Cong Zheng
Cong Zheng
Verified email at gatech.edu
Title
Cited by
Cited by
Year
Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications
C Zheng, S Zhu, S Dai, G Gu, X Gong, X Han, W Zou
Proceedings of the second ACM workshop on Security and privacy in …, 2012
2842012
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang
the 2015 Network and Distributed System Security Symposium (NDSS '15), 2015
812015
Towards Engineering a Secure Android Ecosystem: A Survey of Existing Techniques
TK Meng Xu, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng ...
ACM Computing Surveys (CSUR) 49 (2), 38:1--38:47, 2016
66*2016
ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime
V Costamagna, C Zheng
Proceedings of the Workshop on Innovations in Mobile Privacy and Security …, 2016
542016
Android Malware Development on Public Malware Scanning Platforms: A Large-scale Data-driven Study
H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, S Chari, C and Zhang
IEEE BigData, 2016
122016
Android Plugin Becomes a Catastrophe to Android Ecosystem
C Zheng, T Luo, Z Xu, W Hu, X Ouyang
Proceedings of the First Workshop on Radical and Experiential Security, 61-64, 2018
52018
Anti-Plugin: Don't Let Your App Play As An Android Plugin
T Luo, C Zheng, Z Xu, X Ouyang
BlackHat Asia'17, 2017
52017
Identifying and Evading Android Sandbox Through Usage-Profile Based Fingerprints
V Costamagna, C Zheng, H Huang
Proceedings of the First Workshop on Radical and Experiential Security, 17-23, 2018
42018
A large-scale study of Android malware development phenomenon on public malware submission and scanning platform
H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, I Molloy, S Chari, ...
IEEE Transactions on Big Data, 2018
42018
Daemon-Guard: Towards Preventing Privilege Abuse Attacks in Android Native Daemons
C Zheng, H Huang
Proceedings of the First Workshop on Radical and Experiential Security, 25-31, 2018
32018
Fuzzy evaluation model for harms of computer virus
LS Han, C Zheng, MS Zou, QW Liu
Journal of Chinese Computer Systems 31 (7), 1297-1301, 2010
32010
A fuzzy comprehensive evaluation model for harms of computer virus
C Zheng, L Han, J Ye, M Zou, Q Liu
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009
32009
Identifying security risks and enforcing policies on encrypted/encoded network communications
Z Xu, Y Cheng, C Zheng
US Patent App. 15/908,512, 2019
22019
Dynamic analysis techniques for applications
W Hu, C Zheng, Z Xu
US Patent App. 16/024,516, 2020
12020
A multi-level grey evaluation model for harms of computer virus
M Liu, L Han, B Peng, C Zheng
2011 IEEE Ninth International Symposium on Parallel and Distributed …, 2011
12011
Mitigating communications and control attempts
Z Xu, C Zheng
US Patent 10,771,477, 2020
2020
APPLICATION-LEVEL SANDBOXING ON DEVICES
Z Xu, C Zheng, T Luo, W Hu
US Patent App. 16/205,051, 2020
2020
Context-based analysis of applications
C Zheng, Z Xu
US Patent App. 16/667,443, 2020
2020
Context-based analysis of applications
C Zheng, Z Xu
US Patent 10,565,377, 2020
2020
Dynamic analysis techniques for applications
C Zheng, W Hu, Z Xu
US Patent App. 16/024,515, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20