Search Results - "Zhou, Yajin"

Refine Results
  1. 1

    Dissecting Android Malware: Characterization and Evolution by Zhou, Yajin, Jiang, Xuxian

    “…The popularity and adoption of smart phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. In light…”
    Get full text
    Conference Proceeding
  2. 2

    Sequential Model Based Intrusion Detection System for IoT Servers Using Deep Learning Methods by Zhong, Ming, Zhou, Yajin, Chen, Gang

    Published in Sensors (Basel, Switzerland) (05-02-2021)
    “…IoT plays an important role in daily life; commands and data transfer rapidly between the servers and objects to provide services. However, cyber threats have…”
    Get full text
    Journal Article
  3. 3

    NDroid: Toward Tracking Information Flows Across Multiple Android Contexts by Lei Xue, Chenxiong Qian, Hao Zhou, Xiapu Luo, Yajin Zhou, Yuru Shao, Chan, Alvin T. S.

    “…For performance and compatibility reasons, developers tend to use native code in their applications (or simply apps). This makes a bidirectional data flow…”
    Get full text
    Journal Article
  4. 4

    Beyond the virus: a first look at coronavirus-themed Android malware by Wang, Liu, He, Ren, Wang, Haoyu, Xia, Pengcheng, Li, Yuanchun, Wu, Lei, Zhou, Yajin, Luo, Xiapu, Sui, Yulei, Guo, Yao, Xu, Guoai

    “…As the COVID-19 pandemic emerged in early 2020, a number of malicious actors have started capitalizing the topic. Although a few media reports mentioned the…”
    Get full text
    Journal Article
  5. 5

    Sequential recruitment of the repair factors during NER: the role of XPG in initiating the resynthesis step by Mocquet, Vincent, Lainé, Jean Philippe, Riedl, Thilo, Yajin, Zhou, Lee, Marietta Y, Egly, Jean Marc

    Published in The EMBO journal (09-01-2008)
    “…To address the biochemical mechanisms underlying the coordination between the various proteins required for nucleotide excision repair (NER), we employed the…”
    Get full text
    Journal Article
  6. 6

    CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages by Li, Jinku, Ye, Yangtian, Zhou, Yajin, Ma, Jianfeng

    Published in IEEE access (01-01-2018)
    “…Short message service (SMS) authorization codes play an important role in the application ecosystem, as a number of transactions (e.g., personal identification…”
    Get full text
    Journal Article
  7. 7

    AppShell: Making data protection practical for lost or stolen Android devices by Xuxian Jiang, Singh, Kapil, Yajin Zhou

    “…Mobile apps continue to consume increasing amounts of sensitive data, such as banking credentials and classified documents. At the same time, the number of…”
    Get full text
    Conference Proceeding Journal Article
  8. 8

    Examiner-Pro: Testing Arm Emulators Across Different Privileges by Jiang, Muhui, Zheng, Xiaoye, Chang, Rui, Zhou, Yajin, Luo, Xiapu

    Published in IEEE transactions on software engineering (01-11-2024)
    “…Emulators are commonly employed to construct dynamic analysis frameworks due to their ability to perform fine-grained tracing, monitor full system…”
    Get full text
    Journal Article
  9. 9

    Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams by Xia, Pengcheng, Wang, Haoyu, Luo, Xiapu, Wu, Lei, Zhou, Yajin, Bai, Guangdong, Xu, Guoai, Huang, Gang, Liu, Xuanzhe

    “…As COVID-19 has been spreading across the world since early 2020, a growing number of malicious campaigns are capitalizing the topic of COVID-19. COVID-19…”
    Get full text
    Conference Proceeding
  10. 10

    RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping by Zhang, Xingjian, Gong, Haochen, Chang, Rui, Zhou, Yajin

    “…Conflict-based cache attacks can leak critical information from target programs. Accordingly, randomization-based cache designs have emerged as an efficient…”
    Get full text
    Journal Article
  11. 11

    uBOX: A Lightweight and Hardware-assisted Sandbox for Multicore Embedded Systems by Zhou, Xia, Bu, Yujie, Xu, Meng, Zhou, Yajin, Wu, Lei

    “…Multicore embedded systems employ a big.LITTLE architecture to combine different cores into a single microcontroller (MCU). However, resources sharing among…”
    Get full text
    Journal Article
  12. 12

    Inhibitory effect of CO on NH3-SCR of NO over Mn/TiO2 catalyst at low temperature: Inhibitory mechanism investigated by in situ DRIFTS by Liu, Lijun, Liu, Tao, Zhou, Yajin, Zheng, Xiaotao, Su, Sheng, Yu, Jiuyang, Xiang, Jun

    Published in Applied surface science (30-11-2023)
    “…[Display omitted] •CO significantly decreases the NH3-SCR performance of Mn/Ti catalyst.•CO improved the N2 selectivity of Mn/Ti catalyst, especially at above…”
    Get full text
    Journal Article
  13. 13
  14. 14

    PackerGrind: An Adaptive Unpacking System for Android Apps by Xue, Lei, Zhou, Hao, Luo, Xiapu, Yu, Le, Wu, Dinghao, Zhou, Yajin, Ma, Xiaobo

    Published in IEEE transactions on software engineering (01-02-2022)
    “…App developers are increasingly using packing services (or packers) to protect their code against being reverse engineered or modified. However, such packing…”
    Get full text
    Journal Article
  15. 15

    FA-fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-based Fuzzing by Gao, Zicong, Xiong, Hao, Dong, Weiyu, Chang, Rui, Yang, Rui, Zhou, Yajin, Jiang, Liehui

    Published in IEEE transactions on software engineering (01-01-2024)
    “…Mutation-based fuzzing has been widely used in both academia and industry. Recently, researchers observe that the mutation scheduling scheme affects the…”
    Get full text
    Journal Article
  16. 16

    Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems by Wang, Xiaoguang, Qi, Yong, Wang, Zhi, Chen, Yue, Zhou, Yajin

    “…The OS kernel is critical to the security of a computer system. Many systems have been proposed to improve its security. A fundamental weakness of those…”
    Get full text
    Journal Article
  17. 17

    A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network by Zhong, Ming, Zhou, Yajin, Chen, Gang

    Published in Security and communication networks (23-03-2021)
    “…Due to the complexity of the social network server system, various system abnormalities may occur and in turn will lead to subsequent system failures and…”
    Get full text
    Journal Article
  18. 18

    Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection by Qian, Peng, He, Jianting, Lu, Lingling, Wu, Siwei, Lu, Zhipeng, Wu, Lei, Zhou, Yajin, He, Qinming

    Published in IEEE transactions on software engineering (01-07-2023)
    “…Recent years have witnessed explosive growth in blockchain smart contract applications. As smart contracts become increasingly popular and carry trillion…”
    Get full text
    Journal Article
  19. 19

    DeFiRanger: Detecting DeFi Price Manipulation Attacks by Wu, Siwei, Yu, Zhou, Wang, Dabao, Zhou, Yajin, Wu, Lei, Wang, Haoyu, Yuan, Xingliang

    “…The rapid growth of Decentralized Finance (DeFi) boosts the blockchain ecosystem. At the same time, attacks on DeFi applications (apps) are increasing…”
    Get full text
    Journal Article
  20. 20

    MFGSCOPE: A Lightweight Framework for Efficient Graph-based Analysis on Blockchain by Hu, Yufeng, Sun, Yingshi, Chen, Yuan, Chen, Zhuo, He, Bowen, Wu, Lei, Zhou, Yajin, Chang, Rui

    “…With the prosperity of the blockchain and the DeFi ecosystem, money flow activities in the blockchains are becoming increasingly frequent, complex, and…”
    Get full text
    Journal Article