Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications C Zheng, S Zhu, S Dai, G Gu, X Gong, X Han, W Zou Proceedings of the second ACM workshop on Security and privacy in …, 2012 | 284 | 2012 |
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang the 2015 Network and Distributed System Security Symposium (NDSS '15), 2015 | 81 | 2015 |
Towards Engineering a Secure Android Ecosystem: A Survey of Existing Techniques TK Meng Xu, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng ... ACM Computing Surveys (CSUR) 49 (2), 38:1--38:47, 2016 | 66* | 2016 |
ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime V Costamagna, C Zheng Proceedings of the Workshop on Innovations in Mobile Privacy and Security …, 2016 | 54 | 2016 |
Android Malware Development on Public Malware Scanning Platforms: A Large-scale Data-driven Study H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, S Chari, C and Zhang IEEE BigData, 2016 | 12 | 2016 |
Android Plugin Becomes a Catastrophe to Android Ecosystem C Zheng, T Luo, Z Xu, W Hu, X Ouyang Proceedings of the First Workshop on Radical and Experiential Security, 61-64, 2018 | 5 | 2018 |
Anti-Plugin: Don't Let Your App Play As An Android Plugin T Luo, C Zheng, Z Xu, X Ouyang BlackHat Asia'17, 2017 | 5 | 2017 |
Identifying and Evading Android Sandbox Through Usage-Profile Based Fingerprints V Costamagna, C Zheng, H Huang Proceedings of the First Workshop on Radical and Experiential Security, 17-23, 2018 | 4 | 2018 |
A large-scale study of Android malware development phenomenon on public malware submission and scanning platform H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, I Molloy, S Chari, ... IEEE Transactions on Big Data, 2018 | 4 | 2018 |
Daemon-Guard: Towards Preventing Privilege Abuse Attacks in Android Native Daemons C Zheng, H Huang Proceedings of the First Workshop on Radical and Experiential Security, 25-31, 2018 | 3 | 2018 |
Fuzzy evaluation model for harms of computer virus LS Han, C Zheng, MS Zou, QW Liu Journal of Chinese Computer Systems 31 (7), 1297-1301, 2010 | 3 | 2010 |
A fuzzy comprehensive evaluation model for harms of computer virus C Zheng, L Han, J Ye, M Zou, Q Liu 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009 | 3 | 2009 |
Identifying security risks and enforcing policies on encrypted/encoded network communications Z Xu, Y Cheng, C Zheng US Patent App. 15/908,512, 2019 | 2 | 2019 |
Dynamic analysis techniques for applications W Hu, C Zheng, Z Xu US Patent App. 16/024,516, 2020 | 1 | 2020 |
A multi-level grey evaluation model for harms of computer virus M Liu, L Han, B Peng, C Zheng 2011 IEEE Ninth International Symposium on Parallel and Distributed …, 2011 | 1 | 2011 |
Mitigating communications and control attempts Z Xu, C Zheng US Patent 10,771,477, 2020 | | 2020 |
APPLICATION-LEVEL SANDBOXING ON DEVICES Z Xu, C Zheng, T Luo, W Hu US Patent App. 16/205,051, 2020 | | 2020 |
Context-based analysis of applications C Zheng, Z Xu US Patent App. 16/667,443, 2020 | | 2020 |
Context-based analysis of applications C Zheng, Z Xu US Patent 10,565,377, 2020 | | 2020 |
Dynamic analysis techniques for applications C Zheng, W Hu, Z Xu US Patent App. 16/024,515, 2020 | | 2020 |