Yan Lin

Orcid: 0000-0002-6509-9131

Affiliations:
  • Jinan University, College of Cyber Security, Guangzhou, China
  • Singapore Management University, School of Information Systems, Singapore
  • Wuhan University, MOE, Key Laboratory of Aerospace Information Security and Trusted Computing, China


According to our database1, Yan Lin authored at least 18 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
PointerScope: Understanding Pointer Patching for Code Randomization.
IEEE Trans. Dependable Secur. Comput., 2023

FA<sup>3</sup>: Fine-Grained Android Application Analysis.
Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications, 2023

BinAlign: Alignment Padding Based Compiler Provenance Recovery.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
When Function Signature Recovery Meets Compiler Optimization.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2019
Control-Flow Carrying Code.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Function Risk Assessment Under Memory Leakage.
Proceedings of the International Conference on Networking and Network Applications, 2018

2017
FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection.
Proceedings of the Security and Privacy in Communication Networks, 2017

SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow Hijacking.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Android App Malicious Behavior Detection Based on User Intention.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Impact of Environment on Branch Transfer of Software.
Proceedings of the Security and Privacy in Communication Networks, 2016

Control Flow Integrity Enforcement with Dynamic Code Optimization.
Proceedings of the Information Security - 19th International Conference, 2016

On the Effectiveness of Code-Reuse-Based Android Application Obfuscation.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

2015
An Instruction-Set Randomization Using Length-Preserving Permutation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Computation Integrity Measurement Based on Branch Transfer.
Proceedings of the 13th IEEE International Conference on Trust, 2014


  Loading...