Works (16)

2016 conference paper

AppShell: Making data protection practical for lost or stolen Android devices

Noms 2016 - 2016 ieee/ifip network operations and management symposium, 502–508.

By: Y. Zhou, K. Singh & X. Jiang

Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

Profiling user-trigger dependence for Android malware detection

Computers & Security, 49, 255–273.

By: K. Elish, X. Shu, D. Yao, B. Ryder & X. Jiang

Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Catch me if you can: Evaluating android anti-malware against transformation attacks

IEEE Transactions on Information Forensics and Security, 9(1), 99–108.

By: V. Rastogi, Y. Chen & X. Jiang

Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Data-centric OS kernel malware characterization

IEEE Transactions on Information Forensics and Security, 9(1), 72–87.

By: J. Rhee, R. Riley, Z. Lin, X. Jiang & D. Xu

Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Protecting communications infrastructure against cyber attacks

China Communications, 11(8), I-.

By: D. Gu, X. Jiang, Y. Xue, W. Zou & L. Guo

Source: NC State University Libraries
Added: August 6, 2018

2013 book

Android malware

By: X. Jiang & Y. Zhou

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Fast, scalable detection of "piggybacked" mobile applications

ACM Conference on Data and Application Security and Privacy, 185–195.

By: W. Zhou, Y. Zhou, M. Grace, X. Jiang & S. Zou

Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

Dissecting android malware: Characterization and evolution

2012 ieee symposium on security and privacy (sp), 95–109.

By: Y. Zhou & X. Jiang

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

IntroLib: Efficient and transparent library call introspection for malware forensics

Digital Investigation, 9, S13–23.

By: Z. Deng, D. Xu, X. Zhang & X. Jiang

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Intrusion detection models based on data mining

International Journal of Computational Intelligence Systems, 5(1), 30–38.

By: G. Mao, X. Wu & X. Jiang

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

An architectural approach to preventing code injection attacks

IEEE Transactions on Dependable and Secure Computing, 7(4), 351–365.

By: R. Riley, X. Jiang & D. Xu

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

DKSM: Subverting virtual machine introspection for fun and profit

2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91.

By: S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, D. Xu

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

On the billing vulnerabilities of SIP-based VoIP systems

Computer Networks (Amsterdam, Netherlands : 1999), 54(11), 1837–1847.

By: R. Zhang, X. Wang, X. Yang & X. Jiang

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Stealthy malware detection and monitoring through VMM-based "Out-of-the-Box" semantic view reconstruction

ACM Transactions on Information and System Security, 13(2).

By: X. Jiang, X. Wang & D. Xu

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity

2010 IEEE symposium on security and privacy, 380–395.

By: Z. Wang & X. Jiang

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

ReFormat: Automatic reverse engineering of encrypted messages

Computer security - esorics 2009, proceedings, 5789, 200–215.

By: Z. Wang, X. Jiang, W. Cui, X. Wang & M. Grace

Source: NC State University Libraries
Added: August 6, 2018