Zhi Xin

According to our database1, Zhi Xin authored at least 12 papers between 2009 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Impeding behavior-based malware analysis via replacement attacks to malware specifications.
J. Comput. Virol. Hacking Tech., 2017

2015
Analysis of a Car-Following Model with Driver Memory Effect.
Int. J. Bifurc. Chaos, 2015

Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Detect Android Malware Variants Using Component Based Topology Graph.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Defensor: Lightweight and Efficient Security-Enhanced Framework for Android.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Automatic construction of printable return-oriented programming payload.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

2013
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Replacement attacks: automatically evading behavior-based software birthmark.
Int. J. Inf. Sec., 2012

2011
Replacement Attacks on Behavior Based Software Birthmark.
Proceedings of the Information Security, 14th International Conference, 2011

2010
Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation.
Proceedings of the Information Security - 13th International Conference, 2010

2009
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability.
Proceedings of the The Forth International Conference on Availability, 2009


  Loading...