Follow
Zhi Xin
Zhi Xin
Ph.D. of Computer Science, Nanjing University
Verified email at nju.edu.cn - Homepage
Title
Cited by
Cited by
Year
Detecting code reuse in android applications using component-based control flow graph
X Sun, Y Zhongyang, Z Xin, B Mao, L Xie
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
952014
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware
Y Zhongyang, Z Xin, B Mao, L Xie
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
722013
Brick: A binary tool for run-time detecting and locating integer-based vulnerability
P Chen, Y Wang, Z Xin, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 208-215, 2009
492009
Impeding behavior-based malware analysis via replacement attacks to malware specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
Journal of Computer Virology and Hacking Techniques 13, 193-207, 2017
432017
Detect android malware variants using component based topology graph
T Shen, Y Zhongyang, Z Xin, B Mao, H Huang
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
402014
Replacement attacks: automatically impeding behavior-based malware specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
Applied Cryptography and Network Security: 13th International Conference …, 2015
252015
Misleading malware similarities analysis by automatic data structure obfuscation
Z Xin, H Chen, H Han, B Mao, L Xie
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
202011
Tailored application-specific system call tables
Q Zeng, Z Xin, D Wu, P Liu, B Mao
The Pennsylvania State University, Tech. Rep, 2014
182014
Replacement attacks on behavior based software birthmark
Z Xin, H Chen, X Wang, P Liu, S Zhu, B Mao, L Xie
Information Security: 14th International Conference, ISC 2011, Xi’an, China …, 2011
142011
Automatic construction of printable return-oriented programming payload
W Ding, X Xing, P Chen, Z Xin, B Mao
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
92014
Replacement attacks: automatically evading behavior-based software birthmark
Z Xin, H Chen, X Wang, P Liu, S Zhu, B Mao, L Xie
International Journal of Information Security 11, 293-304, 2012
72012
Pengwei Lan, Dinghao Wu, Peng Liu, and Bing Mao. Impeding behavior-based malware analysis via replacement attacks to malware specifications
J Ming, Z Xin
Journal of Computer Virology and Hacking Techniques 13 (3), 193-207, 2017
62017
Defensor: Lightweight and efficient security-enhanced framework for Android
X Pan, Y Zhongyang, Z Xin, B Mao, H Huang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–13