Jinku Li

Orcid: 0000-0003-0709-7434

According to our database1, Jinku Li authored at least 28 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Lifting the Grey Curtain: Analyzing the Ecosystem of Android Scam Apps.
IEEE Trans. Dependable Secur. Comput., 2024

Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding.
Proceedings of the 32nd USENIX Security Symposium, 2023

Demystifying Pointer Authentication on Apple M1.
Proceedings of the 32nd USENIX Security Symposium, 2023

DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Conductance Sensor With Self-Calibration and Venturi Tube Based Flowrate Measurement for Gas-Water Slug Flow.
IEEE Trans. Instrum. Meas., 2022

LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications.
IEEE Trans. Dependable Secur. Comput., 2022

2021
Flowrate Estimation of Horizontal Gas-Water Slug Flow Based on Venturi Tube and Conductance Sensor.
IEEE Trans. Instrum. Meas., 2021

CNN-Based Volume Flow Rate Prediction of Oil-Gas-Water Three-Phase Intermittent Flow from Multiple Sensors.
Sensors, 2021

Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE.
CoRR, 2021

Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Flow Adversarial Networks: Flowrate Prediction for Gas-Liquid Multiphase Flows Across Different Domains.
IEEE Trans. Neural Networks Learn. Syst., 2020

AdCapsule: Practical Confinement of Advertisements in Android Applications.
IEEE Trans. Dependable Secur. Comput., 2020

RansomSpector: An introspection-based approach to detect crypto ransomware.
Comput. Secur., 2020

2019
Energy-Aware RFID Authentication in Edge Computing.
IEEE Access, 2019

Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

2018
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels.
IEEE Trans. Inf. Forensics Secur., 2018

A Benchmark Dataset and Deep Learning-Based Image Reconstruction for Electrical Capacitance Tomography.
Sensors, 2018

CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages.
IEEE Access, 2018

2016
Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags.
Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication, 2016

2014
Verifying Secure Interface Composition for Component-Based System Designs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2011
Comprehensive and Efficient Protection of Kernel Control Data.
IEEE Trans. Inf. Forensics Secur., 2011

2010
DKSM: Subverting Virtual Machine Introspection for Fun and Profit.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Transparent Protection of Commodity OS Kernels Using Hardware Virtualization.
Proceedings of the Security and Privacy in Communication Networks, 2010

Defeating return-oriented rootkits with "<i>Return-Less</i>" kernels.
Proceedings of the European Conference on Computer Systems, 2010


  Loading...