Остановите войну!
for scientists:
default search action
Zhi Wang 0004
- > Home > Persons > Zhi Wang 0004
Publications
- 2015
- [c20]Yajin Zhou, Kunal Patel, Lei Wu, Zhi Wang, Xuxian Jiang:
Hybrid User-level Sandboxing of Third-party Android Apps. AsiaCCS 2015: 19-30 - [c17]Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang:
Harvesting developer credentials in Android apps. WISEC 2015: 23:1-23:12 - 2014
- [c14]Wu Zhou, Zhi Wang, Yajin Zhou, Xuxian Jiang:
DIVILAR: diversifying intermediate language for anti-repackaging on android platform. CODASPY 2014: 199-210 - 2013
- [c13]Chiachih Wu, Zhi Wang, Xuxian Jiang:
Taming Hosted Hypervisors with (Mostly) Deprivileged Execution. NDSS 2013 - 2012
- [c12]Zhi Wang, Chiachih Wu, Michael C. Grace, Xuxian Jiang:
Isolating commodity hosted hypervisors with HyperLock. EuroSys 2012: 127-140 - [c11]Michael C. Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang:
Systematic Detection of Capability Leaks in Stock Android Smartphones. NDSS 2012 - [c10]Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang:
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. NDSS 2012 - 2011
- [j1]Jinku Li, Zhi Wang, Tyler K. Bletsch, Deepa Srinivasan, Michael C. Grace, Xuxian Jiang:
Comprehensive and Efficient Protection of Kernel Control Data. IEEE Trans. Inf. Forensics Secur. 6(4): 1404-1417 (2011) - [c9]Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu:
Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring. CCS 2011: 363-374 - 2010
- [c8]Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky:
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. CCS 2010: 38-49 - [c7]Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace, Sina Bahram:
Defeating return-oriented rootkits with "Return-Less" kernels. EuroSys 2010: 195-208 - [c6]Michael C. Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh:
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. SecureComm 2010: 162-180 - [c5]Zhi Wang, Xuxian Jiang:
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. IEEE Symposium on Security and Privacy 2010: 380-395 - [c4]Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, Deepa Srinivasan, Junghwan Rhee, Dongyan Xu:
DKSM: Subverting Virtual Machine Introspection for Fun and Profit. SRDS 2010: 82-91 - 2009
- [c3]Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning:
Countering kernel rootkits with lightweight hook protection. CCS 2009: 545-554 - [c2]Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace:
ReFormat: Automatic Reverse Engineering of Encrypted Messages. ESORICS 2009: 200-215 - 2008
- [c1]Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang:
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. RAID 2008: 21-38
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-17 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint