Zhi Wang
Zhi Wang
Dirección de correo verificada de - Página principal
Citado por
Citado por
Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets
Y Zhou, Z Wang, W Zhou, X Jiang
Proc. of the 19th Annual Network and Distributed System Security Symposium …, 2012
Systematic Detection of Capability Leaks in Stock Android Smartphones
M Grace, Y Zhou, Z Wang, X Jiang
Proceedings of the 19th Annual Symposium on Network and Distributed System …, 2012
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
Z Wang, X Jiang
2010 IEEE symposium on security and privacy, 380-395, 2010
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Countering kernel rootkits with lightweight hook protection
Z Wang, X Jiang, W Cui, P Ning
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Defeating return-oriented rootkits with "Return-Less" kernels
J Li, Z Wang, X Jiang, M Grace, S Bahram
Proceedings of the 5th European conference on Computer systems, 195-208, 2010
Dksm: Subverting virtual machine introspection for fun and profit
S Bahram, X Jiang, Z Wang, M Grace, J Li, D Srinivasan, J Rhee, D Xu
2010 29th IEEE symposium on reliable distributed systems, 82-91, 2010
Reformat: Automatic reverse engineering of encrypted messages
Z Wang, X Jiang, W Cui, X Wang, M Grace
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
Process out-grafting: an efficient" out-of-vm" approach for fine-grained process execution monitoring
D Srinivasan, Z Wang, X Jiang, D Xu
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Countering persistent kernel rootkits through systematic hook discovery
Z Wang, X Jiang, W Cui, X Wang
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
Remix: On-demand live randomization
Y Chen, Z Wang, D Whalley, L Lu
Proceedings of the sixth ACM conference on data and application security and …, 2016
Armlock: Hardware-based fault isolation for arm
Y Zhou, X Wang, Y Chen, Z Wang
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Context-aware recommender systems
LC Wang, XW Meng, YJ Zhang
Ruanjian Xuebao/Journal of Software 23 (1), 1-20, 2012
Isolating commodity hosted hypervisors with HyperLock
Z Wang, C Wu, M Grace, X Jiang
Proceedings of the 7th ACM european conference on Computer Systems, 127-140, 2012
SecPod: A Framework for Virtualization-based Security Systems
X Wang, Y Chen, Z Wang, Y Qi, Y Zhou
Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC '15), 2015
Adaptive android kernel live patching
Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei
26th USENIX Security Symposium (USENIX Security 17), 1253-1270, 2017
Comprehensive and Efficient Protection of Kernel Control Data
J Li, Z Wang, T Bletsch, D Srinivasan, M Grace, X Jiang
Information Forensics and Security, IEEE Transactions on, 1-1, 2011
Origin-sensitive control flow integrity
MR Khandaker, W Liu, A Naser, Z Wang, J Yang
28th USENIX Security Symposium (USENIX Security 19), 195-211, 2019
Downgrade attack on trustzone
Y Chen, Y Zhang, Z Wang, T Wei
arXiv preprint arXiv:1707.05082, 2017
DIVILAR: Diversifying Intermediate Language for Anti-Repackaging on Android Platform
W Zhou, Z Wang, Y Zhou, X Jiang
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20