Works (16)

Updated: July 5th, 2023 15:49

2016 conference paper

AppShell: Making data protection practical for lost or stolen Android devices

Noms 2016 - 2016 ieee/ifip network operations and management symposium, 502–508.

By: Y. Zhou*, K. Singh & X. Jiang*

Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

Profiling user-trigger dependence for Android malware detection

COMPUTERS & SECURITY, 49, 255–273.

By: K. Elish*, X. Shu*, D. Yao*, B. Ryder* & X. Jiang n

author keywords: Malware detection; User-intention; Static program analysis; Android malware; User-trigger dependence
Source: Web Of Science
Added: August 6, 2018

2014 journal article

Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(1), 99–108.

By: V. Rastogi*, Y. Chen* & X. Jiang n

author keywords: Mobile; malware; anti-malware; Android
Source: Web Of Science
Added: August 6, 2018

2014 journal article

Data-Centric OS Kernel Malware Characterization

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(1), 72–87.

By: J. Rhee*, R. Riley*, Z. Lin*, X. Jiang n & D. Xu*

author keywords: OS kernel malware characterization; data-centric malware analysis; virtual machine monitor
Source: Web Of Science
Added: August 6, 2018

2014 journal article

Protecting communications infrastructure against cyber attacks

China Communications, 11(8), I-.

By: D. Gu, X. Jiang, Y. Xue, W. Zou & L. Guo

Source: NC State University Libraries
Added: August 6, 2018

2013 book

Android malware

By: X. Jiang n & Y. Zhou n

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Fast, scalable detection of "piggybacked" mobile applications

ACM Conference on Data and Application Security and Privacy, 185–195.

By: W. Zhou n, Y. Zhou n, M. Grace n, X. Jiang n & S. Zou*

Source: NC State University Libraries
Added: August 6, 2018

2012 article

Dissecting Android Malware: Characterization and Evolution

2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 95–109.

By: Y. Zhou n & X. Jiang n

author keywords: Android malware; smartphone security
Source: Web Of Science
Added: August 6, 2018

2012 journal article

IntroLib: Efficient and transparent library call introspection for malware forensics

DIGITAL INVESTIGATION, 9, S13–S23.

By: Z. Deng*, D. Xu*, X. Zhang* & X. Jiang n

author keywords: Malware forensics; Library call introspection; Virtualization; Dynamic analysis; Performance
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Intrusion Detection Models Based on Data Mining

INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 5(1), 30–38.

By: G. Mao, X. Wu & X. Jiang*

author keywords: Intrusion detection; data mining; frequency pattern; tree pattern
Source: Web Of Science
Added: August 6, 2018

2010 journal article

An Architectural Approach to Preventing Code Injection Attacks

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 7(4), 351–365.

By: R. Riley*, X. Jiang n & D. Xu*

author keywords: Code injection; secure memory architecture
Source: Web Of Science
Added: August 6, 2018

2010 conference paper

DKSM: Subverting virtual machine introspection for fun and profit

2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91.

By: S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, D. Xu

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

On the billing vulnerabilities of SIP-based VoIP systems

COMPUTER NETWORKS, 54(11), 1837–1847.

By: R. Zhang*, X. Wang*, X. Yang* & X. Jiang n

author keywords: VoIP security; Man-in-the-middle attacks; SIP; Billing vulnerabilities
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 13(2).

By: X. Jiang n, X. Wang* & D. Xu*

author keywords: Security; Malware detection; rootkits; virtual machines
Source: Web Of Science
Added: August 6, 2018

2010 conference paper

hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity

2010 IEEE symposium on security and privacy, 380–395.

By: Z. Wang & X. Jiang

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

ReFormat: Automatic reverse engineering of encrypted messages

Computer security - esorics 2009, proceedings, 5789, 200–215.

By: Z. Wang, X. Jiang, W. Cui, X. Wang & M. Grace

Source: NC State University Libraries
Added: August 6, 2018