关注
Yuru Shao
Yuru Shao
Pinterest
在 pinterest.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Towards a scalable resource-driven approach for detecting repackaged android applications
Y Shao, X Luo, C Qian, P Zhu, L Zhang
Proceedings of the 30th Annual Computer Security Applications Conference, 56-65, 2014
1442014
On tracking information flows through jni in android applications
C Qian, X Luo, Y Shao, ATS Chan
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
1142014
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Y Shao, QA Chen, ZM Mao, J Ott, Z Qian
NDSS, 2016
1002016
Towards Automated Safety Vetting of PLC Code in Real-World Plants
M Zhang, J Moyne, ZM Mao, CY Chen, BC Kao, Y Qamsane, Y Shao, ...
40th IEEE Symposium on Security and Privacy, 2019
712019
Categorization of anomalies in smart manufacturing systems to support the selection of detection mechanisms
F Lopez, M Saez, Y Shao, EC Balta, J Moyne, ZM Mao, K Barton, ...
IEEE Robotics and Automation Letters 2 (4), 1885-1892, 2017
642017
Rootguard: Protecting rooted android phones
Y Shao, X Luo, C Qian
Computer 47 (6), 32-40, 2014
612014
NDroid: Toward tracking information flows across multiple Android contexts
L Xue, C Qian, H Zhou, X Luo, Y Zhou, Y Shao, ATS Chan
IEEE Transactions on Information Forensics and Security 14 (3), 814-828, 2018
602018
The misuse of android unix domain sockets and security implications
Y Shao, J Ott, YJ Jia, Z Qian, ZM Mao
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
472016
Static detection of packet injection vulnerabilities: A case for identifying attacker-controlled implicit information leaks
QA Chen, Z Qian, YJ Jia, Y Shao, ZM Mao
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
462015
A software-defined framework for the integrated management of smart manufacturing systems
F Lopez, Y Shao, ZM Mao, J Moyne, K Barton, D Tilbury
Manufacturing Letters 15, 18-21, 2018
412018
Research on android malware detection and interception based on behavior monitoring
G Peng, Y Shao, T Wang, X Zhan, H Zhang
Wuhan University Journal of Natural Sciences 17 (5), 421-427, 2012
142012
A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications
Y Shao, R Wang, X Chen, A Azab, ZM Mao
Proceedings of the Fourteenth EuroSys Conference 2019, 2019
102019
On measuring one-way path metrics from a web server
X Luo, L Xue, C Shi, Y Shao, C Qian, EWW Chan
2014 IEEE 22nd International Conference on Network Protocols, 203-208, 2014
72014
ktrxer: A portable toolkit for reliable internet probing
L Xue, X Luo, Y Shao
2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 129-134, 2014
52014
ADD: Application and Data-Driven Controller Design
Y Lin, Y Shao, X Zhu, J Guo, K Barton, ZM Mao
The Symposium on SDN Research (SOSR), 2019
32019
Manufacturing Letters
M Gomez, A Honeycutt, T Schmitz
2021
Network attack detection method
L Xue, Z Liu, X Zou, J Hou, LUO Xiapu, EWW Chan, P Tu, Y Shao
US Patent 10,193,910, 2019
2019
Preventing Capability Abuse through Systematic Analysis of Exposed Interface
Y Shao
2019
系统目前无法执行此操作,请稍后再试。
文章 1–18