热点话题人物,欢迎提交收录!
最优雅的名人百科,欢迎向我们提交收录。
周亚金
2023-05-18 09:36
  • 周亚金
  • 周亚金 - 研究员 博士生导师-浙江大学-计算机科学与技术-个人资料

近期热点

资料介绍

个人简历


周亚金是浙江大学“百人计划”研究员。2015年北卡州立大学获得博士学位。
招收博士/硕士/访问学生,要求有比较好的系统/安全功底,对编程和系统搭建有浓厚兴趣。
更多信息请访问: https://yajin.org
教学与课程
操作系统: 2018秋冬学期
信息安全综合实验:2019夏学期

研究领域


操作系统安全
嵌入式系统安全
软件安全,二进制分析
CPU体系结构安全""

近期论文


2019
[9]Different is Good:Detecting the Use of Uninitialized Variables through Differential Replay[Paper]
Mengchen Cao,Xiantong Hou,Tao Wang,Hunter Qu,Yajin Zhou,Xiaolong Bai,Fuwei Wang
Proceedings of the 26th ACM Conference on Computer and Communications(ACM CCS 2019)
[8]LightBox:Full-stack Protected Stateful Middlebox at Lightning Speed[Paper]
Huayi Duan,Cong Wang,Xingliang Yuan,Yajin Zhou,Qian Wang,Kui Ren
Proceedings of the 26th ACM Conference on Computer and Communications(ACM CCS 2019)
[7]Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum[Paper]
Zhen Cheng*,Xinrui Hou*,Runhuai Li,Yajin Zhou,Xiapu Luo,Jinku Li,Kui Ren
Proceedings of the 22nd International Symposium on Research in Attacks,Intrusions and Defenses(RAID 2019)
(*The names of the first two authors are in alphabetical order)
[6]SPEED:Accelerating Enclave Applications via Secure Deduplication[Paper]
Helei Cui,Huayi Duan,Zhan Qin,Cong Wang,Yajin Zhou
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems(IEEE ICDCS 2019)
[5]Dating with Scambots:Understanding the Ecosystem of Fraudulent Dating Applications[Paper]
Yangyu Hu,Haoyu Wang,Yajin Zhou,Yao Guo,Li Li,Bingxuan Luo,Fangren Xu
IEEE Transactions on Dependable and Secure Computing(TDSC)
[4]Adaptive Call-site Sensitive Control Flow Integrity(Best Paper Award)[Paper|Code]
Mustakimur Khandaker,Abu Naser,Wenqing Liu,Zhi Wang,Yajin Zhou,Yueqiang Cheng
Proceedings of the 4th IEEE European Symposium on Security and Privacy(IEEE EuroS&P 2019)
[3]NDroid:Towards Tracking Information Flows Across Multiple Android Contexts[Paper]
Lei Xue,Chenxiong Qian,Hao Zhou,Xiapu Luo,Yajin Zhou,Yuru Shao and Alvin T.S.Chan
IEEE Transactions on Information Forensics&Security(TIFS),Volume:14,Issue:3,pp.814–828,March 2019
2018
[2]Towards Privacy-Preserving Malware Detection Systems for Android(Best Paper Award)[Paper]
Helei Cui,Yajin Zhou,Cong Wang,Qi Li,Kui Ren
Proceedings of the 24th International Conference on Parallel and Distributed Systems(IEEE ICPADS 2018)
[1]AdCapsule:Practical Confinement of Advertisements in Android Applications[Paper]
Xiaonan Zhu,Jinku Li,Yajin Zhou,Jianfeng Ma
IEEE Transactions on Dependable and Secure Computing(TDSC)
Before 2018
2017
[21]When Program Analysis Meets Mobile Security:An Industrial Study of Misusing Android Internet Sockets[Paper]
Wenqi Bu,Minhui Xue,Lihua Xu,Yajin Zhou,Zhushou Tang,Tao Xie
Proceedings of the 11th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering(ESEC/FSE 2017)
[20]Malton:Towards On-Device Non-Invasive Mobile Malware Analysis for ART[Paper]
Lei Xue,Yajin Zhou,Ting Chen,Xiapu Luo,Guofei Gu
Proceedings of the 26th USENIX Security Symposium(USENIX Security 2017)
[19]Design and Implementation of SecPod,A Framework for Virtualization-based Security Systems[Paper]
Xiaoguang Wang,Yong Qi,Zhi Wang,Yue Chen,Yajin Zhou
IEEE Transactions on Dependable and Secure Computing(TDSC)
2016
[18]Blender:Self-randomizing Address Space Layout for Android Apps[Paper]
Mingshen Sun,John C.S.Lui,Yajin Zhou
Proceedings of the the 19th International Symposium on Research in Attacks,Intrusions and Defenses(RAID 2016)
[17]AppShell:Making Data Protection Practical for Lost or Stolen Android Devices[Paper]
Yajin Zhou,Kapil Singh,Xuxian Jiang
Proceedings of IEEE/IFIP Network Operations and Management Symposium(NOMS 2016)
2015
[16]SecPod:a Framework for Virtualization-based Security Systems[Paper]
Xiaoguang Wang,Yue Chen,Zhi Wang,Yong Qi,Yajin Zhou
Proceedings of the 2015 USENIX Annual Technical Conference(USENIX ATC 2015)
[15]Harvesting Developer Credentials in Android Apps[Paper]
Yajin Zhou,Lei Wu,Zhi Wang,Xuxian Jiang
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks(WiSec 2015)
[14]Hybrid User-level Sandboxing of Third-party Android Apps[Paper]
Yajin Zhou,Kunal Patel,Lei Wu,Zhi Wang,Xuxian Jiang
Proceedings of the 10th ACM Symposium on Information,Computer and Communications Security(ASIACCS 2015)
2014
[13]ARMlock:Hardware-based Fault Isolation for ARM[Paper|Slides]
Yajin Zhou,Xiaoguang Wang,Yue Chen,Zhi Wang
Proceedings of the 21st ACM Conference on Computer and Communications Security(CCS 2014)
[12]Owner-centric Protection of Unstructured Data on Smartphones[Paper]
Yajin Zhou,Kapil Singh,Xuxian Jiang
Proceedings of the 7th International Conference on Trust and Trustworthy Computing(TRUST 2014)
[11]AirBag:Boosting Smartphone Resistance to Malware Infection[Paper]
Chiachih Wu,Yajin Zhou,Kunal Patel,Zhenkai Liang,Xuxian Jiang
Proceedings of the 21st Network and Distributed System Security Symposium(NDSS 2014)
[10]DIVILAR:Diversifying Intermediate Language for Anti-Repackaging on Android Platform[Paper]
Wu Zhou,Zhi Wang,Yajin Zhou,Xuxian Jiang
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy(CODASPY 2014)
2013
[9]The Impact of Vendor Customizations on Android Security[Paper]
Lei Wu,Michael Grace,Yajin Zhou,Chiachih Wu,Xuxian Jiang
Proceedings of the 20th ACM Conference on Computer and Communications Security(CCS 2013)
[8]Fast,Scalable Detection of'Piggybacked'Mobile Applications(Best Paper Award)[Paper]
Wu Zhou,Yajin Zhou,Michael Grace,Xuxian Jiang,Shihong Zou
Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy(CODASPY 2013)
[7]Detecting Passive Content Leaks and Pollution in Android Applications[Paper|Slides]
Yajin Zhou,Xuxian Jiang
Proceedings of the 20th Network and Distributed System Security Symposium(NDSS 2013)
2012
[6]RiskRanker:Scalable and Accurate Zero-day Android Malware Detection[Paper]
Michael Grace*,Yajin Zhou*,Qiang Zhang,Shihong Zou,Xuxian Jiang
Proceedings of the 10th International Conference on Mobile Systems,Applications and Services(MobiSys 2012)
(*The names of the first two authors are in alphabetical order)
[5]Dissecting Android Malware:Characterization and Evolution[Paper]
Yajin Zhou,Xuxian Jiang
Proceedings of the 33rd IEEE Symposium on Security and Privacy(Oakland 2012)
(Our dataset is released atAndroid Malware Genome Project)
[4]DroidMOSS:Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces(Best Paper Award)[Paper]
Wu Zhou,Yajin Zhou,Xuxian Jiang,Peng Ning
Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy(CODASPY 2012)
[3]Hey,You,Get off of My Market:Detecting Malicious Apps in Official and Alternative Android Markets[Paper]
Yajin Zhou,Zhi Wang,Wu Zhou and Xuxian Jiang
Proceedings of the 19th Network and Distributed System Security Symposium(NDSS 2012)
[2]Systematic Detection of Capability Leaks in Stock Android Smartphones[Paper|Demo Video]
Michael Grace,Yajin Zhou,Zhi Wang and Xuxian Jiang
Proceedings of the 19th Network and Distributed System Security Symposium(NDSS 2012)
2011
[1]Taming Information-Stealing Smartphone Applications(on Android)[Paper]
Yajin Zhou,Xinwen Zhang,Xuxian Jiang,Vince W.Freeh
Proceedings of the 4th International Conference on Trust and Trustworthy Computing(TRUST 2011)

相关热点

扫码添加好友