Zhi Wang
Zhi Wang
Correu electrònic verificat a cs.fsu.edu - Pàgina d'inici
Títol
Citada per
Citada per
Any
Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets
Y Zhou, Z Wang, W Zhou, X Jiang
Proc. of the 19th Annual Network and Distributed System Security Symposium …, 2012
10322012
Systematic Detection of Capability Leaks in Stock Android Smartphones
M Grace, Y Zhou, Z Wang, X Jiang
Proceedings of the 19th Annual Symposium on Network and Distributed System …, 2012
5542012
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
Z Wang, X Jiang
Security and Privacy (SP), 2010 IEEE Symposium on, 380-395, 2010
5022010
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
3602010
Countering kernel rootkits with lightweight hook protection
Z Wang, X Jiang, W Cui, P Ning
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2812009
Defeating return-oriented rootkits with return-less kernels
J Li, Z Wang, X Jiang, M Grace, S Bahram
Proceedings of the 5th European conference on Computer systems, 195-208, 2010
2142010
DKSM: Subverting virtual machine introspection for fun and profit
S Bahram, X Jiang, Z Wang, M Grace, J Li, D Srinivasan, J Rhee, D Xu
Reliable Distributed Systems, 2010 29th IEEE Symposium on, 82-91, 2010
2012010
ReFormat: Automatic Reverse Engineering of Encrypted Messages.
Z Wang, X Jiang, W Cui, X Wang, M Grace
ESORICS 9, 200-215, 2009
1842009
Countering persistent kernel rootkits through systematic hook discovery
Z Wang, X Jiang, W Cui, X Wang
Recent Advances in Intrusion Detection, 21-38, 2008
1162008
Process out-grafting: an efficient out-of-VM approach for fine-grained process execution monitoring
D Srinivasan, Z Wang, X Jiang, D Xu
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1132011
Remix: On-demand Live Randomization
Y Chen, Z Wang, D Whalley, L Lu
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
922016
ARMlock: Hardware-Based fault isolation for ARM
Y Zhou, X Wang, Y Chen, Z Wang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
722014
Isolating commodity hosted hypervisors with HyperLock
Z Wang, C Wu, M Grace, X Jiang
Proceedings of the 7th ACM european conference on Computer Systems, 127-140, 2012
672012
Comprehensive and Efficient Protection of Kernel Control Data
J Li, Z Wang, T Bletsch, D Srinivasan, M Grace, X Jiang
Information Forensics and Security, IEEE Transactions on, 1-1, 2011
582011
SecPod: A Framework for Virtualization-based Security Systems
X Wang, Y Chen, Z Wang, Y Qi, Y Zhou
Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC '15), 2015
562015
DIVILAR: Diversifying Intermediate Language for Anti-Repackaging on Android Platform
W Zhou, Z Wang, Y Zhou, X Jiang
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
472014
Adaptive Android Kernel Live Patching
Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei
462017
Taming Hosted Hypervisors with (Mostly) Deprivileged Execution
C Wu, Z Wang, X Jiang
Proceedings of the 20th Network and Distributed System Security Symposium, 2013
362013
Harvesting developer credentials in Android apps
Y Zhou, L Wu, Z Wang, X Jiang
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
342015
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization
M Grace, Z Wang, D Srinivasan, J Li, X Jiang, Z Liang, S Liakh
Security and Privacy in Communication Networks, 162-180, 2010
342010
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20