Proceedings of the ACM Conference on Computer and Communications Security: Foreword

William Enck , Xuxian Jiang , Amiya Bhattacharya , Partha Dasgupta
computer and communications security

2011
{EOSAFE}: Security Analysis of {EOSIO} Smart Contracts

Xuxian Jiang , Xiapu Luo , Haoyu Wang , Yao Guo
usenix security symposium

2021
AppInk: watermarking android apps for repackaging deterrence

Wu Zhou , Xinwen Zhang , Xuxian Jiang
computer and communications security 1 -12

88
2013
DroidChameleon: evaluating Android anti-malware against transformation attacks

Vaibhav Rastogi , Yan Chen , Xuxian Jiang
computer and communications security 329 -334

271
2013
Real-time detection and prevention of android SMS permission abuses

Weiliang Luo , Shouhuai Xu , Xuxian Jiang
international workshop on security 11 -18

9
2013
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring

Junghwan Rhee , Ryan Riley , Dongyan Xu , Xuxian Jiang
availability, reliability and security 74 -81

80
2009
vEye: behavioral footprinting for self-propagating worm detection and profiling

Xuxian Jiang , Xingquan Zhu
Knowledge and Information Systems 18 ( 2) 231 -262

25
2009
Out-of-the-Box monitoring of VM-based high-interaction honeypots

Xuxian Jiang , Xinyuan Wang
recent advances in intrusion detection 198 -218

132
2007
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations

Minh Tran , Xinshu Dong , Zhenkai Liang , Xuxian Jiang
Applied Cryptography and Network Security 418 -435

19
2012
Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory

Junghwan Rhee , Ryan Riley , Dongyan Xu , Xuxian Jiang
recent advances in intrusion detection 178 -197

44
2010
Robust Detection of Android UI Similarity

Jian Mao , Jingdong Bian , Hanjun Ma , Yaoqi Jia
international conference on communications 1 -6

2018
Owner-Centric Protection of Unstructured Data on Smartphones

Yajin Zhou , Kapil Singh , Xuxian Jiang
trust and trustworthy computing 55 -73

10
2014
Profiling user-trigger dependence for Android malware detection

Karim O. Elish , Xiaokui Shu , Danfeng (Daphne) Yao , Barbara G. Ryder
Computers & Security 49 255 -273

142
2015
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization

Xuxian Jiang , Helen J. Wangz , Dongyan Xu , Yi-Min Wang
symposium on reliable distributed systems 209 -218

53
2007
DKSM: Subverting Virtual Machine Introspection for Fun and Profit

Sina Bahram , Xuxian Jiang , Zhi Wang , Mike Grace
symposium on reliable distributed systems 82 -91

153
2010
Process Implanting: A New Active Introspection Framework for Virtualization

Zhongshu Gu , Zhui Deng , Dongyan Xu , Xuxian Jiang
symposium on reliable distributed systems 147 -156

59
2011
VIOLIN: Virtual Internetworking on Overlay Infrastructure

Xuxian Jiang , Dongyan Xu
Parallel and Distributed Processing and Applications 937 -946

209
2004
Comprehensive and Efficient Protection of Kernel Control Data

Jinku Li , Zhi Wang , Tyler Bletsch , Deepa Srinivasan
IEEE Transactions on Information Forensics and Security 6 ( 4) 1404 -1417

33
2011
Process Coloring: An Information Flow-Preserving Approach to Malware Investigation

Dongyan Xu , Eugene H Spafford , Xuxian Jiang , PURDUE UNIV LAFAYETTE IN
Defense Technical Information Center

2009
Hybrid User-level Sandboxing of Third-party Android Apps

Yajin Zhou , Kunal Patel , Lei Wu , Zhi Wang
computer and communications security 19 -30

20
2015