Works (3)

2013 conference paper

Fast, scalable detection of "piggybacked" mobile applications

ACM Conference on Data and Application Security and Privacy, 185–195.

By: W. Zhou, Y. Zhou, M. Grace, X. Jiang & S. Zou

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

DKSM: Subverting virtual machine introspection for fun and profit

2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91.

By: S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, D. Xu

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

ReFormat: Automatic reverse engineering of encrypted messages

Computer security - esorics 2009, proceedings, 5789, 200–215.

By: Z. Wang, X. Jiang, W. Cui, X. Wang & M. Grace

Source: NC State University Libraries
Added: August 6, 2018