팔로우
Xuxian Jiang
Xuxian Jiang
PeckShield Inc.
peckshield.com의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
Dissecting android malware: Characterization and evolution
Y Zhou, X Jiang
2012 IEEE symposium on security and privacy, 95-109, 2012
28492012
Hey, you, get off of my market: detecting malicious apps in official and alternative android markets.
Y Zhou, Z Wang, W Zhou, X Jiang
NDSS 25 (4), 50-52, 2012
11882012
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction
X Jiang, X Wang, D Xu
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010
9312010
Riskranker: scalable and accurate zero-day android malware detection
M Grace, Y Zhou, Q Zhang, S Zou, X Jiang
Proceedings of the 10th international conference on Mobile systems …, 2012
8862012
Detecting repackaged smartphone applications in third-party android marketplaces
W Zhou, Y Zhou, X Jiang, P Ning
Proceedings of the second ACM conference on Data and Application Security …, 2012
8512012
Jump-oriented programming: a new class of code-reuse attack
T Bletsch, X Jiang, VW Freeh, Z Liang
Proceedings of the 6th ACM symposium on information, computer and …, 2011
7872011
Unsafe exposure analysis of mobile in-app advertisements
MC Grace, W Zhou, X Jiang, AR Sadeghi
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
6732012
Taming information-stealing smartphone applications (on android)
Y Zhou, X Zhang, X Jiang, VW Freeh
Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011
6062011
Systematic detection of capability leaks in stock android smartphones.
MC Grace, Y Zhou, Z Wang, X Jiang
NDSS 14, 19, 2012
6032012
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
Z Wang, X Jiang
2010 IEEE symposium on security and privacy, 380-395, 2010
5882010
Automated web patrol with strider honeymonkeys: Finding web sites the exploit browser vulnerabilities
YM Wang
13th Annual Network and Distributed System Security Symposium (NDSS'06), 2006
4942006
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
R Riley, X Jiang, D Xu
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
4812008
Droidchameleon: evaluating android anti-malware against transformation attacks
V Rastogi, Y Chen, X Jiang
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
4532013
Malware Detector
X Jiang
US Patent App. 12/051,703, 2008
4252008
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
4042010
Automatic protocol format reverse engineering through context-aware monitored execution.
Z Lin, X Jiang, D Xu, X Zhang
NDSS 8, 1-15, 2008
3412008
Countering kernel rootkits with lightweight hook protection
Z Wang, X Jiang, W Cui, P Ning
Proceedings of the 16th ACM conference on Computer and communications …, 2009
3102009
Fast, scalable detection of" piggybacked" mobile applications
W Zhou, Y Zhou, M Grace, X Jiang, S Zou
Proceedings of the third ACM conference on Data and application security and …, 2013
3082013
Violin: Virtual internetworking on overlay infrastructure
X Jiang, D Xu
Parallel and Distributed Processing and Applications: Second International …, 2005
2652005
Defeating return-oriented rootkits with "Return-Less" kernels
J Li, Z Wang, X Jiang, M Grace, S Bahram
Proceedings of the 5th European conference on Computer systems, 195-208, 2010
2502010
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20