Michael C. Grace Zhou, W., Zhou, Y., Grace, M., Jiang, X., & Zou, S. (2013). Fast, scalable detection of "piggybacked" mobile applications. ACM Conference on Data and Application Security and Privacy, 185–195. https://doi.org/10.1145/2435349.2435377 Bahram, S., Jiang, X. X., Wang, Z., Grace, M., Li, J. K., Srinivasan, D., … Xu, D. Y. (2010). DKSM: Subverting virtual machine introspection for fun and profit. 2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91. Wang, Z., Jiang, X. X., Cui, W. D., Wang, X. Y., & Grace, M. (2009). ReFormat: Automatic reverse engineering of encrypted messages. Computer security - esorics 2009, proceedings, 5789, 200–215.