关注
runqing yang
runqing yang
在 zju.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Vetting SSL usage in applications with SSLINT
B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, R Yang, Z Zhang
2015 IEEE Symposium on Security and Privacy, 519-534, 2015
822015
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency
C Xiong, T Zhu, W Dong, L Ruan, R Yang, Y Cheng, Y Chen, S Cheng, ...
IEEE Transactions on Dependable and Secure Computing 19 (1), 551-565, 2020
742020
Threat detection and investigation with system-level provenance graphs: A survey
Z Li, QA Chen, R Yang, Y Chen, W Ruan
Computers & Security 106, 102282, 2021
652021
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.
R Yang, S Ma, H Xu, X Zhang, Y Chen
NDSS, 2020
472020
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows
R Yang, X Chen, H Xu, Y Cheng, C Xiong, L Ruan, M Kavousi, Z Li, L Xu, ...
IEEE Transactions on Dependable and Secure Computing 19 (3), 1621-1638, 2020
182020
Automatic benchmark generation framework for malware detection
G Liang, J Pang, Z Shan, R Yang, Y Chen
Security and Communication Networks 2018 (1), 4947695, 2018
102018
SemFlow: Accurate Semantic Identification from Low-Level System Data
M Kavousi, R Yang, S Ma, Y Chen
Security and Privacy in Communication Networks: 17th EAI International …, 2021
12021
SSLINT: A Tool for Detecting TLS Certificate Validation Vulnerabilities
B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, C Xiong, R Yang, ...
2016
A First Look at Evasion against Provenance Graph-based Threat Detection
Z Li, R Yang, QA Chen, Y Chen
系统目前无法执行此操作,请稍后再试。
文章 1–9