Yajin Zhou
Orcid: 0000-0001-7610-4736
According to our database1,
Yajin Zhou
authored at least 122 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proc. ACM Meas. Anal. Comput. Syst., December, 2024
Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain Networks.
Proc. ACM Meas. Anal. Comput. Syst., December, 2024
IEEE Trans. Software Eng., November, 2024
ACM Trans. Softw. Eng. Methodol., September, 2024
FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing.
IEEE Trans. Software Eng., January, 2024
DeFiGuard: A Price Manipulation Detection Service in DeFi Using Graph Neural Networks.
IEEE Trans. Serv. Comput., 2024
RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 2024 USENIX Annual Technical Conference, 2024
Proceedings of the 25th International Middleware Conference, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Toss a Fault to BpfChecker: Revealing Implementation Flaws for eBPF runtimes with Differential Fuzzing.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
ACM Trans. Archit. Code Optim., December, 2023
Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection.
IEEE Trans. Software Eng., July, 2023
IEEE Trans. Software Eng., April, 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
CoRR, 2023
MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation.
Proceedings of the 32nd USENIX Security Symposium, 2023
When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023
2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum.
ACM Trans. Softw. Eng. Methodol., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
J. Comput. Secur., 2022
Illegal But Not Malware: An Underground Economy App Detection System Based on Usage Scenario.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022
RegVault: hardware assisted selective data randomization for operating system kernels.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Sequential Model Based Intrusion Detection System for IoT Servers Using Deep Learning Methods.
Sensors, 2021
A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network.
Secur. Commun. Networks, 2021
Empir. Softw. Eng., 2021
CoRR, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021
Seeds of SEED: H<sup>2</sup>Cache: Building a Hybrid Randomized Cache Hierarchy for Mitigating Cache Side-Channel Attacks.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.
Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021
Proceedings of the APSys '21: 12th ACM SIGOPS Asia-Pacific Workshop on Systems, 2021
2020
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
CoRR, 2020
EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum.
CoRR, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems.
IEEE Trans. Dependable Secur. Comput., 2019
ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels.
CoRR, 2019
CoRR, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages.
IEEE Access, 2018
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
When program analysis meets mobile security: an industrial study of misusing Android internet sockets.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the 2015 USENIX Annual Technical Conference, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
DIVILAR: diversifying intermediate language for anti-repackaging on android platform.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-7394-7, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 10th International Conference on Mobile Systems, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
2007
Int. J. Inf. Acquis., 2007
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007