Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets Y Zhou, Z Wang, W Zhou, X Jiang Proc. of the 19th Annual Network and Distributed System Security Symposium …, 2012 | 1233 | 2012 |
Systematic Detection of Capability Leaks in Stock Android Smartphones M Grace, Y Zhou, Z Wang, X Jiang Proceedings of the 19th Annual Symposium on Network and Distributed System …, 2012 | 619 | 2012 |
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity Z Wang, X Jiang 2010 IEEE symposium on security and privacy, 380-395, 2010 | 607 | 2010 |
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 414 | 2010 |
Countering kernel rootkits with lightweight hook protection Z Wang, X Jiang, W Cui, P Ning Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 320 | 2009 |
Defeating return-oriented rootkits with "Return-Less" kernels J Li, Z Wang, X Jiang, M Grace, S Bahram Proceedings of the 5th European conference on Computer systems, 195-208, 2010 | 252 | 2010 |
Dksm: Subverting virtual machine introspection for fun and profit S Bahram, X Jiang, Z Wang, M Grace, J Li, D Srinivasan, J Rhee, D Xu 2010 29th IEEE symposium on reliable distributed systems, 82-91, 2010 | 235 | 2010 |
Reformat: Automatic reverse engineering of encrypted messages Z Wang, X Jiang, W Cui, X Wang, M Grace Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 230 | 2009 |
Process out-grafting: an efficient" out-of-vm" approach for fine-grained process execution monitoring D Srinivasan, Z Wang, X Jiang, D Xu Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 153 | 2011 |
Countering persistent kernel rootkits through systematic hook discovery Z Wang, X Jiang, W Cui, X Wang Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 138 | 2008 |
Armlock: Hardware-based fault isolation for arm Y Zhou, X Wang, Y Chen, Z Wang Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 116 | 2014 |
Remix: On-demand live randomization Y Chen, Z Wang, D Whalley, L Lu Proceedings of the sixth ACM conference on data and application security and …, 2016 | 114 | 2016 |
Context-aware recommender systems LC Wang, XW Meng, YJ Zhang Ruanjian Xuebao/Journal of Software 23 (1), 1-20, 2012 | 102 | 2012 |
Isolating commodity hosted hypervisors with HyperLock Z Wang, C Wu, M Grace, X Jiang Proceedings of the 7th ACM european conference on Computer Systems, 127-140, 2012 | 90 | 2012 |
SecPod: A Framework for Virtualization-based Security Systems X Wang, Y Chen, Z Wang, Y Qi, Y Zhou Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC '15), 2015 | 74 | 2015 |
Adaptive android kernel live patching Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei 26th USENIX Security Symposium (USENIX Security 17), 1253-1270, 2017 | 73 | 2017 |
Comprehensive and Efficient Protection of Kernel Control Data J Li, Z Wang, T Bletsch, D Srinivasan, M Grace, X Jiang Information Forensics and Security, IEEE Transactions on, 1-1, 2011 | 72 | 2011 |
Origin-sensitive control flow integrity MR Khandaker, W Liu, A Naser, Z Wang, J Yang 28th USENIX Security Symposium (USENIX Security 19), 195-211, 2019 | 70 | 2019 |
Pthammer: Cross-user-kernel-boundary rowhammer through implicit accesses Z Zhang, Y Cheng, D Liu, S Nepal, Z Wang, Y Yarom 2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture …, 2020 | 69 | 2020 |
Towards understanding and demystifying bitcoin mixing services L Wu, Y Hu, Y Zhou, H Wang, X Luo, Z Wang, F Zhang, K Ren Proceedings of the Web Conference 2021, 33-44, 2021 | 62 | 2021 |