Vetting SSL usage in applications with SSLINT B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, R Yang, Z Zhang 2015 IEEE Symposium on Security and Privacy, 519-534, 2015 | 82 | 2015 |
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency C Xiong, T Zhu, W Dong, L Ruan, R Yang, Y Cheng, Y Chen, S Cheng, ... IEEE Transactions on Dependable and Secure Computing 19 (1), 551-565, 2020 | 74 | 2020 |
Threat detection and investigation with system-level provenance graphs: A survey Z Li, QA Chen, R Yang, Y Chen, W Ruan Computers & Security 106, 102282, 2021 | 65 | 2021 |
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications. R Yang, S Ma, H Xu, X Zhang, Y Chen NDSS, 2020 | 47 | 2020 |
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows R Yang, X Chen, H Xu, Y Cheng, C Xiong, L Ruan, M Kavousi, Z Li, L Xu, ... IEEE Transactions on Dependable and Secure Computing 19 (3), 1621-1638, 2020 | 18 | 2020 |
Automatic benchmark generation framework for malware detection G Liang, J Pang, Z Shan, R Yang, Y Chen Security and Communication Networks 2018 (1), 4947695, 2018 | 10 | 2018 |
SemFlow: Accurate Semantic Identification from Low-Level System Data M Kavousi, R Yang, S Ma, Y Chen Security and Privacy in Communication Networks: 17th EAI International …, 2021 | 1 | 2021 |
SSLINT: A Tool for Detecting TLS Certificate Validation Vulnerabilities B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, C Xiong, R Yang, ... | | 2016 |
A First Look at Evasion against Provenance Graph-based Threat Detection Z Li, R Yang, QA Chen, Y Chen | | |