Works (3)

Updated: April 11th, 2023 10:13

2013 conference paper

Fast, scalable detection of "piggybacked" mobile applications

ACM Conference on Data and Application Security and Privacy, 185–195.

By: W. Zhou  n, Y. Zhou n, M. Grace n, X. Jiang n & S. Zou *

co-author countries: China πŸ‡¨πŸ‡³ United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

DKSM: Subverting virtual machine introspection for fun and profit

2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91.

By: S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, D. Xu

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

ReFormat: Automatic reverse engineering of encrypted messages

Computer security - esorics 2009, proceedings, 5789, 200–215.

By: Z. Wang, X. Jiang, W. Cui, X. Wang & M. Grace

Source: NC State University Libraries
Added: August 6, 2018