Characterizing Code Clones in the Ethereum Smart Contract Ecosystem

Ningyu He , Lei Wu , Haoyu Wang , Yao Guo
financial cryptography 654 -675

10
2020
Combining Discretionary Policy with Mandatory Information Flow in Operating Systems

Ziqing Mao , Ninghui Li , Hong Chen , Xuxian Jiang
ACM Transactions on Information and System Security 14 ( 3) 1 -27

12
2011
Process out-grafting

Deepa Srinivasan , Zhi Wang , Xuxian Jiang , Dongyan Xu
Proceedings of the 18th ACM conference on Computer and communications security - CCS '11 363 -374

76
2011
The impact of vendor customizations on android security

Lei Wu , Michael Grace , Yajin Zhou , Chiachih Wu
computer and communications security 623 -634

135
2013
Understanding (Mis)Behavior on the EOSIO Blockchain

Gareth Tyson , Xiapu Luo , Run Zhang , Xuanzhe Liu
Sigmetrics Performance Evaluation Review

33
2020
AppShell: Making data protection practical for lost or stolen Android devices

Xuxian Jiang , Kapil Singh , Yajin Zhou
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium 502 -508

2
2016
Towards Fine-Grained Access Control in JavaScript Contexts

Kailas Patil , Xinshu Dong , Xiaolei Li , Zhenkai Liang
2011 31st International Conference on Distributed Computing Systems 720 -729

17
2011
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems

Ruishan Zhang , Xinyuan Wang , Xiaohui Yang , Ryan Farley
Information Security Practice and Experience 59 -70

5
2009
Collapsar: a VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention

Xuxian Jiang , Dongyan Xu , Yi-Min Wang
Journal of Parallel and Distributed Computing 66 ( 9) 1165 -1180

40
2006
Isolating commodity hosted hypervisors with HyperLock

Michael Grace , Xuxian Jiang , Zhi Wang , Chiachih Wu
european conference on computer systems 127 -140

58
2012
Unsafe exposure analysis of mobile in-app advertisements

Michael C. Grace , Wu Zhou , Xuxian Jiang , Ahmad-Reza Sadeghi
wireless network security 101 -112

661
2012
vBET: a VM-based emulation testbed

Xuxian Jiang , Dongyan Xu
acm special interest group on data communication 95 -104

33
2003
Taming information-stealing smartphone applications (on Android)

Yajin Zhou , Xinwen Zhang , Xuxian Jiang , Vincent W. Freeh
trust and trustworthy computing 93 -107

344
2011
An Integrated Architecture for Automatic Indication, Avoidance and Profiling of Kernel Rootkit Attacks

Dongyan Xu , Eugene Spafford , Xuxian Jiang , PURDUE UNIV LAFAYETTE IN
Defense Technical Information Center

2014
AirBag: Boosting Smartphone Resistance to Malware Infection.

Chiachih Wu , Yajin Zhou , Kunal Patel , Zhenkai Liang
network and distributed system security symposium

61
2014
Mitigating code-reuse attacks with control-flow locking

Tyler Bletsch , Xuxian Jiang , Vince Freeh ,
annual computer security applications conference 353 -362

100
2011
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements

Xinshu Dong , Minh Tran , Zhenkai Liang , Xuxian Jiang
annual computer security applications conference 297 -306

59
2011
Analyzing and improving Linux kernel memory protection: a model checking approach

Siarhei Liakh , Michael Grace , Xuxian Jiang
annual computer security applications conference 271 -280

15
2010
Voice pharming attack and the trust of VoIP

Xinyuan Wang , Ruishan Zhang , Xiaohui Yang , Xuxian Jiang
Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08 24

25
2008
DIVILAR: diversifying intermediate language for anti-repackaging on android platform

Wu Zhou , Zhi Wang , Yajin Zhou , Xuxian Jiang
conference on data and application security and privacy 199 -210

30
2014