浙大计算机科学与技术专业课表,周亚金 - 浙江大学 - 计算机科学与技术

近期论文

61a06ac59339330fdaba2b2c3d1a65f7.png 查看导师最新文章

(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

2019

[9]Different is Good:Detecting the Use of Uninitialized Variables through Differential Replay[Paper]

Mengchen Cao,Xiantong Hou,Tao Wang,Hunter Qu,Yajin Zhou,Xiaolong Bai,Fuwei Wang

Proceedings of the 26th ACM Conference on Computer and Communications(ACM CCS 2019)

[8]LightBox:Full-stack Protected Stateful Middlebox at Lightning Speed[Paper]

Huayi Duan,Cong Wang,Xingliang Yuan,Yajin Zhou,Qian Wang,Kui Ren

Proceedings of the 26th ACM Conference on Computer and Communications(ACM CCS 2019)

[7]Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum[Paper]

Zhen Cheng*,Xinrui Hou*,Runhuai Li,Yajin Zhou,Xiapu Luo,Jinku Li,Kui Ren

Proceedings of the 22nd International Symposium on Research in Attacks,Intrusions and Defenses(RAID 2019)

(*The names of the first two authors are in alphabetical order)

[6]SPEED:Accelerating Enclave Applications via Secure Deduplication[Paper]

Helei Cui,Huayi Duan,Zhan Qin,Cong Wang,Yajin Zhou

Proceedings of the 39th IEEE International Conference on Distributed Computing Systems(IEEE ICDCS 2019)

[5]Dating with Scambots:Understanding the Ecosystem of Fraudulent Dating Applications[Paper]

Yangyu Hu,Haoyu Wang,Yajin Zhou,Yao Guo,Li Li,Bingxuan Luo,Fangren Xu

IEEE Transactions on Dependable and Secure Computing(TDSC)

[4]Adaptive Call-site Sensitive Control Flow Integrity(Best Paper Award)[Paper|Code]

Mustakimur Khandaker,Abu Naser,Wenqing Liu,Zhi Wang,Yajin Zhou,Yueqiang Cheng

Proceedings of the 4th IEEE European Symposium on Security and Privacy(IEEE EuroS&P 2019)

[3]NDroid:Towards Tracking Information Flows Across Multiple Android Contexts[Paper]

Lei Xue,Chenxiong Qian,Hao Zhou,Xiapu Luo,Yajin Zhou,Yuru Shao and Alvin T.S.Chan

IEEE Transactions on Information Forensics&Security(TIFS),Volume:14,Issue:3,pp.814–828,March 2019

2018

[2]Towards Privacy-Preserving Malware Detection Systems for Android(Best Paper Award)[Paper]

Helei Cui,Yajin Zhou,Cong Wang,Qi Li,Kui Ren

Proceedings of the 24th International Conference on Parallel and Distributed Systems(IEEE ICPADS 2018)

[1]AdCapsule:Practical Confinement of Advertisements in Android Applications[Paper]

Xiaonan Zhu,Jinku Li,Yajin Zhou,Jianfeng Ma

IEEE Transactions on Dependable and Secure Computing(TDSC)

Before 2018

2017

[21]When Program Analysis Meets Mobile Security:An Industrial Study of Misusing Android Internet Sockets[Paper]

Wenqi Bu,Minhui Xue,Lihua Xu,Yajin Zhou,Zhushou Tang,Tao Xie

Proceedings of the 11th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering(ESEC/FSE 2017)

[20]Malton:Towards On-Device Non-Invasive Mobile Malware Analysis for ART[Paper]

Lei Xue,Yajin Zhou,Ting Chen,Xiapu Luo,Guofei Gu

Proceedings of the 26th USENIX Security Symposium(USENIX Security 2017)

[19]Design and Implementation of SecPod,A Framework for Virtualization-based Security Systems[Paper]

Xiaoguang Wang,Yong Qi,Zhi Wang,Yue Chen,Yajin Zhou

IEEE Transactions on Dependable and Secure Computing(TDSC)

2016

[18]Blender:Self-randomizing Address Space Layout for Android Apps[Paper]

Mingshen Sun,John C.S.Lui,Yajin Zhou

Proceedings of the the 19th International Symposium on Research in Attacks,Intrusions and Defenses(RAID 2016)

[17]AppShell:Making Data Protection Practical for Lost or Stolen Android Devices[Paper]

Yajin Zhou,Kapil Singh,Xuxian Jiang

Proceedings of IEEE/IFIP Network Operations and Management Symposium(NOMS 2016)

2015

[16]SecPod:a Framework for Virtualization-based Security Systems[Paper]

Xiaoguang Wang,Yue Chen,Zhi Wang,Yong Qi,Yajin Zhou

Proceedings of the 2015 USENIX Annual Technical Conference(USENIX ATC 2015)

[15]Harvesting Developer Credentials in Android Apps[Paper]

Yajin Zhou,Lei Wu,Zhi Wang,Xuxian Jiang

Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks(WiSec 2015)

[14]Hybrid User-level Sandboxing of Third-party Android Apps[Paper]

Yajin Zhou,Kunal Patel,Lei Wu,Zhi Wang,Xuxian Jiang

Proceedings of the 10th ACM Symposium on Information,Computer and Communications Security(ASIACCS 2015)

2014

[13]ARMlock:Hardware-based Fault Isolation for ARM[Paper|Slides]

Yajin Zhou,Xiaoguang Wang,Yue Chen,Zhi Wang

Proceedings of the 21st ACM Conference on Computer and Communications Security(CCS 2014)

[12]Owner-centric Protection of Unstructured Data on Smartphones[Paper]

Yajin Zhou,Kapil Singh,Xuxian Jiang

Proceedings of the 7th International Conference on Trust and Trustworthy Computing(TRUST 2014)

[11]AirBag:Boosting Smartphone Resistance to Malware Infection[Paper]

Chiachih Wu,Yajin Zhou,Kunal Patel,Zhenkai Liang,Xuxian Jiang

Proceedings of the 21st Network and Distributed System Security Symposium(NDSS 2014)

[10]DIVILAR:Diversifying Intermediate Language for Anti-Repackaging on Android Platform[Paper]

Wu Zhou,Zhi Wang,Yajin Zhou,Xuxian Jiang

Proceedings of the 4th ACM Conference on Data and Application Security and Privacy(CODASPY 2014)

2013

[9]The Impact of Vendor Customizations on Android Security[Paper]

Lei Wu,Michael Grace,Yajin Zhou,Chiachih Wu,Xuxian Jiang

Proceedings of the 20th ACM Conference on Computer and Communications Security(CCS 2013)

[8]Fast,Scalable Detection of'Piggybacked'Mobile Applications(Best Paper Award)[Paper]

Wu Zhou,Yajin Zhou,Michael Grace,Xuxian Jiang,Shihong Zou

Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy(CODASPY 2013)

[7]Detecting Passive Content Leaks and Pollution in Android Applications[Paper|Slides]

Yajin Zhou,Xuxian Jiang

Proceedings of the 20th Network and Distributed System Security Symposium(NDSS 2013)

2012

[6]RiskRanker:Scalable and Accurate Zero-day Android Malware Detection[Paper]

Michael Grace*,Yajin Zhou*,Qiang Zhang,Shihong Zou,Xuxian Jiang

Proceedings of the 10th International Conference on Mobile Systems,Applications and Services(MobiSys 2012)

(*The names of the first two authors are in alphabetical order)

[5]Dissecting Android Malware:Characterization and Evolution[Paper]

Yajin Zhou,Xuxian Jiang

Proceedings of the 33rd IEEE Symposium on Security and Privacy(Oakland 2012)

(Our dataset is released atAndroid Malware Genome Project)

[4]DroidMOSS:Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces(Best Paper Award)[Paper]

Wu Zhou,Yajin Zhou,Xuxian Jiang,Peng Ning

Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy(CODASPY 2012)

[3]Hey,You,Get off of My Market:Detecting Malicious Apps in Official and Alternative Android Markets[Paper]

Yajin Zhou,Zhi Wang,Wu Zhou and Xuxian Jiang

Proceedings of the 19th Network and Distributed System Security Symposium(NDSS 2012)

[2]Systematic Detection of Capability Leaks in Stock Android Smartphones[Paper|Demo Video]

Michael Grace,Yajin Zhou,Zhi Wang and Xuxian Jiang

Proceedings of the 19th Network and Distributed System Security Symposium(NDSS 2012)

2011

[1]Taming Information-Stealing Smartphone Applications(on Android)[Paper]

Yajin Zhou,Xinwen Zhang,Xuxian Jiang,Vince W.Freeh

Proceedings of the 4th International Conference on Trust and Trustworthy Computing(TRUST 2011)

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值