BibTeX records: Xuxian Jiang

download as .bib file

@inproceedings{DBLP:conf/uss/HeZ00L0YJ21,
  author       = {Ningyu He and
                  Ruiyi Zhang and
                  Haoyu Wang and
                  Lei Wu and
                  Xiapu Luo and
                  Yao Guo and
                  Ting Yu and
                  Xuxian Jiang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{EOSAFE:} Security Analysis of {EOSIO} Smart Contracts},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1271--1288},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/he-ningyu},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HeZ00L0YJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pomacs/HuangWWTLZLHJ20,
  author       = {Yuheng Huang and
                  Haoyu Wang and
                  Lei Wu and
                  Gareth Tyson and
                  Xiapu Luo and
                  Run Zhang and
                  Xuanzhe Liu and
                  Gang Huang and
                  Xuxian Jiang},
  title        = {Understanding (Mis)Behavior on the {EOSIO} Blockchain},
  journal      = {Proc. {ACM} Meas. Anal. Comput. Syst.},
  volume       = {4},
  number       = {2},
  pages        = {37:1--37:28},
  year         = {2020},
  url          = {https://doi.org/10.1145/3392155},
  doi          = {10.1145/3392155},
  timestamp    = {Tue, 22 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pomacs/HuangWWTLZLHJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HeWWGJ20,
  author       = {Ningyu He and
                  Lei Wu and
                  Haoyu Wang and
                  Yao Guo and
                  Xuxian Jiang},
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {Characterizing Code Clones in the Ethereum Smart Contract Ecosystem},
  booktitle    = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {654--675},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4\_35},
  doi          = {10.1007/978-3-030-51280-4\_35},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/HeWWGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/HuangWWTLZLHJ20,
  author       = {Yuheng Huang and
                  Haoyu Wang and
                  Lei Wu and
                  Gareth Tyson and
                  Xiapu Luo and
                  Run Zhang and
                  Xuanzhe Liu and
                  Gang Huang and
                  Xuxian Jiang},
  editor       = {Edmund Yeh and
                  Athina Markopoulou and
                  Y. C. Tay},
  title        = {Understanding (Mis)Behavior on the {EOSIO} Blockchain},
  booktitle    = {Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference
                  on Measurement and Modeling of Computer Systems, Boston, MA, USA,
                  June, 8-12, 2020},
  pages        = {83--84},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3393691.3394223},
  doi          = {10.1145/3393691.3394223},
  timestamp    = {Mon, 02 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/HuangWWTLZLHJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-05369,
  author       = {Yuheng Huang and
                  Haoyu Wang and
                  Lei Wu and
                  Gareth Tyson and
                  Xiapu Luo and
                  Run Zhang and
                  Xuanzhe Liu and
                  Gang Huang and
                  Xuxian Jiang},
  title        = {Characterizing {EOSIO} Blockchain},
  journal      = {CoRR},
  volume       = {abs/2002.05369},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.05369},
  eprinttype    = {arXiv},
  eprint       = {2002.05369},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-05369.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-06568,
  author       = {Ningyu He and
                  Ruiyi Zhang and
                  Lei Wu and
                  Haoyu Wang and
                  Xiapu Luo and
                  Yao Guo and
                  Ting Yu and
                  Xuxian Jiang},
  title        = {Security Analysis of {EOSIO} Smart Contracts},
  journal      = {CoRR},
  volume       = {abs/2003.06568},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.06568},
  eprinttype    = {arXiv},
  eprint       = {2003.06568},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-06568.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-00272,
  author       = {Ningyu He and
                  Lei Wu and
                  Haoyu Wang and
                  Yao Guo and
                  Xuxian Jiang},
  title        = {Characterizing Code Clones in the Ethereum Smart Contract Ecosystem},
  journal      = {CoRR},
  volume       = {abs/1905.00272},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.00272},
  eprinttype    = {arXiv},
  eprint       = {1905.00272},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-00272.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MaoBMJLJ18,
  author       = {Jian Mao and
                  Jingdong Bian and
                  Hanjun Ma and
                  Yaoqi Jia and
                  Zhenkai Liang and
                  Xuxian Jiang},
  title        = {Robust Detection of Android {UI} Similarity},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422189},
  doi          = {10.1109/ICC.2018.8422189},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/MaoBMJLJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/JiangSZ16,
  author       = {Xuxian Jiang and
                  Kapil Singh and
                  Yajin Zhou},
  editor       = {Sema Oktug and
                  Mehmet Ulema and
                  Cicek Cavdar and
                  Lisandro Zambenedetti Granville and
                  Carlos Raniery Paula dos Santos},
  title        = {AppShell: Making data protection practical for lost or stolen Android
                  devices},
  booktitle    = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2016, Istanbul, Turkey, April 25-29, 2016},
  pages        = {502--508},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NOMS.2016.7502850},
  doi          = {10.1109/NOMS.2016.7502850},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/JiangSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ElishSYRJ15,
  author       = {Karim O. Elish and
                  Xiaokui Shu and
                  Danfeng (Daphne) Yao and
                  Barbara G. Ryder and
                  Xuxian Jiang},
  title        = {Profiling user-trigger dependence for Android malware detection},
  journal      = {Comput. Secur.},
  volume       = {49},
  pages        = {255--273},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.11.001},
  doi          = {10.1016/J.COSE.2014.11.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ElishSYRJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouPWWJ15,
  author       = {Yajin Zhou and
                  Kunal Patel and
                  Lei Wu and
                  Zhi Wang and
                  Xuxian Jiang},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Hybrid User-level Sandboxing of Third-party Android Apps},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {19--30},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714598},
  doi          = {10.1145/2714576.2714598},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouPWWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhouWWJ15,
  author       = {Yajin Zhou and
                  Lei Wu and
                  Zhi Wang and
                  Xuxian Jiang},
  title        = {Harvesting developer credentials in Android apps},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {23:1--23:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766499},
  doi          = {10.1145/2766498.2766499},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhouWWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RheeRLJX14,
  author       = {Junghwan Rhee and
                  Ryan D. Riley and
                  Zhiqiang Lin and
                  Xuxian Jiang and
                  Dongyan Xu},
  title        = {Data-Centric {OS} Kernel Malware Characterization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {1},
  pages        = {72--87},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2013.2291964},
  doi          = {10.1109/TIFS.2013.2291964},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/RheeRLJX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RastogiCJ14,
  author       = {Vaibhav Rastogi and
                  Yan Chen and
                  Xuxian Jiang},
  title        = {Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {1},
  pages        = {99--108},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2013.2290431},
  doi          = {10.1109/TIFS.2013.2290431},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RastogiCJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SunZLJ14,
  author       = {Mingshen Sun and
                  Min Zheng and
                  John C. S. Lui and
                  Xuxian Jiang},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Design and implementation of an Android host-based intrusion prevention
                  system},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {226--235},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664245},
  doi          = {10.1145/2664243.2664245},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SunZLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangLJH14,
  author       = {Ning Zhang and
                  Wenjing Lou and
                  Xuxian Jiang and
                  Y. Thomas Hou},
  title        = {Enabling Trusted Data-intensive execution in cloud computing},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {355--363},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997504},
  doi          = {10.1109/CNS.2014.6997504},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangLJH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhouWZJ14,
  author       = {Wu Zhou and
                  Zhi Wang and
                  Yajin Zhou and
                  Xuxian Jiang},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {{DIVILAR:} diversifying intermediate language for anti-repackaging
                  on android platform},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {199--210},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557558},
  doi          = {10.1145/2557547.2557558},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhouWZJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WuZPLJ14,
  author       = {Chiachih Wu and
                  Yajin Zhou and
                  Kunal Patel and
                  Zhenkai Liang and
                  Xuxian Jiang},
  title        = {AirBag: Boosting Smartphone Resistance to Malware Infection},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/airbag-boosting-smartphone-resistance-malware-infection},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WuZPLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZhouSJ14,
  author       = {Yajin Zhou and
                  Kapil Singh and
                  Xuxian Jiang},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Owner-Centric Protection of Unstructured Data on Smartphones},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_4},
  doi          = {10.1007/978-3-319-08593-7\_4},
  timestamp    = {Wed, 25 Sep 2019 18:21:56 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ZhouSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/JiangZ13,
  author       = {Xuxian Jiang and
                  Yajin Zhou},
  title        = {Android Malware},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-7394-7},
  doi          = {10.1007/978-1-4614-7394-7},
  isbn         = {978-1-4614-7393-0},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/JiangZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouZJ13,
  author       = {Wu Zhou and
                  Xinwen Zhang and
                  Xuxian Jiang},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {AppInk: watermarking android apps for repackaging deterrence},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484315},
  doi          = {10.1145/2484313.2484315},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuoXJ13,
  author       = {Weiliang Luo and
                  Shouhuai Xu and
                  Xuxian Jiang},
  editor       = {Yan Chen and
                  XiaoFeng Wang},
  title        = {Real-time detection and prevention of android {SMS} permission abuses},
  booktitle    = {Proceedings of the first international workshop on Security in embedded
                  systems and smartphones, {SESP} 2013, Hangzhou, China, May 8, 2013},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484417.2484422},
  doi          = {10.1145/2484417.2484422},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuoXJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RastogiCJ13,
  author       = {Vaibhav Rastogi and
                  Yan Chen and
                  Xuxian Jiang},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {DroidChameleon: evaluating Android anti-malware against transformation
                  attacks},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {329--334},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484355},
  doi          = {10.1145/2484313.2484355},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RastogiCJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuGZWJ13,
  author       = {Lei Wu and
                  Michael C. Grace and
                  Yajin Zhou and
                  Chiachih Wu and
                  Xuxian Jiang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {The impact of vendor customizations on android security},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {623--634},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516728},
  doi          = {10.1145/2508859.2516728},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WuGZWJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhouZGJZ13,
  author       = {Wu Zhou and
                  Yajin Zhou and
                  Michael C. Grace and
                  Xuxian Jiang and
                  Shihong Zou},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {Fast, scalable detection of "Piggybacked" mobile applications},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {185--196},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435377},
  doi          = {10.1145/2435349.2435377},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhouZGJZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WuWJ13,
  author       = {Chiachih Wu and
                  Zhi Wang and
                  Xuxian Jiang},
  title        = {Taming Hosted Hypervisors with (Mostly) Deprivileged Execution},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/taming-hosted-hypervisors-mostly-deprivileged-execution},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WuWJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhouJ13,
  author       = {Yajin Zhou and
                  Xuxian Jiang},
  title        = {Detecting Passive Content Leaks and Pollution in Android Applications},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/detecting-passive-content-leaks-and-pollution-android-applications},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhouJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DengX0J12,
  author       = {Zhui Deng and
                  Dongyan Xu and
                  Xiangyu Zhang and
                  Xuxian Jiang},
  title        = {IntroLib: Efficient and transparent library call introspection for
                  malware forensics},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S13--S23},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.013},
  doi          = {10.1016/J.DIIN.2012.05.013},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DengX0J12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcisys/MaoWJ12,
  author       = {Guojun Mao and
                  Xindong Wu and
                  Xuxian Jiang},
  title        = {Intrusion Detection Models Based on Data Mining},
  journal      = {Int. J. Comput. Intell. Syst.},
  volume       = {5},
  number       = {1},
  pages        = {30--38},
  year         = {2012},
  url          = {https://doi.org/10.1080/18756891.2012.670519},
  doi          = {10.1080/18756891.2012.670519},
  timestamp    = {Mon, 07 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcisys/MaoWJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TranDLJ12,
  author       = {Minh Tran and
                  Xinshu Dong and
                  Zhenkai Liang and
                  Xuxian Jiang},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content
                  for Privacy Violations},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {418--435},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_25},
  doi          = {10.1007/978-3-642-31284-7\_25},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/TranDLJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiide/BarikHRJ12,
  author       = {Titus Barik and
                  Brent E. Harrison and
                  David L. Roberts and
                  Xuxian Jiang},
  editor       = {Mark O. Riedl and
                  Gita Sukthankar},
  title        = {Spatial Game Signatures for Bot Detection in Social Games},
  booktitle    = {Proceedings of the Eighth {AAAI} Conference on Artificial Intelligence
                  and Interactive Digital Entertainment, AIIDE-12, Stanford, California,
                  USA, October 8-12, 2012},
  publisher    = {The {AAAI} Press},
  year         = {2012},
  url          = {http://www.aaai.org/ocs/index.php/AIIDE/AIIDE12/paper/view/5444},
  timestamp    = {Tue, 12 Apr 2022 13:09:30 +0200},
  biburl       = {https://dblp.org/rec/conf/aiide/BarikHRJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EnckJ12,
  author       = {William Enck and
                  Xuxian Jiang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {CCS'12 co-located workshop summary for {SPSM} 2012},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1062--1063},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382330},
  doi          = {10.1145/2382196.2382330},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EnckJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhouZJN12,
  author       = {Wu Zhou and
                  Yajin Zhou and
                  Xuxian Jiang and
                  Peng Ning},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Detecting repackaged smartphone applications in third-party android
                  marketplaces},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {317--326},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133640},
  doi          = {10.1145/2133601.2133640},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhouZJN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/WangWGJ12,
  author       = {Zhi Wang and
                  Chiachih Wu and
                  Michael C. Grace and
                  Xuxian Jiang},
  editor       = {Pascal Felber and
                  Frank Bellosa and
                  Herbert Bos},
  title        = {Isolating commodity hosted hypervisors with HyperLock},
  booktitle    = {European Conference on Computer Systems, Proceedings of the Seventh
                  EuroSys Conference 2012, EuroSys '12, Bern, Switzerland, April 10-13,
                  2012},
  pages        = {127--140},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2168836.2168850},
  doi          = {10.1145/2168836.2168850},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/WangWGJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/GraceZZZJ12,
  author       = {Michael C. Grace and
                  Yajin Zhou and
                  Qiang Zhang and
                  Shihong Zou and
                  Xuxian Jiang},
  editor       = {Nigel Davies and
                  Srinivasan Seshan and
                  Lin Zhong},
  title        = {RiskRanker: scalable and accurate zero-day android malware detection},
  booktitle    = {The 10th International Conference on Mobile Systems, Applications,
                  and Services, MobiSys'12, Ambleside, United Kingdom - June 25 - 29,
                  2012},
  pages        = {281--294},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2307636.2307663},
  doi          = {10.1145/2307636.2307663},
  timestamp    = {Thu, 31 Oct 2019 15:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/GraceZZZJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GraceZWJ12,
  author       = {Michael C. Grace and
                  Yajin Zhou and
                  Zhi Wang and
                  Xuxian Jiang},
  title        = {Systematic Detection of Capability Leaks in Stock Android Smartphones},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/systematic-detection-capability-leaks-stock-android-smartphones},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GraceZWJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhouWZJ12,
  author       = {Yajin Zhou and
                  Zhi Wang and
                  Wu Zhou and
                  Xuxian Jiang},
  title        = {Hey, You, Get Off of My Market: Detecting Malicious Apps in Official
                  and Alternative Android Markets},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/hey-you-get-my-market-detecting-malicious-apps-official-and-alternative-android-markets},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhouWZJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhouJ12,
  author       = {Yajin Zhou and
                  Xuxian Jiang},
  title        = {Dissecting Android Malware: Characterization and Evolution},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {95--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.16},
  doi          = {10.1109/SP.2012.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhouJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GraceZJS12,
  author       = {Michael C. Grace and
                  Wu Zhou and
                  Xuxian Jiang and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Unsafe exposure analysis of mobile in-app advertisements},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {101--112},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185464},
  doi          = {10.1145/2185448.2185464},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GraceZJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012spsm,
  editor       = {Ting Yu and
                  William Enck and
                  Xuxian Jiang},
  title        = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012,
                  Raleigh, NC, {USA}},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2381934},
  isbn         = {978-1-4503-1666-8},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2012spsm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWBSGJ11,
  author       = {Jinku Li and
                  Zhi Wang and
                  Tyler K. Bletsch and
                  Deepa Srinivasan and
                  Michael C. Grace and
                  Xuxian Jiang},
  title        = {Comprehensive and Efficient Protection of Kernel Control Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {4},
  pages        = {1404--1417},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2011.2159712},
  doi          = {10.1109/TIFS.2011.2159712},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWBSGJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MaoLCJ11,
  author       = {Ziqing Mao and
                  Ninghui Li and
                  Hong Chen and
                  Xuxian Jiang},
  title        = {Combining Discretionary Policy with Mandatory Information Flow in
                  Operating Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {24:1--24:27},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043621.2043624},
  doi          = {10.1145/2043621.2043624},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MaoLCJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DongTLJ11,
  author       = {Xinshu Dong and
                  Minh Tran and
                  Zhenkai Liang and
                  Xuxian Jiang},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {AdSentry: comprehensive and flexible confinement of JavaScript-based
                  advertisements},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {297--306},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076774},
  doi          = {10.1145/2076732.2076774},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DongTLJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BletschJF11,
  author       = {Tyler K. Bletsch and
                  Xuxian Jiang and
                  Vincent W. Freeh},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Mitigating code-reuse attacks with control-flow locking},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {353--362},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076783},
  doi          = {10.1145/2076732.2076783},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BletschJF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BletschJFL11,
  author       = {Tyler K. Bletsch and
                  Xuxian Jiang and
                  Vincent W. Freeh and
                  Zhenkai Liang},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Jump-oriented programming: a new class of code-reuse attack},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {30--40},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966919},
  doi          = {10.1145/1966913.1966919},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BletschJFL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SrinivasanWJX11,
  author       = {Deepa Srinivasan and
                  Zhi Wang and
                  Xuxian Jiang and
                  Dongyan Xu},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Process out-grafting: an efficient "out-of-VM" approach
                  for fine-grained process execution monitoring},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {363--374},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046751},
  doi          = {10.1145/2046707.2046751},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SrinivasanWJX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/PatilDLLJ11,
  author       = {Kailas Patil and
                  Xinshu Dong and
                  Xiaolei Li and
                  Zhenkai Liang and
                  Xuxian Jiang},
  title        = {Towards Fine-Grained Access Control in JavaScript Contexts},
  booktitle    = {2011 International Conference on Distributed Computing Systems, {ICDCS}
                  2011, Minneapolis, Minnesota, USA, June 20-24, 2011},
  pages        = {720--729},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICDCS.2011.87},
  doi          = {10.1109/ICDCS.2011.87},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/PatilDLLJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LinRZXJ11,
  author       = {Zhiqiang Lin and
                  Junghwan Rhee and
                  Xiangyu Zhang and
                  Dongyan Xu and
                  Xuxian Jiang},
  title        = {SigGraph: Brute Force Scanning of Kernel Data Structure Instances
                  Using Graph-based Signatures},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/siggraph-brute-force-scanning-of-kernel-data-structure-instances-using-graph-based-signatures},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LinRZXJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TranEBJFN11,
  author       = {Minh Tran and
                  Mark Etheridge and
                  Tyler K. Bletsch and
                  Xuxian Jiang and
                  Vincent W. Freeh and
                  Peng Ning},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {On the Expressiveness of Return-into-libc Attacks},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {121--141},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_7},
  doi          = {10.1007/978-3-642-23644-0\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TranEBJFN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/SrinivasanJ11,
  author       = {Deepa Srinivasan and
                  Xuxian Jiang},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {209--226},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_12},
  doi          = {10.1007/978-3-642-31909-9\_12},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/SrinivasanJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/GuDXJ11,
  author       = {Zhongshu Gu and
                  Zhui Deng and
                  Dongyan Xu and
                  Xuxian Jiang},
  title        = {Process Implanting: {A} New Active Introspection Framework for Virtualization},
  booktitle    = {30th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2011),
                  Madrid, Spain, October 4-7, 2011},
  pages        = {147--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SRDS.2011.26},
  doi          = {10.1109/SRDS.2011.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/GuDXJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZhouZJF11,
  author       = {Yajin Zhou and
                  Xinwen Zhang and
                  Xuxian Jiang and
                  Vincent W. Freeh},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Taming Information-Stealing Smartphone Applications (on Android)},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {93--107},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_7},
  doi          = {10.1007/978-3-642-21599-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ZhouZJF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011spsm,
  editor       = {Xuxian Jiang and
                  Amiya Bhattacharya and
                  Partha Dasgupta and
                  William Enck},
  title        = {SPSM'11, Proceedings of the 1st {ACM} Workshop Security and Privacy
                  in Smartphones and Mobile Devices, Co-located with {CCS} 2011, October
                  17, 2011, Chicago, IL, {USA}},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {http://dl.acm.org/citation.cfm?id=2046614},
  isbn         = {978-1-4503-1000-0},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2011spsm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhangWYJ10,
  author       = {Ruishan Zhang and
                  Xinyuan Wang and
                  Xiaohui Yang and
                  Xuxian Jiang},
  title        = {On the billing vulnerabilities of SIP-based VoIP systems},
  journal      = {Comput. Networks},
  volume       = {54},
  number       = {11},
  pages        = {1837--1847},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comnet.2010.02.007},
  doi          = {10.1016/J.COMNET.2010.02.007},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ZhangWYJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RileyJX10,
  author       = {Ryan D. Riley and
                  Xuxian Jiang and
                  Dongyan Xu},
  title        = {An Architectural Approach to Preventing Code Injection Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {7},
  number       = {4},
  pages        = {351--365},
  year         = {2010},
  url          = {https://doi.org/10.1109/TDSC.2010.1},
  doi          = {10.1109/TDSC.2010.1},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RileyJX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JiangWX10,
  author       = {Xuxian Jiang and
                  Xinyuan Wang and
                  Dongyan Xu},
  title        = {Stealthy malware detection and monitoring through VMM-based "out-of-the-box"
                  semantic view reconstruction},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {12:1--12:28},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698752},
  doi          = {10.1145/1698750.1698752},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JiangWX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiakhGJ10,
  author       = {Siarhei Liakh and
                  Michael C. Grace and
                  Xuxian Jiang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Analyzing and improving Linux kernel memory protection: a model checking
                  approach},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {271--280},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920301},
  doi          = {10.1145/1920261.1920301},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiakhGJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AzabNWJZS10,
  author       = {Ahmed M. Azab and
                  Peng Ning and
                  Zhi Wang and
                  Xuxian Jiang and
                  Xiaolan Zhang and
                  Nathan C. Skalsky},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {HyperSentry: enabling stealthy in-context measurement of hypervisor
                  integrity},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {38--49},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866313},
  doi          = {10.1145/1866307.1866313},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AzabNWJZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/LiWJGB10,
  author       = {Jinku Li and
                  Zhi Wang and
                  Xuxian Jiang and
                  Michael C. Grace and
                  Sina Bahram},
  editor       = {Christine Morin and
                  Gilles Muller},
  title        = {Defeating return-oriented rootkits with "\emph{Return-Less}"
                  kernels},
  booktitle    = {European Conference on Computer Systems, Proceedings of the 5th European
                  conference on Computer systems, EuroSys 2010, Paris, France, April
                  13-16, 2010},
  pages        = {195--208},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755913.1755934},
  doi          = {10.1145/1755913.1755934},
  timestamp    = {Wed, 28 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/LiWJGB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangJ10,
  author       = {Xinyuan Wang and
                  Xuxian Jiang},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Artificial Malware Immunization Based on Dynamically Assigned Sense
                  of Self},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {166--180},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_15},
  doi          = {10.1007/978-3-642-18178-8\_15},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WangJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RheeRXJ10,
  author       = {Junghwan Rhee and
                  Ryan D. Riley and
                  Dongyan Xu and
                  Xuxian Jiang},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic
                  Kernel Memory},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {178--197},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_10},
  doi          = {10.1007/978-3-642-15512-3\_10},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RheeRXJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GraceWSLJLL10,
  author       = {Michael C. Grace and
                  Zhi Wang and
                  Deepa Srinivasan and
                  Jinku Li and
                  Xuxian Jiang and
                  Zhenkai Liang and
                  Siarhei Liakh},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Transparent Protection of Commodity {OS} Kernels Using Hardware Virtualization},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {162--180},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_10},
  doi          = {10.1007/978-3-642-16161-2\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/GraceWSLJLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangJ10,
  author       = {Zhi Wang and
                  Xuxian Jiang},
  title        = {HyperSafe: {A} Lightweight Approach to Provide Lifetime Hypervisor
                  Control-Flow Integrity},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {380--395},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.30},
  doi          = {10.1109/SP.2010.30},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WangJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/BahramJWGLSRX10,
  author       = {Sina Bahram and
                  Xuxian Jiang and
                  Zhi Wang and
                  Mike Grace and
                  Jinku Li and
                  Deepa Srinivasan and
                  Junghwan Rhee and
                  Dongyan Xu},
  title        = {{DKSM:} Subverting Virtual Machine Introspection for Fun and Profit},
  booktitle    = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010),
                  New Delhi, Punjab, India, October 31 - November 3, 2010},
  pages        = {82--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SRDS.2010.39},
  doi          = {10.1109/SRDS.2010.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/BahramJWGLSRX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/JiangZ09,
  author       = {Xuxian Jiang and
                  Xingquan Zhu},
  title        = {vEye: behavioral footprinting for self-propagating worm detection
                  and profiling},
  journal      = {Knowl. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {231--262},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10115-008-0137-3},
  doi          = {10.1007/S10115-008-0137-3},
  timestamp    = {Tue, 18 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/JiangZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RheeRXJ09,
  author       = {Junghwan Rhee and
                  Ryan D. Riley and
                  Dongyan Xu and
                  Xuxian Jiang},
  title        = {Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent
                  Monitoring},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {74--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.116},
  doi          = {10.1109/ARES.2009.116},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RheeRXJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangWFYJ09,
  author       = {Ruishan Zhang and
                  Xinyuan Wang and
                  Ryan Farley and
                  Xiaohui Yang and
                  Xuxian Jiang},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {On the feasibility of launching the man-in-the-middle attacks on VoIP
                  from remote attackers},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {61--69},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533069},
  doi          = {10.1145/1533057.1533069},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangWFYJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangJCN09,
  author       = {Zhi Wang and
                  Xuxian Jiang and
                  Weidong Cui and
                  Peng Ning},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Countering kernel rootkits with lightweight hook protection},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {545--554},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653728},
  doi          = {10.1145/1653662.1653728},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangJCN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CarboneCLLPJ09,
  author       = {Martim Carbone and
                  Weidong Cui and
                  Long Lu and
                  Wenke Lee and
                  Marcus Peinado and
                  Xuxian Jiang},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Mapping kernel objects to enable systematic integrity checking},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {555--565},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653729},
  doi          = {10.1145/1653662.1653729},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CarboneCLLPJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangJCWG09,
  author       = {Zhi Wang and
                  Xuxian Jiang and
                  Weidong Cui and
                  Xinyuan Wang and
                  Mike Grace},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {ReFormat: Automatic Reverse Engineering of Encrypted Messages},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {200--215},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_13},
  doi          = {10.1007/978-3-642-04444-1\_13},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangJCWG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/RileyJX09,
  author       = {Ryan D. Riley and
                  Xuxian Jiang and
                  Dongyan Xu},
  editor       = {Wolfgang Schr{\"{o}}der{-}Preikschat and
                  John Wilkes and
                  Rebecca Isaacs},
  title        = {Multi-aspect profiling of kernel rootkit behavior},
  booktitle    = {Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April
                  1-3, 2009},
  pages        = {47--60},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1519065.1519072},
  doi          = {10.1145/1519065.1519072},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/RileyJX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangWYFJ09,
  author       = {Ruishan Zhang and
                  Xinyuan Wang and
                  Xiaohui Yang and
                  Ryan Farley and
                  Xuxian Jiang},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {An Empirical Investigation into the Security of Phone Features in
                  SIP-Based VoIP Systems},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {59--70},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_6},
  doi          = {10.1007/978-3-642-00843-6\_6},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangWYFJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/MaoLCJ09,
  author       = {Ziqing Mao and
                  Ninghui Li and
                  Hong Chen and
                  Xuxian Jiang},
  editor       = {Barbara Carminati and
                  James Joshi},
  title        = {Trojan horse resistant discretionary access control},
  booktitle    = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages        = {237--246},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1542207.1542244},
  doi          = {10.1145/1542207.1542244},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/MaoLCJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/JiangBWXWS08,
  author       = {Xuxian Jiang and
                  Florian P. Buchholz and
                  Aaron Walters and
                  Dongyan Xu and
                  Yi{-}Min Wang and
                  Eugene H. Spafford},
  title        = {Tracing Worm Break-In and Contaminations via Process Coloring: {A}
                  Provenance-Preserving Approach},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {19},
  number       = {7},
  pages        = {890--902},
  year         = {2008},
  url          = {https://doi.org/10.1109/TPDS.2007.70765},
  doi          = {10.1109/TPDS.2007.70765},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/JiangBWXWS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LinJXZ08,
  author       = {Zhiqiang Lin and
                  Xuxian Jiang and
                  Dongyan Xu and
                  Xiangyu Zhang},
  title        = {Automatic Protocol Format Reverse Engineering through Context-Aware
                  Monitored Execution},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/automatic-protocol-format-reverse-engineering-through-context-aware-monitored-execution/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LinJXZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RileyJX08,
  author       = {Ryan D. Riley and
                  Xuxian Jiang and
                  Dongyan Xu},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory
                  Shadowing},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_1},
  doi          = {10.1007/978-3-540-87403-4\_1},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RileyJX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangJCW08,
  author       = {Zhi Wang and
                  Xuxian Jiang and
                  Weidong Cui and
                  Xinyuan Wang},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Countering Persistent Kernel Rootkits through Systematic Hook Discovery},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_2},
  doi          = {10.1007/978-3-540-87403-4\_2},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangJCW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RamsbrockWJ08,
  author       = {Daniel Ramsbrock and
                  Xinyuan Wang and
                  Xuxian Jiang},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {A First Step towards Live Botmaster Traceback},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {59--77},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_4},
  doi          = {10.1007/978-3-540-87403-4\_4},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RamsbrockWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WangZYJW08,
  author       = {Xinyuan Wang and
                  Ruishan Zhang and
                  Xiaohui Yang and
                  Xuxian Jiang and
                  Duminda Wijesekera},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Voice pharming attack and the trust of VoIP},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {24},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460908},
  doi          = {10.1145/1460877.1460908},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/WangZYJW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiangWX07,
  author       = {Xuxian Jiang and
                  Xinyuan Wang and
                  Dongyan Xu},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Stealthy malware detection through vmm-based "out-of-the-box"
                  semantic view reconstruction},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {128--138},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315262},
  doi          = {10.1145/1315245.1315262},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JiangWX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/RileyJX07,
  author       = {Ryan D. Riley and
                  Xuxian Jiang and
                  Dongyan Xu},
  title        = {An Architectural Approach to Preventing Code Injection Attacks},
  booktitle    = {The 37th Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2007, 25-28 June 2007, Edinburgh, UK,
                  Proceedings},
  pages        = {30--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/DSN.2007.13},
  doi          = {10.1109/DSN.2007.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/RileyJX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JiangW07,
  author       = {Xuxian Jiang and
                  Xinyuan Wang},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {"Out-of-the-Box" Monitoring of VM-Based High-Interaction
                  Honeypots},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {198--218},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_11},
  doi          = {10.1007/978-3-540-74320-0\_11},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JiangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/XuJSZ07,
  author       = {Min Xu and
                  Xuxian Jiang and
                  Ravi S. Sandhu and
                  Xinwen Zhang},
  editor       = {Volkmar Lotz and
                  Bhavani Thuraisingham},
  title        = {Towards a VMM-based usage control framework for {OS} kernel integrity
                  protection},
  booktitle    = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266840.1266852},
  doi          = {10.1145/1266840.1266852},
  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/XuJSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/JiangWXW07,
  author       = {Xuxian Jiang and
                  Helen J. Wang and
                  Dongyan Xu and
                  Yi{-}Min Wang},
  title        = {RandSys: Thwarting Code Injection Attacks with System Service Interface
                  Randomization},
  booktitle    = {26th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2007),
                  Beijing, China, October 10-12, 2007},
  pages        = {209--218},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SRDS.2007.36},
  doi          = {10.1109/SRDS.2007.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/JiangWXW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/ZhangWYJ07,
  author       = {Ruishan Zhang and
                  Xinyuan Wang and
                  Xiaohui Yang and
                  Xuxian Jiang},
  editor       = {Dan Boneh and
                  Tal Garfinkel and
                  Dug Song},
  title        = {Billing Attacks on SIP-Based VoIP Systems},
  booktitle    = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston,
                  MA, USA, August 6, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/woot-07/billing-attacks-sip-based-voip-systems},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/woot/ZhangWYJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/JiangXW06,
  author       = {Xuxian Jiang and
                  Dongyan Xu and
                  Yi{-}Min Wang},
  title        = {Collapsar: {A} VM-based honeyfarm and reverse honeyfarm architecture
                  for network attack capture and detention},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {66},
  number       = {9},
  pages        = {1165--1180},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.jpdc.2006.04.012},
  doi          = {10.1016/J.JPDC.2006.04.012},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/JiangXW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/JiangWXSBW06,
  author       = {Xuxian Jiang and
                  Aaron Walters and
                  Dongyan Xu and
                  Eugene H. Spafford and
                  Florian P. Buchholz and
                  Yi{-}Min Wang},
  title        = {Provenance-Aware Tracing ofWorm Break-in and Contaminations: {A} Process
                  Coloring Approach},
  booktitle    = {26th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
  pages        = {38},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDCS.2006.69},
  doi          = {10.1109/ICDCS.2006.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/JiangWXSBW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangBJRVCK06,
  author       = {Yi{-}Min Wang and
                  Doug Beck and
                  Xuxian Jiang and
                  Roussi Roussev and
                  Chad Verbowski and
                  Shuo Chen and
                  Samuel T. King},
  title        = {Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites
                  That Exploit Browser Vulnerabilities},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2006, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2006},
  url          = {https://www.ndss-symposium.org/ndss2006/automated-web-patrol-strider-honeymonkeys-finding-web-sites-exploit-browser-vulnerabilities/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WangBJRVCK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worm/JiangX06,
  author       = {Xuxian Jiang and
                  Dongyan Xu},
  editor       = {Farnam Jahanian},
  title        = {Profiling self-propagating worms via behavioral footprinting},
  booktitle    = {Proceedings of the 2006 {ACM} Workshop on Rapid Malcode, {WORM} 2006,
                  Alexandria, VA, USA, November 3, 2006},
  pages        = {17--24},
  publisher    = {{ACM} Press},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179542.1179547},
  doi          = {10.1145/1179542.1179547},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/worm/JiangX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RuthJXG05,
  author       = {Paul Ruth and
                  Xuxian Jiang and
                  Dongyan Xu and
                  Sebastien Goasguen},
  title        = {Virtual Distributed Environments in a Shared Infrastructure},
  journal      = {Computer},
  volume       = {38},
  number       = {5},
  pages        = {63--69},
  year         = {2005},
  url          = {https://doi.org/10.1109/MC.2005.175},
  doi          = {10.1109/MC.2005.175},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/RuthJXG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JiangXWS05,
  author       = {Xuxian Jiang and
                  Dongyan Xu and
                  Helen J. Wang and
                  Eugene H. Spafford},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Virtual Playgrounds for Worm Behavior Investigation},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_1},
  doi          = {10.1007/11663812\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JiangXWS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/JiangXE04,
  author       = {Xuxian Jiang and
                  Dongyan Xu and
                  Rudolf Eigenmann},
  title        = {Protection mechanisms for application service hosting platforms},
  booktitle    = {4th {IEEE/ACM} International Symposium on Cluster Computing and the
                  Grid (CCGrid 2004), April 19-22, 2004, Chicago, Illinois, {USA}},
  pages        = {656--663},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CCGrid.2004.1336693},
  doi          = {10.1109/CCGRID.2004.1336693},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/JiangXE04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/JiangX04,
  author       = {Xuxian Jiang and
                  Dongyan Xu},
  editor       = {Jiannong Cao and
                  Laurence Tianruo Yang and
                  Minyi Guo and
                  Francis Chi{-}Moon Lau},
  title        = {{VIOLIN:} Virtual Internetworking on Overlay Infrastructure},
  booktitle    = {Parallel and Distributed Processing and Applications, Second InternationalSymposium,
                  {ISPA} 2004, Hong Kong, China, December 13-15, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3358},
  pages        = {937--946},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30566-8\_107},
  doi          = {10.1007/978-3-540-30566-8\_107},
  timestamp    = {Tue, 14 Apr 2020 13:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/JiangX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/XuJ04,
  author       = {Dongyan Xu and
                  Xuxian Jiang},
  editor       = {Henning Schulzrinne and
                  Nevenka Dimitrova and
                  Martina Angela Sasse and
                  Sue B. Moon and
                  Rainer Lienhart},
  title        = {Towards an integrated multimedia service hosting overlay},
  booktitle    = {Proceedings of the 12th {ACM} International Conference on Multimedia,
                  New York, NY, USA, October 10-16, 2004},
  pages        = {96--103},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1027527.1027545},
  doi          = {10.1145/1027527.1027545},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/XuJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiangX04,
  author       = {Xuxian Jiang and
                  Dongyan Xu},
  editor       = {Matt Blaze},
  title        = {Collapsar: {A} VM-Based Architecture for Network Attack Detention
                  Center},
  booktitle    = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  pages        = {15--28},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/sec04/tech/jiang.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JiangX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpdc/JiangX03,
  author       = {Xuxian Jiang and
                  Dongyan Xu},
  title        = {{SODA:} {A} Service-On-Demand Architecture for Application Service
                  Hosting Utility Platforms},
  booktitle    = {12th International Symposium on High-Performance Distributed Computing
                  {(HPDC-12} 2003), 22-24 June 2003, Seattle, WA, {USA}},
  pages        = {174--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/HPDC.2003.1210027},
  doi          = {10.1109/HPDC.2003.1210027},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpdc/JiangX03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/JiangDXB03,
  author       = {Xuxian Jiang and
                  Yu Dong and
                  Dongyan Xu and
                  Bharat K. Bhargava},
  title        = {GnuStream: a {P2P} media streaming system prototype},
  booktitle    = {Proceedings of the 2003 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2003, 6-9 July 2003, Baltimore, MD, {USA}},
  pages        = {325--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICME.2003.1221619},
  doi          = {10.1109/ICME.2003.1221619},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/JiangDXB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mometools/JiangX03,
  author       = {Xuxian Jiang and
                  Dongyan Xu},
  editor       = {Georg Carle and
                  Hartmut Ritter and
                  Klaus Wehrle},
  title        = {vBET: a VM-based emulation testbed},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} workshop on Models, methods and
                  tools for reproducible network research, MoMeTools '03, Karlsruhe,
                  Germany, August 25-27, 2003},
  pages        = {95--104},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/944773.944789},
  doi          = {10.1145/944773.944789},
  timestamp    = {Sat, 12 Nov 2022 13:04:34 +0100},
  biburl       = {https://dblp.org/rec/conf/mometools/JiangX03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics