Works (16)

Updated: July 5th, 2023 15:49

2016 conference paper

AppShell: Making data protection practical for lost or stolen Android devices

Noms 2016 - 2016 ieee/ifip network operations and management symposium, 502–508.

By: Y. Zhou n, K. Singh & X. Jiang n

TL;DR: The proposed solution enables adaptive protection by pro-actively stepping up or stepping down data security based on perceived contextual risk of the device by transparently encrypting the data, and discarding the encryption key, when required, for enhanced protection. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Data-Centric OS Kernel Malware Characterization

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(1), 72–87.

By: J. Rhee*, R. Riley*, Z. Lin*, X. Jiang n & D. Xu*

author keywords: OS kernel malware characterization; data-centric malware analysis; virtual machine monitor
TL;DR: A data-centric OS kernel malware characterization architecture that detects and characterizes malware attacks based on the properties of data objects manipulated during the attacks, and generates malware signaturesbased on the data access patterns specific to malware attacks. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2014 journal article

Profiling user-trigger dependence for Android malware detection

COMPUTERS & SECURITY, 49, 255–273.

author keywords: Malware detection; User-intention; Static program analysis; Android malware; User-trigger dependence
TL;DR: The thesis in this mobile app classification work is to advocate the approach of benign property enforcement, i.e., extracting unique behavioral properties from benign programs and designing corresponding classification policies. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2014 journal article

Protecting communications infrastructure against cyber attacks

China Communications, 11(8), I-.

By: D. Gu, X. Jiang, Y. Xue, W. Zou & L. Guo

Source: NC State University Libraries
Added: August 6, 2018

2013 book

Android malware

By: X. Jiang n & Y. Zhou n

TL;DR: Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform, covering key topics like the Android malware history, malware behavior and classification, as well as, possible defense techniques. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(1), 99–108.

By: V. Rastogi*, Y. Chen* & X. Jiang n

author keywords: Mobile; malware; anti-malware; Android
TL;DR: This paper evaluates the state-of-the-art commercial mobile anti-malware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware), and proposes possible remedies for improving the current state of malware detection on mobile devices. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2013 conference paper

Fast, scalable detection of "piggybacked" mobile applications

ACM Conference on Data and Application Security and Privacy, 185–195.

By: W. Zhou n, Y. Zhou n, M. Grace n, X. Jiang n & S. Zou*

TL;DR: This paper proposes a module decoupling technique to partition an app's code into primary and non-primary modules, and develops a feature fingerprint technique to extract various semantic features from primary modules and convert them into feature vectors. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 article

Dissecting Android Malware: Characterization and Evolution

2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 95–109.

By: Y. Zhou n & X. Jiang n

author keywords: Android malware; smartphone security
TL;DR: Systematize or characterize existing Android malware from various aspects, including their installation methods, activation mechanisms as well as the nature of carried malicious payloads reveal that they are evolving rapidly to circumvent the detection from existing mobile anti-virus software. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

IntroLib: Efficient and transparent library call introspection for malware forensics

DIGITAL INVESTIGATION, 9, S13–S23.

By: Z. Deng*, D. Xu*, X. Zhang* & X. Jiang n

author keywords: Malware forensics; Library call introspection; Virtualization; Dynamic analysis; Performance
TL;DR: IntroLib is a practical tool that traces user-level library calls made by malware with low overhead and high transparency, based on hardware virtualization and resides outside of the guest virtual machine where the malware runs. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Intrusion Detection Models Based on Data Mining

INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 5(1), 30–38.

By: G. Mao*, X. Wu* & X. Jiang n

author keywords: Intrusion detection; data mining; frequency pattern; tree pattern
TL;DR: Experimental results show that FP has good performances in training and detecting intrusions from short system-call sequences, and TP can achieve a high detection precision in han... (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 journal article

An Architectural Approach to Preventing Code Injection Attacks

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 7(4), 351–365.

By: R. Riley*, X. Jiang n & D. Xu*

author keywords: Code injection; secure memory architecture
TL;DR: A change to the memory architecture of modern processors is proposed that addresses the code injection problem at its very root by virtually splitting memory into code memory and data memory such that a processor will never be able to fetch injected code for execution. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 conference paper

DKSM: Subverting virtual machine introspection for fun and profit

2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91.

By: S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, D. Xu

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

On the billing vulnerabilities of SIP-based VoIP systems

COMPUTER NETWORKS, 54(11), 1837–1847.

By: R. Zhang*, X. Wang*, X. Yang* & X. Jiang n

author keywords: VoIP security; Man-in-the-middle attacks; SIP; Billing vulnerabilities
TL;DR: This paper analyzes several deployed SIP-based VoIP systems, and presents three types of billing attacks: call establishment hijacking, call termination hijacking and call forward hijack, showing that VoIP subscribers of Vonage, AT&T and Gizmo are vulnerable to these billing attacks. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 13(2).

By: X. Jiang n, X. Wang* & D. Xu*

author keywords: Security; Malware detection; rootkits; virtual machines
TL;DR: The design, implementation, and evaluation of VMwatcher are presented—an “out-of-the-box” approach that overcomes the semantic gap challenge and identifies three unique malware detection and monitoring capabilities. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2010 conference paper

hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity

2010 IEEE symposium on security and privacy, 380–395.

By: Z. Wang & X. Jiang

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

ReFormat: Automatic reverse engineering of encrypted messages

Computer security - esorics 2009, proceedings, 5789, 200–215.

By: Z. Wang, X. Jiang, W. Cui, X. Wang & M. Grace

Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.