Search Results - "Zhou, Yajin"
-
1
Dissecting Android Malware: Characterization and Evolution
Published in 2012 IEEE Symposium on Security and Privacy (01-05-2012)“…The popularity and adoption of smart phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. In light…”
Get full text
Conference Proceeding -
2
Sequential Model Based Intrusion Detection System for IoT Servers Using Deep Learning Methods
Published in Sensors (Basel, Switzerland) (05-02-2021)“…IoT plays an important role in daily life; commands and data transfer rapidly between the servers and objects to provide services. However, cyber threats have…”
Get full text
Journal Article -
3
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts
Published in IEEE transactions on information forensics and security (01-03-2019)“…For performance and compatibility reasons, developers tend to use native code in their applications (or simply apps). This makes a bidirectional data flow…”
Get full text
Journal Article -
4
Beyond the virus: a first look at coronavirus-themed Android malware
Published in Empirical software engineering : an international journal (2021)“…As the COVID-19 pandemic emerged in early 2020, a number of malicious actors have started capitalizing the topic. Although a few media reports mentioned the…”
Get full text
Journal Article -
5
Sequential recruitment of the repair factors during NER: the role of XPG in initiating the resynthesis step
Published in The EMBO journal (09-01-2008)“…To address the biochemical mechanisms underlying the coordination between the various proteins required for nucleotide excision repair (NER), we employed the…”
Get full text
Journal Article -
6
CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages
Published in IEEE access (01-01-2018)“…Short message service (SMS) authorization codes play an important role in the application ecosystem, as a number of transactions (e.g., personal identification…”
Get full text
Journal Article -
7
AppShell: Making data protection practical for lost or stolen Android devices
Published in IEEE/IFIP Network Operations and Management Symposium (01-04-2016)“…Mobile apps continue to consume increasing amounts of sensitive data, such as banking credentials and classified documents. At the same time, the number of…”
Get full text
Conference Proceeding Journal Article -
8
Examiner-Pro: Testing Arm Emulators Across Different Privileges
Published in IEEE transactions on software engineering (01-11-2024)“…Emulators are commonly employed to construct dynamic analysis frameworks due to their ability to perform fine-grained tracing, monitor full system…”
Get full text
Journal Article -
9
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams
Published in 2020 APWG Symposium on Electronic Crime Research (eCrime) (16-11-2020)“…As COVID-19 has been spreading across the world since early 2020, a growing number of malicious campaigns are capitalizing the topic of COVID-19. COVID-19…”
Get full text
Conference Proceeding -
10
RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping
Published in IEEE transactions on information forensics and security (2024)“…Conflict-based cache attacks can leak critical information from target programs. Accordingly, randomization-based cache designs have emerged as an efficient…”
Get full text
Journal Article -
11
uBOX: A Lightweight and Hardware-assisted Sandbox for Multicore Embedded Systems
Published in IEEE transactions on dependable and secure computing (11-09-2024)“…Multicore embedded systems employ a big.LITTLE architecture to combine different cores into a single microcontroller (MCU). However, resources sharing among…”
Get full text
Journal Article -
12
Inhibitory effect of CO on NH3-SCR of NO over Mn/TiO2 catalyst at low temperature: Inhibitory mechanism investigated by in situ DRIFTS
Published in Applied surface science (30-11-2023)“…[Display omitted] •CO significantly decreases the NH3-SCR performance of Mn/Ti catalyst.•CO improved the N2 selectivity of Mn/Ti catalyst, especially at above…”
Get full text
Journal Article -
13
u BOX: A Lightweight and Hardware-assisted Sandbox for Multicore Embedded Systems
Published in IEEE transactions on dependable and secure computing (2024)Get full text
Journal Article -
14
PackerGrind: An Adaptive Unpacking System for Android Apps
Published in IEEE transactions on software engineering (01-02-2022)“…App developers are increasingly using packing services (or packers) to protect their code against being reverse engineered or modified. However, such packing…”
Get full text
Journal Article -
15
FA-fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-based Fuzzing
Published in IEEE transactions on software engineering (01-01-2024)“…Mutation-based fuzzing has been widely used in both academia and industry. Recently, researchers observe that the mutation scheduling scheme affects the…”
Get full text
Journal Article -
16
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems
Published in IEEE transactions on dependable and secure computing (01-01-2019)“…The OS kernel is critical to the security of a computer system. Many systems have been proposed to improve its security. A fundamental weakness of those…”
Get full text
Journal Article -
17
A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network
Published in Security and communication networks (23-03-2021)“…Due to the complexity of the social network server system, various system abnormalities may occur and in turn will lead to subsequent system failures and…”
Get full text
Journal Article -
18
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection
Published in IEEE transactions on software engineering (01-07-2023)“…Recent years have witnessed explosive growth in blockchain smart contract applications. As smart contracts become increasingly popular and carry trillion…”
Get full text
Journal Article -
19
DeFiRanger: Detecting DeFi Price Manipulation Attacks
Published in IEEE transactions on dependable and secure computing (01-07-2024)“…The rapid growth of Decentralized Finance (DeFi) boosts the blockchain ecosystem. At the same time, attacks on DeFi applications (apps) are increasing…”
Get full text
Journal Article -
20
MFGSCOPE: A Lightweight Framework for Efficient Graph-based Analysis on Blockchain
Published in IEEE transactions on dependable and secure computing (18-07-2024)“…With the prosperity of the blockchain and the DeFi ecosystem, money flow activities in the blockchains are becoming increasingly frequent, complex, and…”
Get full text
Journal Article