Volgen
Zhi Wang
Zhi Wang
Geverifieerd e-mailadres voor cs.fsu.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets
Y Zhou, Z Wang, W Zhou, X Jiang
Proc. of the 19th Annual Network and Distributed System Security Symposium …, 2012
12082012
Systematic Detection of Capability Leaks in Stock Android Smartphones
M Grace, Y Zhou, Z Wang, X Jiang
Proceedings of the 19th Annual Symposium on Network and Distributed System …, 2012
6222012
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
Z Wang, X Jiang
2010 IEEE symposium on security and privacy, 380-395, 2010
5982010
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
4102010
Countering kernel rootkits with lightweight hook protection
Z Wang, X Jiang, W Cui, P Ning
Proceedings of the 16th ACM conference on Computer and communications …, 2009
3192009
Defeating return-oriented rootkits with "Return-Less" kernels
J Li, Z Wang, X Jiang, M Grace, S Bahram
Proceedings of the 5th European conference on Computer systems, 195-208, 2010
2532010
Dksm: Subverting virtual machine introspection for fun and profit
S Bahram, X Jiang, Z Wang, M Grace, J Li, D Srinivasan, J Rhee, D Xu
2010 29th IEEE symposium on reliable distributed systems, 82-91, 2010
2332010
Reformat: Automatic reverse engineering of encrypted messages
Z Wang, X Jiang, W Cui, X Wang, M Grace
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
2302009
Process out-grafting: an efficient" out-of-vm" approach for fine-grained process execution monitoring
D Srinivasan, Z Wang, X Jiang, D Xu
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1522011
Countering persistent kernel rootkits through systematic hook discovery
Z Wang, X Jiang, W Cui, X Wang
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
1382008
Remix: On-demand live randomization
Y Chen, Z Wang, D Whalley, L Lu
Proceedings of the sixth ACM conference on data and application security and …, 2016
1142016
Armlock: Hardware-based fault isolation for arm
Y Zhou, X Wang, Y Chen, Z Wang
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1092014
Context-aware recommender systems
LC Wang, XW Meng, YJ Zhang
Ruanjian Xuebao/Journal of Software 23 (1), 1-20, 2012
1022012
Isolating commodity hosted hypervisors with HyperLock
Z Wang, C Wu, M Grace, X Jiang
Proceedings of the 7th ACM european conference on Computer Systems, 127-140, 2012
892012
SecPod: A Framework for Virtualization-based Security Systems
X Wang, Y Chen, Z Wang, Y Qi, Y Zhou
Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC '15), 2015
732015
Adaptive android kernel live patching
Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei
26th USENIX Security Symposium (USENIX Security 17), 1253-1270, 2017
712017
Comprehensive and Efficient Protection of Kernel Control Data
J Li, Z Wang, T Bletsch, D Srinivasan, M Grace, X Jiang
Information Forensics and Security, IEEE Transactions on, 1-1, 2011
702011
Origin-sensitive control flow integrity
MR Khandaker, W Liu, A Naser, Z Wang, J Yang
28th USENIX Security Symposium (USENIX Security 19), 195-211, 2019
642019
Downgrade attack on trustzone
Y Chen, Y Zhang, Z Wang, T Wei
arXiv preprint arXiv:1707.05082, 2017
642017
DIVILAR: Diversifying Intermediate Language for Anti-Repackaging on Android Platform
W Zhou, Z Wang, Y Zhou, X Jiang
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
592014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20