Works (3)
2013 article
Fast, scalable detection of "Piggybacked" mobile applications
Zhou, W., Zhou, Y., Grace, M., Jiang, X., & Zou, S. (2013, February 18).
2010 conference paper
DKSM: Subverting virtual machine introspection for fun and profit
2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91.
2009 conference paper
ReFormat: Automatic reverse engineering of encrypted messages
Computer security - esorics 2009, proceedings, 5789, 200–215.