Semantics-aware android malware classification using weighted contextual api dependency graphs M Zhang, Y Duan, H Yin, Z Zhao Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 624 | 2014 |
Appsealer: automatic generation of vulnerability-specific patches for preventing component hijacking attacks in android applications. M Zhang, H Yin NDSS 14, 23-26, 2014 | 210 | 2014 |
Towards a Timely Causality Analysis for Enterprise Security. Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal NDSS, 2018 | 207 | 2018 |
V2e: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis LK Yan, M Jayachandra, M Zhang, H Yin Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012 | 124 | 2012 |
Things you may not know about android (un) packers: a systematic study based on whole-system emulation Y Duan, M Zhang, AV BHASKAR, H Yin, X Pan, T Li, X Wang, XF Wang | 108 | 2018 |
Towards automatic generation of security-centric descriptions for android apps M Zhang, Y Duan, Q Feng, H Yin Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 103 | 2015 |
Nodemerge: Template based efficient data reduction for big-data causality analysis Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 102 | 2018 |
Efficient, context-aware privacy leakage confinement for android applications without firmware modding M Zhang, H Yin Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 85 | 2014 |
Towards Automated Safety Vetting of PLC Code in Real-World Plants M Zhang, CY Chen, BC Kao, Y Qamsane, Y Shao, Y Lin, E Shi, S Mohan, ... 40th IEEE Symposium on Security and Privacy, 560-576, 2019 | 80 | 2019 |
Extract Me If You Can: Abusing PDF Parsers in Malware Detectors C Carmony, M Zhang, X Hu, AV Bhaskar, H Yin NDSS, 2016 | 80 | 2016 |
Extracting conditional formulas for cross-platform bug search Q Feng, M Wang, M Zhang, R Zhou, A Henderson, H Yin Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 79 | 2017 |
Semantics-aware android malware classification YIN Heng, M Zhang, Y Duan, Z Zhao US Patent App. 14/833,491, 2016 | 55 | 2016 |
Duet: an expressive higher-order language and linear type system for statically enforcing differential privacy JP Near, D Darais, C Abuah, T Stevens, P Gaddamadugu, L Wang, ... Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-30, 2019 | 51 | 2019 |
Template based data reduction for security related information flow data D Li, K Jee, LI Zhichun, M Zhang, Z Wu US Patent 10,733,149, 2020 | 27 | 2020 |
Towards automated safety vetting of smart contracts in decentralized applications Y Duan, X Zhao, Y Pan, S Li, M Li, F Xu, M Zhang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 19 | 2022 |
{Privacy-Preserving} Offloading of Mobile App to the Public Cloud Y Duan, M Zhang, H Yin, Y Tang 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 15), 2015 | 16 | 2015 |
Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation LK Yan, M Jayachandra, M Zhang, H Yin Internet Society, 05-1, 2010 | 16 | 2010 |
Android Application Security: A Semantics and Context-Aware Approach M Zhang, H Yin Springer International Publishing, 2016 | 11 | 2016 |
APTrace: A responsive system for agile enterprise level causality analysis J Gui, D Li, Z Chen, J Rhee, X Xiao, M Zhang, K Jee, Z Li, H Chen 2020 IEEE 36th international conference on data engineering (ICDE), 1701-1712, 2020 | 10 | 2020 |
Correctness-preserving compression of datasets and neural network models V Joseph, N Chalapathi, A Bhaskara, G Gopalakrishnan, P Panchekha, ... 2020 IEEE/ACM 4th International Workshop on Software Correctness for HPC …, 2020 | 9 | 2020 |