Towards a scalable resource-driven approach for detecting repackaged android applications Y Shao, X Luo, C Qian, P Zhu, L Zhang Proceedings of the 30th Annual Computer Security Applications Conference, 56-65, 2014 | 144 | 2014 |
On tracking information flows through jni in android applications C Qian, X Luo, Y Shao, ATS Chan 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 114 | 2014 |
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework. Y Shao, QA Chen, ZM Mao, J Ott, Z Qian NDSS, 2016 | 100 | 2016 |
Towards Automated Safety Vetting of PLC Code in Real-World Plants M Zhang, J Moyne, ZM Mao, CY Chen, BC Kao, Y Qamsane, Y Shao, ... 40th IEEE Symposium on Security and Privacy, 2019 | 71 | 2019 |
Categorization of anomalies in smart manufacturing systems to support the selection of detection mechanisms F Lopez, M Saez, Y Shao, EC Balta, J Moyne, ZM Mao, K Barton, ... IEEE Robotics and Automation Letters 2 (4), 1885-1892, 2017 | 64 | 2017 |
Rootguard: Protecting rooted android phones Y Shao, X Luo, C Qian Computer 47 (6), 32-40, 2014 | 61 | 2014 |
NDroid: Toward tracking information flows across multiple Android contexts L Xue, C Qian, H Zhou, X Luo, Y Zhou, Y Shao, ATS Chan IEEE Transactions on Information Forensics and Security 14 (3), 814-828, 2018 | 60 | 2018 |
The misuse of android unix domain sockets and security implications Y Shao, J Ott, YJ Jia, Z Qian, ZM Mao Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 47 | 2016 |
Static detection of packet injection vulnerabilities: A case for identifying attacker-controlled implicit information leaks QA Chen, Z Qian, YJ Jia, Y Shao, ZM Mao Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 46 | 2015 |
A software-defined framework for the integrated management of smart manufacturing systems F Lopez, Y Shao, ZM Mao, J Moyne, K Barton, D Tilbury Manufacturing Letters 15, 18-21, 2018 | 41 | 2018 |
Research on android malware detection and interception based on behavior monitoring G Peng, Y Shao, T Wang, X Zhan, H Zhang Wuhan University Journal of Natural Sciences 17 (5), 421-427, 2012 | 14 | 2012 |
A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications Y Shao, R Wang, X Chen, A Azab, ZM Mao Proceedings of the Fourteenth EuroSys Conference 2019, 2019 | 10 | 2019 |
On measuring one-way path metrics from a web server X Luo, L Xue, C Shi, Y Shao, C Qian, EWW Chan 2014 IEEE 22nd International Conference on Network Protocols, 203-208, 2014 | 7 | 2014 |
ktrxer: A portable toolkit for reliable internet probing L Xue, X Luo, Y Shao 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), 129-134, 2014 | 5 | 2014 |
ADD: Application and Data-Driven Controller Design Y Lin, Y Shao, X Zhu, J Guo, K Barton, ZM Mao The Symposium on SDN Research (SOSR), 2019 | 3 | 2019 |
Manufacturing Letters M Gomez, A Honeycutt, T Schmitz | | 2021 |
Network attack detection method L Xue, Z Liu, X Zou, J Hou, LUO Xiapu, EWW Chan, P Tu, Y Shao US Patent 10,193,910, 2019 | | 2019 |
Preventing Capability Abuse through Systematic Analysis of Exposed Interface Y Shao | | 2019 |