Zhiyong Shan

According to our database1, Zhiyong Shan authored at least 29 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Approach to Reveal Unknown Malware Hiding Techniques.
Proceedings of the 8th IEEE/ACIS International Conference on Big Data, 2023

2022
Scraping Sticky Leftovers: App User Information Left on Servers After Account Deletion.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Automated Testing to Detect Status Data Loss in Android Applications.
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering Research, 2022

A Novel Feature Based on Graph Signal Processing for Detection of Physical Access Attacks.
Proceedings of the Odyssey 2022: The Speaker and Language Recognition Workshop, 28 June, 2022

2019
Device Administrator Use and Abuse in Android: Detection and Characterization.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Automated Dynamic Detection of Self-Hiding Behavior.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

2018
Self-hiding behavior in Android apps: detection and characterization.
Proceedings of the 40th International Conference on Software Engineering, 2018

2017
Improving Smartphone Security and Reliability.
J. Interconnect. Networks, 2017

2016
一种RFID标签天线的设计 (Design of RFID Tag Antenna).
计算机科学, 2016

Implementing RBAC model in An Operating System Kernel.
CoRR, 2016

Design and Implementation of A Network Security Management System.
CoRR, 2016

Duplication of Windows Services.
CoRR, 2016

A Study on Altering PostgreSQL from Multi-Processes Structure to Multi-Threads Structure.
CoRR, 2016

Compatible and Usable Mandatory Access Control for Good-enough OS Security.
CoRR, 2016

Suspicious-Taint-Based Access Control for Protecting OS from Network Attacks.
CoRR, 2016

Finding resume and restart errors in Android applications.
Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, 2016

2015
Proactive restart as cyber maneuver for Android.
Proceedings of the 34th IEEE Military Communications Conference, 2015

FTXen: Making hypervisor resilient to hardware faults on relaxed cores.
Proceedings of the 21st IEEE International Symposium on High Performance Computer Architecture, 2015

2014
Growing Grapes in Your Computer to Defend Against Malware.
IEEE Trans. Inf. Forensics Secur., 2014

Shuttle: Facilitating Inter-Application Interactions for OS-Level Virtualization.
IEEE Trans. Computers, 2014

2013
Malware Clearance for Secure Commitment of OS-Level Virtual Machines.
IEEE Trans. Dependable Secur. Comput., 2013

2012
Enforcing Mandatory Access Control in Commodity OS to Disable Malware.
IEEE Trans. Dependable Secur. Comput., 2012

Facilitating inter-application interactions for OS-level virtualization.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

2011
Virtualizing system and ordinary services in Windows-based OS-level virtual machines.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Safe side effects commitment for OS-level virtualization.
Proceedings of the 8th International Conference on Autonomic Computing, 2011

Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Confining windows inter-process communications for OS-level virtual machine.
Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, 2009

2007
An OS Security Protection Model for Defeating Attacks from Network.
Proceedings of the Information Systems Security, Third International Conference, 2007


  Loading...