, Yufeng Hu, Ming Zhong, Lei Wu, Xiapu Luo, Kui Ren:
Examiner: Automatically Locating Inconsistent Instructions Between Real Devices and CPU Emulators for ARM. CoRR abs/2105.14273 (2021) - [i14]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CoRR abs/2105.14295 (2021) - [i13]Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Baolei Hou, Xiapu Luo, Lei Wu, Kui Ren:
A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices. CoRR abs/2105.14298 (2021) - [i12]Zhuo Chen, Lei Wu, Jing Cheng, Yubo Hu, Yajin Zhou, Zhushou Tang, Yexuan Chen, Jinku Li, Kui Ren:
Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE. CoRR abs/2106.05756 (2021) - 2020
- [j7]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. Proc. ACM Meas. Anal. Comput. Syst. 4(3): 50:1-50:28 (2020) - [j6]Xiaonan Zhu, Jinku Li, Yajin Zhou, Jianfeng Ma:
AdCapsule: Practical Confinement of Advertisements in Android Applications. IEEE Trans. Dependable Secur. Comput. 17(3): 479-492 (2020) - [j5]Fan Zhang, Xiaofei Dong, Bolin Yang, Yajin Zhou, Kui Ren:
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures. IEEE Trans. Inf. Forensics Secur. 15: 1407-1422 (2020) - [c34]Wen-jie Lu, Yixuan Fang, Zhicong Huang, Cheng Hong, Chaochao Chen, Hunter Qu, Yajin Zhou, Kui Ren:
Faster Secure Multiparty Computation of Adaptive Gradient Descent. PPMLP@CCS 2020: 47-49 - [c33]Jiadong Sun, Xia Zhou, Wenbo Shen, Yajin Zhou, Kui Ren:
PESC: A Per System-Call Stack Canary Design for Linux Kernel. CODASPY 2020: 365-375 - [c32]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. eCrime 2020: 1-14 - [c31]Kui Ren, Yu Guo, Jiaqi Li, Xiaohua Jia, Cong Wang, Yajin Zhou, Sheng Wang, Ning Cao, Feifei Li:
HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services. ICDCS 2020: 23-33 - [c30]Muhui Jiang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren:
An empirical study on ARM disassembly tools. ISSTA 2020: 401-414 - [c29]Hao Zhou, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue, Ting Wang:
Demystifying Diehard Android Apps. ASE 2020: 187-198 - [i11]Lei Wu, Siwei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum. CoRR abs/2005.08278 (2020) - [i10]Ren He, Haoyu Wang, Pengcheng Xia, Liu Wang, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yao Guo, Guoai Xu:
Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware. CoRR abs/2005.14619 (2020) - [i9]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. CoRR abs/2007.13639 (2020) - [i8]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards understanding flash loan and its applications in defi ecosystem. CoRR abs/2010.12252 (2020) - [i7]Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:
Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. CoRR abs/2010.12400 (2020) - [i6]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. CoRR abs/2010.16274 (2020) - [i5]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. CoRR abs/2011.02673 (2020)
2010 – 2019
- 2019
- [j4]Xiaoguang Wang, Yong Qi, Zhi Wang, Yue Chen, Yajin Zhou:
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems. IEEE Trans. Dependable Secur. Comput. 16(1): 44-57 (2019) - [j3]Lei Xue, Chenxiong Qian, Hao Zhou, Xiapu Luo, Yajin Zhou, Yuru Shao, Alvin T. S. Chan:
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts. IEEE Trans. Inf. Forensics Secur. 14(3): 814-828 (2019) - [c28]Mengchen Cao, Xiantong Hou, Tao Wang, Hunter Qu, Yajin Zhou, Xiaolong Bai, Fuwei Wang:
Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay. CCS 2019: 1883-1897 - [c27]Huayi Duan, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang, Kui Ren:
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed. CCS 2019: 2351-2367 - [c26]Mustakimur Khandaker, Abu Naser, Wenqing Liu, Zhi Wang, Yajin Zhou, Yueqiang Cheng:
Adaptive Call-Site Sensitive Control Flow Integrity. EuroS&P 2019: 95-110 - [c25]