Yajin Zhou

Orcid: 0000-0001-7610-4736

According to our database1, Yajin Zhou authored at least 103 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing.
IEEE Trans. Software Eng., January, 2024

Demystifying the DAO Governance Process.
CoRR, 2024

The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024

2023
DxPU: Large-scale Disaggregated GPU Pools in the Datacenter.
ACM Trans. Archit. Code Optim., December, 2023

Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection.
IEEE Trans. Software Eng., July, 2023

A Comprehensive Study on ARM Disassembly Tools.
IEEE Trans. Software Eng., April, 2023

EnBinDiff: Identifying Data-Only Patches for Binaries.
IEEE Trans. Dependable Secur. Comput., 2023

A Systematic Study of Android Non-SDK (Hidden) Service API Security.
IEEE Trans. Dependable Secur. Comput., 2023

Detecting DBMS Bugs with Context-Sensitive Instantiation and Multi-Plan Execution.
CoRR, 2023

MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation.
Proceedings of the 32nd USENIX Security Symposium, 2023

When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

ViDeZZo: Dependency-aware Virtual Device Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

DriverJar: Lightweight Device Driver Isolation for ARM.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

VDom: Fast and Unlimited Virtual Domains on Multiple Architectures.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
PackerGrind: An Adaptive Unpacking System for Android Apps.
IEEE Trans. Software Eng., 2022

A Systematical Study on Application Performance Management Libraries for Apps.
IEEE Trans. Software Eng., 2022

Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum.
ACM Trans. Softw. Eng. Methodol., 2022

LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications.
IEEE Trans. Dependable Secur. Comput., 2022

JNI Global References Are Still Vulnerable: Attacks and Defenses.
IEEE Trans. Dependable Secur. Comput., 2022

Scriptable and composable SNARKs in the trusted hardware model.
J. Comput. Secur., 2022

Operation-level Concurrent Transaction Execution for Blockchains.
CoRR, 2022

Illegal But Not Malware: An Underground Economy App Detection System Based on Usage Scenario.
CoRR, 2022

iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps.
CoRR, 2022

Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.
Proceedings of the 31st USENIX Security Symposium, 2022

SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
Proceedings of the 31st USENIX Security Symposium, 2022

SAID: State-aware Defense Against Injection Attacks on In-vehicle Network.
Proceedings of the 31st USENIX Security Symposium, 2022

Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Uncovering Cross-Context Inconsistent Access Control Enforcement in Android.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

NCScope: hardware-assisted analyzer for native code in Android apps.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

OPEC: operation-based security isolation for bare-metal embedded systems.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

RegVault: hardware assisted selective data randomization for operating system kernels.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

2021
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications.
IEEE Trans. Dependable Secur. Comput., 2021

PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing.
IEEE Trans. Dependable Secur. Comput., 2021

Sequential Model Based Intrusion Detection System for IoT Servers Using Deep Learning Methods.
Sensors, 2021

A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network.
Secur. Commun. Networks, 2021

A survey of Intel SGX and its applications.
Frontiers Comput. Sci., 2021

Beyond the virus: a first look at coronavirus-themed Android malware.
Empir. Softw. Eng., 2021

Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE.
CoRR, 2021

A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices.
CoRR, 2021

DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications.
CoRR, 2021

Towards Understanding and Demystifying Bitcoin Mixing Services.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Happer: Unpacking Android Apps via a Hardware-Assisted Approach.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Forerunner: Constraint-based Speculative Transaction Execution for Ethereum.
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021

Seeds of SEED: H<sup>2</sup>Cache: Building a Hybrid Randomized Cache Hierarchy for Mitigating Cache Side-Channel Attacks.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Finding the Missing Piece: Permission Specification Analysis for Android NDK.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Parema: an unpacking framework for demystifying VM-based Android packers.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Succinct Scriptable NIZK via Trusted Hardware.
Proceedings of the Computer Security - ESORICS 2021, 2021

ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Revisiting challenges for selective data protection of real applications.
Proceedings of the APSys '21: 12th ACM SIGOPS Asia-Pacific Workshop on Systems, 2021

2020
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2020

AdCapsule: Practical Confinement of Advertisements in Android Applications.
IEEE Trans. Dependable Secur. Comput., 2020

Tracking Counterfeit Cryptocurrency End-to-end.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
CoRR, 2020

Towards understanding flash loan and its applications in defi ecosystem.
CoRR, 2020

Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware.
CoRR, 2020

EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum.
CoRR, 2020

Demystifying Diehard Android Apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

An empirical study on ARM disassembly tools.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

PESC: A Per System-Call Stack Canary Design for Linux Kernel.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Faster Secure Multiparty Computation of Adaptive Gradient Descent.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

2019
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts.
IEEE Trans. Inf. Forensics Secur., 2019

Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems.
IEEE Trans. Dependable Secur. Comput., 2019

ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels.
CoRR, 2019

Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework.
CoRR, 2019

Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Demystifying Application Performance Management Libraries for Android.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

SPEED: Accelerating Enclave Applications Via Secure Deduplication.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Adaptive Call-Site Sensitive Control Flow Integrity.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages.
IEEE Access, 2018

Towards Privacy-Preserving Malware Detection Systems for Android.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

2017
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART.
Proceedings of the 26th USENIX Security Symposium, 2017

When program analysis meets mobile security: an industrial study of misusing Android internet sockets.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

2016
Blender: Self-randomizing Address Space Layout for Android Apps.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

AppShell: Making data protection practical for lost or stolen Android devices.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Harvesting developer credentials in Android apps.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

SecPod: a Framework for Virtualization-based Security Systems.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Hybrid User-level Sandboxing of Third-party Android Apps.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Owner-Centric Protection of Unstructured Data on Smartphones.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

AirBag: Boosting Smartphone Resistance to Malware Infection.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

DIVILAR: diversifying intermediate language for anti-repackaging on android platform.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

ARMlock: Hardware-based Fault Isolation for ARM.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Android Malware.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-7394-7, 2013

Detecting Passive Content Leaks and Pollution in Android Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Fast, scalable detection of "Piggybacked" mobile applications.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

The impact of vendor customizations on android security.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Dissecting Android Malware: Characterization and Evolution.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Systematic Detection of Capability Leaks in Stock Android Smartphones.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

RiskRanker: scalable and accurate zero-day android malware detection.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Detecting repackaged smartphone applications in third-party android marketplaces.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Taming Information-Stealing Smartphone Applications (on Android).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

2007
Design and Implementation of Wireless Sensor Network for Robot Navigation.
Int. J. Inf. Acquis., 2007

SP-NN: A novel neural network approach for path planning.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007


  Loading...