Profiling self-propagating worms via behavioral footprinting

Xuxian Jiang , Dongyan Xu
Proceedings of the 4th ACM workshop on Recurring malcode - WORM '06 17 -24

26
2006
Trojan horse resistant discretionary access control

Ziqing Mao , Ninghui Li , Hong Chen , Xuxian Jiang
Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09 237 -246

21
2009
Fast, scalable detection of "Piggybacked" mobile applications

Wu Zhou , Yajin Zhou , Michael Grace , Xuxian Jiang
Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13 185 -196

308
2013
Defeating return-oriented rootkits with "Return-Less" kernels

Jinku Li , Zhi Wang , Xuxian Jiang , Michael Grace
european conference on computer systems 195 -208

146
2010
Enabling Trusted Data-intensive execution in cloud computing

Ning Zhang , Wenjing Lou , Xuxian Jiang , Y. Thomas Hou
communications and networking symposium 355 -363

1
2014
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction

Xuxian Jiang , Xinyuan Wang , Dongyan Xu
ACM Transactions on Information and System Security 13 ( 2) 12

924
2010
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing

Ryan Riley , Xuxian Jiang , Dongyan Xu
recent advances in intrusion detection 1 -20

479
2008
Countering Persistent Kernel Rootkits through Systematic Hook Discovery

Zhi Wang , Xuxian Jiang , Weidong Cui , Xinyuan Wang
recent advances in intrusion detection 21 -38

77
2008
A First Step towards Live Botmaster Traceback

Daniel Ramsbrock , Xinyuan Wang , Xuxian Jiang
recent advances in intrusion detection 59 -77

41
2008
Detecting repackaged smartphone applications in third-party android marketplaces

Wu Zhou , Yajin Zhou , Xuxian Jiang , Peng Ning
Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12 317 -326

847
2012
Towards a VMM-based usage control framework for OS kernel integrity protection

Min Xu , Xuxian Jiang , Ravi Sandhu , Xinwen Zhang
symposium on access control models and technologies 71 -80

105
2007
ReFormat: automatic reverse engineering of encrypted messages

Zhi Wang , Xuxian Jiang , Weidong Cui , Xinyuan Wang
european symposium on research in computer security 200 -215

105
2009
Countering kernel rootkits with lightweight hook protection

Zhi Wang , Xuxian Jiang , Weidong Cui , Peng Ning
computer and communications security 545 -554

307
2009
Mapping kernel objects to enable systematic integrity checking

Martim Carbone , Weidong Cui , Long Lu , Wenke Lee
computer and communications security 555 -565

156
2009
Harvesting developer credentials in Android apps

Yajin Zhou , Lei Wu , Zhi Wang , Xuxian Jiang
wireless network security 23

24
2015
HyperSentry

Ahmed M. Azab , Peng Ning , Zhi Wang , Xuxian Jiang
Proceedings of the 17th ACM conference on Computer and communications security - CCS '10 38 -49

237
2010
Design and implementation of an Android host-based intrusion prevention system

Mingshen Sun , Min Zheng , John C. S. Lui , Xuxian Jiang
annual computer security applications conference 226 -235

53
2014
CCS'12 co-located workshop summary for SPSM 2012

William Enck , Xuxian Jiang
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12 1062 -1063

2012
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity

Zhi Wang , Xuxian Jiang
ieee symposium on security and privacy 380 -395

582
2010
Dissecting Android Malware: Characterization and Evolution

Yajin Zhou , Xuxian Jiang
ieee symposium on security and privacy 95 -109

2,811
2012