Towards a first step to understand the cryptocurrency stealing attack on ethereum

Zhen Cheng , Xinrui Hou , Runhuai Li , Yajin Zhou
22nd international symposium on research in attacks, intrusions and defenses (RAID 2019) 47 -60

49
2019
Time-travel investigation: Toward building a scalable attack detection framework on Ethereum

Siwei Wu , Lei Wu , Yajin Zhou , Runhuai Li
ACM Transactions on Software Engineering and Methodology (TOSEM) 31 ( 3) 1 -33

15
2022
{SGXLock}: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for {SGX}

Yuan Chen , Jiaqi Li , Guorui Xu , Yajin Zhou
31st USENIX Security Symposium (USENIX Security 22) 4129 -4146

14
2022
ECMO: Peripheral transplantation to Rehost embedded Linux kernels

Muhui Jiang , Lin Ma , Yajin Zhou , Qiang Liu
734 -748

13
2021
A systematic evaluation of wavelet-based attack framework on random delay countermeasures

Fan Zhang , Xiaofei Dong , Bolin Yang , Yajin Zhou
IEEE Transactions on Information Forensics and Security 15 1407 -1422

9
2019
OPEC: operation-based security isolation for bare-metal embedded systems

Xia Zhou , Jiaqi Li , Wenlong Zhang , Yajin Zhou
317 -333

7
2022
Enbindiff: Identifying data-only patches for binaries

Jian Lin , Dingding Wang , Rui Chang , Lei Wu
IEEE Transactions on Dependable and Secure Computing 20 ( 1) 343 -359

6
2021
Revisiting challenges for selective data protection of real applications

Lin Ma , Jinyan Xu , Jiadong Sun , Yajin Zhou
138 -145

2
2021
Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX

Yuan Chen , Jiaqi Li , Guorui Xu , Yajin Zhou
arXiv preprint arXiv:2010.12400

2020
Dating with scambots: Understanding the ecosystem of fraudulent dating applications

Yangyu Hu , Haoyu Wang , Yajin Zhou , Yao Guo
IEEE Transactions on Dependable and Secure Computing

43
2019
NDroid: Toward tracking information flows across multiple Android contexts

Lei Xue , Chenxiong Qian , Hao Zhou , Xiapu Luo
IEEE Transactions on Information Forensics and Security 14 ( 3) 814 -828

59
2018
Beyond the virus: A first look at coronavirus-themed mobile malware

Liu Wang , Ren He , Haoyu Wang , Pengcheng Xia
arXiv e-prints arXiv: 2005.14619 -arXiv: 2005.14619

26
2020
Forerunner: Constraint-based speculative transaction execution for ethereum

Yang Chen , Zhongxin Guo , Runhuai Li , Shuo Chen
570 -587

19
2021
Forerunner: Constraint-based speculative transaction execution for ethereum (full version)

Yang Chen , Zhongxin Guo , Runhuai Li , Shuo Chen
SOSP’21: ACM SIGOPS 28th Symposium on Operating Systems Principles, Virtual Event/Koblenz, Germany, October 26-29

2
2021
Harvesting developer credentials in Android apps

Yajin Zhou , Lei Wu , Zhi Wang , Xuxian Jiang
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks 23 -23

57
2015
Towards understanding flash loan and its applications in defi ecosystem

Dabao Wang , Siwei Wu , Ziling Lin , Lei Wu
arXiv preprint arXiv:2010.12252

32
2020
AdCapsule: Practical Confinement of Advertisements in Android Applications

Xiaonan Zhu , Jinku Li , Yajin Zhou , Jianfeng Ma
IEEE Transactions on Dependable and Secure Computing ( 1) 1 -1

10
2018
LibCapsule: Complete Confinement of Third-party Libraries in Android Applications

Jun Qiu , Xuewu Yang , Huamao Wu , Yajin Zhou
IEEE Transactions on Dependable and Secure Computing

7
2021
Operation-level Concurrent Transaction Execution for Blockchains

Haoran Lin , Yajin Zhou , Lei Wu
arXiv preprint arXiv:2211.07911

5
2022