Yajin Zhou
Yajin Zhou
Verified email at zju.edu.cn - Homepage
Title
Cited by
Cited by
Year
Dissecting android malware: Characterization and evolution
Y Zhou, X Jiang
Security and Privacy (SP), 2012 IEEE Symposium on, 95-109, 2012
22492012
Hey, you, get off of my market: detecting malicious apps in official and alternative android markets.
Y Zhou, Z Wang, W Zhou, X Jiang
NDSS 25 (4), 50-52, 2012
10232012
RiskRanker: scalable and accurate zero-day android malware detection
M Grace, Y Zhou, Q Zhang, S Zou, X Jiang
Proceedings of the 10th international conference on Mobile systems …, 2012
7452012
Detecting repackaged smartphone applications in third-party android marketplaces
W Zhou, Y Zhou, X Jiang, P Ning
Proceedings of the second ACM conference on Data and Application Security …, 2012
7322012
Systematic Detection of Capability Leaks in Stock Android Smartphones.
MC Grace, Y Zhou, Z Wang, X Jiang
NDSS 14, 19, 2012
5522012
Taming information-stealing smartphone applications (on android)
Y Zhou, X Zhang, X Jiang, VW Freeh
International conference on Trust and trustworthy computing, 93-107, 2011
5502011
Fast, scalable detection of Piggybacked mobile applications
W Zhou, Y Zhou, M Grace, X Jiang, S Zou
Proceedings of the third ACM conference on Data and application security and …, 2013
2632013
Detecting passive content leaks and pollution in android applications
YZX Jiang
Proceedings of the 20th Network and Distributed System Security Symposium (NDSS), 2013
2482013
The impact of vendor customizations on android security
L Wu, M Grace, Y Zhou, C Wu, X Jiang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1922013
AirBag: Boosting Smartphone Resistance to Malware Infection
C Wu, Y Zhou, K Patel, Z Liang, X Jiang
Proceedings of the 21th Annual Network and Distributed System Security …, 2014
992014
ARMlock: Hardware-based Fault Isolation for ARM
Y Zhou, X Wang, Y Chen, Z Wang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
712014
SecPod: a framework for virtualization-based security systems
X Wang, Y Chen, Z Wang, Y Qi, Y Zhou
Proceedings of the 2015 USENIX Conference on Usenix Annual Technical …, 2015
562015
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART
L Xue, Y Zhou, T Chen, X Luo, G Gu
462017
DIVILAR: diversifying intermediate language for anti-repackaging on android platform
W Zhou, Z Wang, Y Zhou, X Jiang
Proceedings of the 4th ACM conference on Data and application security and …, 2014
452014
Harvesting developer credentials in Android apps
Y Zhou, L Wu, Z Wang, X Jiang
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
322015
Hybrid User-level Sandboxing of Third-party Android Apps
Y Zhou, K Patel, L Wu, Z Wang, X Jiang
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
302015
Design and Implementation of SecPod, A Framework for Virtualization-based Security Systems
X Wang, Y Qi, Z Wang, Y Chen, Y Zhou
IEEE Transactions on Dependable and Secure Computing, 2017
292017
Blender: Self-randomizing address space layout for android apps
M Sun, JCS Lui, Y Zhou
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
172016
LightBox: Full-stack protected stateful middlebox at lightning speed
H Duan, C Wang, X Yuan, Y Zhou, Q Wang, K Ren
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
162019
Owner-Centric Protection of Unstructured Data on Smartphones
Y Zhou, K Singh, X Jiang
Trust and Trustworthy Computing, 55-73, 2014
142014
The system can't perform the operation now. Try again later.
Articles 1–20