Dissecting android malware: Characterization and evolution Y Zhou, X Jiang 2012 IEEE symposium on security and privacy, 95-109, 2012 | 3046 | 2012 |
Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. Y Zhou, Z Wang, W Zhou, X Jiang NDSS 25 (4), 50-52, 2012 | 1232 | 2012 |
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction X Jiang, X Wang, D Xu ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010 | 963 | 2010 |
Riskranker: scalable and accurate zero-day android malware detection M Grace, Y Zhou, Q Zhang, S Zou, X Jiang Proceedings of the 10th international conference on Mobile systems …, 2012 | 923 | 2012 |
Detecting repackaged smartphone applications in third-party android marketplaces W Zhou, Y Zhou, X Jiang, P Ning Proceedings of the second ACM conference on Data and Application Security …, 2012 | 889 | 2012 |
Jump-oriented programming: a new class of code-reuse attack T Bletsch, X Jiang, VW Freeh, Z Liang Proceedings of the 6th ACM symposium on information, computer and …, 2011 | 872 | 2011 |
Unsafe exposure analysis of mobile in-app advertisements MC Grace, W Zhou, X Jiang, AR Sadeghi Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 700 | 2012 |
Taming information-stealing smartphone applications (on android) Y Zhou, X Zhang, X Jiang, VW Freeh Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011 | 624 | 2011 |
Systematic detection of capability leaks in stock android smartphones. MC Grace, Y Zhou, Z Wang, X Jiang NDSS 14, 19, 2012 | 620 | 2012 |
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity Z Wang, X Jiang 2010 IEEE symposium on security and privacy, 380-395, 2010 | 608 | 2010 |
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities YM Wang 13th Annual Network and Distributed System Security Symposium (NDSS), 2006, 2006 | 501 | 2006 |
Droidchameleon: evaluating android anti-malware against transformation attacks V Rastogi, Y Chen, X Jiang Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 498 | 2013 |
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing R Riley, X Jiang, D Xu Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 484 | 2008 |
Malware Detector X Jiang US Patent App. 12/051,703, 2008 | 455 | 2008 |
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 414 | 2010 |
Automatic protocol format reverse engineering through context-aware monitored execution. Z Lin, X Jiang, D Xu, X Zhang NDSS 8, 1-15, 2008 | 356 | 2008 |
Countering kernel rootkits with lightweight hook protection Z Wang, X Jiang, W Cui, P Ning Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 320 | 2009 |
Fast, scalable detection of" piggybacked" mobile applications W Zhou, Y Zhou, M Grace, X Jiang, S Zou Proceedings of the third ACM conference on Data and application security and …, 2013 | 317 | 2013 |
Violin: Virtual internetworking on overlay infrastructure X Jiang, D Xu International Symposium on Parallel and Distributed Processing and …, 2004 | 267 | 2004 |
Catch me if you can: Evaluating android anti-malware against transformation attacks V Rastogi, Y Chen, X Jiang IEEE Transactions on Information Forensics and Security 9 (1), 99-108, 2013 | 264 | 2013 |