ARMlock: Hardware-based Fault Isolation for ARM

Yajin Zhou , Xiaoguang Wang , Yue Chen , Zhi Wang
computer and communications security 558 -569

46
2014
Taming information-stealing smartphone applications (on Android)

Yajin Zhou , Xinwen Zhang , Xuxian Jiang , Vincent W. Freeh
trust and trustworthy computing 93 -107

344
2011
AirBag: Boosting Smartphone Resistance to Malware Infection.

Chiachih Wu , Yajin Zhou , Kunal Patel , Zhenkai Liang
network and distributed system security symposium

61
2014
DIVILAR: diversifying intermediate language for anti-repackaging on android platform

Wu Zhou , Zhi Wang , Yajin Zhou , Xuxian Jiang
conference on data and application security and privacy 199 -210

30
2014
Fast, scalable detection of "Piggybacked" mobile applications

Wu Zhou , Yajin Zhou , Michael Grace , Xuxian Jiang
Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13 185 -196

308
2013
Towards Privacy-Preserving Malware Detection Systems for Android

Helei Cui , Yajin Zhou , Cong Wang , Qi Li
international conference on parallel and distributed systems 545 -552

2
2018
Adaptive Call-Site Sensitive Control Flow Integrity

Mustakimur Khandaker , Abu Naser , Wenqing Liu , Zhi Wang
ieee european symposium on security and privacy 95 -110

2
2019
Detecting repackaged smartphone applications in third-party android marketplaces

Wu Zhou , Yajin Zhou , Xuxian Jiang , Peng Ning
Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12 317 -326

847
2012
Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay

Mengchen Cao , Xiantong Hou , Tao Wang , Hunter Qu
computer and communications security 1883 -1897

2
2019
When program analysis meets mobile security: an industrial study of misusing Android internet sockets

Wenqi Bu , Minhui Xue , Lihua Xu , Yajin Zhou
foundations of software engineering 842 -847

7
2017
Dissecting Android Malware: Characterization and Evolution

Yajin Zhou , Xuxian Jiang
ieee symposium on security and privacy 95 -109

2,811
2012
PESC: A Per System-Call Stack Canary Design for Linux Kernel

Jiadong Sun , Xia Zhou , Wenbo Shen , Yajin Zhou
conference on data and application security and privacy 365 -375

2020
Riskranker: scalable and accurate zero-day android malware detection

Michael Grace , Yajin Zhou , Qiang Zhang , Shihong Zou
Smpte Journal 281 -294

877
2012
NCScope: hardware-assisted analyzer for native code in Android apps

Hao Zhou , Shuohan Wu , Xiapu Luo , Ting Wang
Smpte Journal 629 -641

3
2022
Tracking Counterfeit Cryptocurrency End-to-end

Bingyu Gao , Haoyu Wang , Pengcheng Xia , Siwei Wu
ACM SIGMETRICS Conference

38
2021
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed

DUAN Huayi , WANG Cong , Xingliang Yuan , Yajin Zhou
26th ACM Conference on Computer and Communications Security (ACM CCS 2019)

91
2019
Blender: Self-randomizing Address Space Layout for Android Apps

Mingshen Sun , John C.S. Lui , Yajin Zhou
Proceedings of the 19th International Symposium on Research in Attacks, Intrusions and Defenses

29
2016
PPSB: An open and flexible platform for privacy-preserving safe browsing

Helei Cui , Yajin Zhou , Cong Wang , Xinyu Wang
IEEE Transactions on Dependable and Secure Computing 18 ( 4) 1762 -1778

13
2019
Defiranger: Detecting price manipulation attacks on defi applications

Siwei Wu , Dabao Wang , Jianting He , Yajin Zhou
arXiv preprint arXiv:2104.15068

61
2021