Zhi Xin
Zhi Xin
Ph.D. of Computer Science, Nanjing University
Bestätigte E-Mail-Adresse bei nju.edu.cn - Startseite
Titel
Zitiert von
Zitiert von
Jahr
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware
Y Zhongyang, Z Xin, B Mao, L Xie
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
692013
Detecting code reuse in android applications using component-based control flow graph
X Sun, Y Zhongyang, Z Xin, B Mao, L Xie
IFIP international information security conference, 142-155, 2014
602014
Brick: A binary tool for run-time detecting and locating integer-based vulnerability
P Chen, Y Wang, Z Xin, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 208-215, 2009
382009
Detect android malware variants using component based topology graph
T Shen, Y Zhongyang, Z Xin, B Mao, H Huang
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
322014
Impeding behavior-based malware analysis via replacement attacks to malware specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
Journal of Computer Virology and Hacking Techniques 13 (3), 193-207, 2017
262017
Misleading malware similarities analysis by automatic data structure obfuscation
Z Xin, H Chen, H Han, B Mao, L Xie
International Conference on Information Security, 181-195, 2010
182010
Replacement attacks: automatically impeding behavior-based malware specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
International Conference on Applied Cryptography and Network Security, 497-517, 2015
152015
Replacement attacks on behavior based software birthmark
Z Xin, H Chen, X Wang, P Liu, S Zhu, B Mao, L Xie
International Conference on Information Security, 1-16, 2011
142011
Defensor: Lightweight and efficient security-enhanced framework for Android
X Pan, Y Zhongyang, Z Xin, B Mao, H Huang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
72014
Replacement attacks: automatically evading behavior-based software birthmark
Z Xin, H Chen, X Wang, P Liu, S Zhu, B Mao, L Xie
International Journal of Information Security 11 (5), 293-304, 2012
72012
Tailored application-specific system call tables
Q Zeng, Z Xin, D Wu, P Liu, B Mao
The Pennsylvania State University, Tech. Rep, 2014
62014
Automatic construction of printable return-oriented programming payload
W Ding, X Xing, P Chen, Z Xin, B Mao
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
42014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–12