Xuxian Jiang

According to our database1, Xuxian Jiang authored at least 94 papers between 2003 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
EOSAFE: Security Analysis of EOSIO Smart Contracts.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Understanding (Mis)Behavior on the EOSIO Blockchain.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Security Analysis of EOSIO Smart Contracts.
CoRR, 2020

Characterizing EOSIO Blockchain.
CoRR, 2020

Characterizing Code Clones in the Ethereum Smart Contract Ecosystem.
Proceedings of the Financial Cryptography and Data Security, 2020

2018
Robust Detection of Android UI Similarity.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2016
AppShell: Making data protection practical for lost or stolen Android devices.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Profiling user-trigger dependence for Android malware detection.
Comput. Secur., 2015

Harvesting developer credentials in Android apps.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Hybrid User-level Sandboxing of Third-party Android Apps.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Data-Centric OS Kernel Malware Characterization.
IEEE Trans. Inf. Forensics Secur., 2014

Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks.
IEEE Trans. Inf. Forensics Secur., 2014

Owner-Centric Protection of Unstructured Data on Smartphones.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

AirBag: Boosting Smartphone Resistance to Malware Infection.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

DIVILAR: diversifying intermediate language for anti-repackaging on android platform.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Enabling Trusted Data-intensive execution in cloud computing.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Design and implementation of an Android host-based intrusion prevention system.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Android Malware.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-7394-7, 2013

Detecting Passive Content Leaks and Pollution in Android Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Taming Hosted Hypervisors with (Mostly) Deprivileged Execution.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Fast, scalable detection of "Piggybacked" mobile applications.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

AppInk: watermarking android apps for repackaging deterrence.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

The impact of vendor customizations on android security.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

DroidChameleon: evaluating Android anti-malware against transformation attacks.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Real-time detection and prevention of android SMS permission abuses.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013

2012
Intrusion Detection Models Based on Data Mining.
Int. J. Comput. Intell. Syst., 2012

IntroLib: Efficient and transparent library call introspection for malware forensics.
Digit. Investig., 2012

Unsafe exposure analysis of mobile in-app advertisements.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Dissecting Android Malware: Characterization and Evolution.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Systematic Detection of Capability Leaks in Stock Android Smartphones.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

RiskRanker: scalable and accurate zero-day android malware detection.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Isolating commodity hosted hypervisors with HyperLock.
Proceedings of the European Conference on Computer Systems, 2012

Detecting repackaged smartphone applications in third-party android marketplaces.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

CCS'12 co-located workshop summary for SPSM 2012.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Spatial Game Signatures for Bot Detection in Social Games.
Proceedings of the Eighth AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, 2012

Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Combining Discretionary Policy with Mandatory Information Flow in Operating Systems.
ACM Trans. Inf. Syst. Secur., 2011

Comprehensive and Efficient Protection of Kernel Control Data.
IEEE Trans. Inf. Forensics Secur., 2011

Taming Information-Stealing Smartphone Applications (on Android).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Process Implanting: A New Active Introspection Framework for Virtualization.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots.
Proceedings of the Security and Privacy in Communication Networks, 2011

On the Expressiveness of Return-into-libc Attacks.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011

Towards Fine-Grained Access Control in JavaScript Contexts.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Jump-oriented programming: a new class of code-reuse attack.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Mitigating code-reuse attacks with control-flow locking.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction.
ACM Trans. Inf. Syst. Secur., 2010

An Architectural Approach to Preventing Code Injection Attacks.
IEEE Trans. Dependable Secur. Comput., 2010

On the billing vulnerabilities of SIP-based VoIP systems.
Comput. Networks, 2010

DKSM: Subverting Virtual Machine Introspection for Fun and Profit.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Transparent Protection of Commodity OS Kernels Using Hardware Virtualization.
Proceedings of the Security and Privacy in Communication Networks, 2010

Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Artificial Malware Immunization Based on Dynamically Assigned Sense of Self.
Proceedings of the Information Security - 13th International Conference, 2010

Defeating return-oriented rootkits with "<i>Return-Less</i>" kernels.
Proceedings of the European Conference on Computer Systems, 2010

HyperSentry: enabling stealthy in-context measurement of hypervisor integrity.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Analyzing and improving Linux kernel memory protection: a model checking approach.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
vEye: behavioral footprinting for self-propagating worm detection and profiling.
Knowl. Inf. Syst., 2009

Trojan horse resistant discretionary access control.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems.
Proceedings of the Information Security Practice and Experience, 2009

Multi-aspect profiling of kernel rootkit behavior.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

ReFormat: Automatic Reverse Engineering of Encrypted Messages.
Proceedings of the Computer Security, 2009

On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers.
Proceedings of the 2009 ACM Symposium on Information, 2009

Countering kernel rootkits with lightweight hook protection.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Mapping kernel objects to enable systematic integrity checking.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach.
IEEE Trans. Parallel Distributed Syst., 2008

Voice pharming attack and the trust of VoIP.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Countering Persistent Kernel Rootkits through Systematic Hook Discovery.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

A First Step towards Live Botmaster Traceback.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Proceedings of the Network and Distributed System Security Symposium, 2008

2007
Billing Attacks on SIP-Based VoIP Systems.
Proceedings of the First USENIX Workshop on Offensive Technologies, 2007

RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

Towards a VMM-based usage control framework for OS kernel integrity protection.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Enabling Internet worms and malware investigation and defense using virtualization
PhD thesis, 2006

Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention.
J. Parallel Distributed Comput., 2006

Profiling self-propagating worms via behavioral footprinting.
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006

Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
Proceedings of the Network and Distributed System Security Symposium, 2006

Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

2005
Virtual Distributed Environments in a Shared Infrastructure.
Computer, 2005

Virtual Playgrounds for Worm Behavior Investigation.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

2004
Collapsar: A VM-Based Architecture for Network Attack Detention Center.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Towards an integrated multimedia service hosting overlay.
Proceedings of the 12th ACM International Conference on Multimedia, 2004

VIOLIN: Virtual Internetworking on Overlay Infrastructure.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Protection mechanisms for application service hosting platforms.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

2003
vBET: a VM-based emulation testbed.
Proceedings of the ACM SIGCOMM workshop on Models, 2003

GnuStream: a P2P media streaming system prototype.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms.
Proceedings of the 12th International Symposium on High-Performance Distributed Computing (HPDC-12 2003), 2003


  Loading...