周亚金
近期热点
资料介绍
个人简历
周亚金是浙江大学“百人计划”研究员。2015年北卡州立大学获得博士学位。招收博士/硕士/访问学生,要求有比较好的系统/安全功底,对编程和系统搭建有浓厚兴趣。更多信息请访问: https://yajin.org教学与课程操作系统: 2018秋冬学期信息安全综合实验:2019夏学期研究领域
操作系统安全嵌入式系统安全软件安全,二进制分析CPU体系结构安全""近期论文
2019[9]Different is Good:Detecting the Use of Uninitialized Variables through Differential Replay[Paper]Mengchen Cao,Xiantong Hou,Tao Wang,Hunter Qu,Yajin Zhou,Xiaolong Bai,Fuwei WangProceedings of the 26th ACM Conference on Computer and Communications(ACM CCS 2019)[8]LightBox:Full-stack Protected Stateful Middlebox at Lightning Speed[Paper]Huayi Duan,Cong Wang,Xingliang Yuan,Yajin Zhou,Qian Wang,Kui RenProceedings of the 26th ACM Conference on Computer and Communications(ACM CCS 2019)[7]Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum[Paper]Zhen Cheng*,Xinrui Hou*,Runhuai Li,Yajin Zhou,Xiapu Luo,Jinku Li,Kui RenProceedings of the 22nd International Symposium on Research in Attacks,Intrusions and Defenses(RAID 2019)(*The names of the first two authors are in alphabetical order)[6]SPEED:Accelerating Enclave Applications via Secure Deduplication[Paper]Helei Cui,Huayi Duan,Zhan Qin,Cong Wang,Yajin ZhouProceedings of the 39th IEEE International Conference on Distributed Computing Systems(IEEE ICDCS 2019)[5]Dating with Scambots:Understanding the Ecosystem of Fraudulent Dating Applications[Paper]Yangyu Hu,Haoyu Wang,Yajin Zhou,Yao Guo,Li Li,Bingxuan Luo,Fangren XuIEEE Transactions on Dependable and Secure Computing(TDSC)[4]Adaptive Call-site Sensitive Control Flow Integrity(Best Paper Award)[Paper|Code]Mustakimur Khandaker,Abu Naser,Wenqing Liu,Zhi Wang,Yajin Zhou,Yueqiang ChengProceedings of the 4th IEEE European Symposium on Security and Privacy(IEEE EuroS&P 2019)[3]NDroid:Towards Tracking Information Flows Across Multiple Android Contexts[Paper]Lei Xue,Chenxiong Qian,Hao Zhou,Xiapu Luo,Yajin Zhou,Yuru Shao and Alvin T.S.ChanIEEE Transactions on Information Forensics&Security(TIFS),Volume:14,Issue:3,pp.814–828,March 20192018[2]Towards Privacy-Preserving Malware Detection Systems for Android(Best Paper Award)[Paper]Helei Cui,Yajin Zhou,Cong Wang,Qi Li,Kui RenProceedings of the 24th International Conference on Parallel and Distributed Systems(IEEE ICPADS 2018)[1]AdCapsule:Practical Confinement of Advertisements in Android Applications[Paper]Xiaonan Zhu,Jinku Li,Yajin Zhou,Jianfeng MaIEEE Transactions on Dependable and Secure Computing(TDSC)Before 20182017[21]When Program Analysis Meets Mobile Security:An Industrial Study of Misusing Android Internet Sockets[Paper]Wenqi Bu,Minhui Xue,Lihua Xu,Yajin Zhou,Zhushou Tang,Tao XieProceedings of the 11th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering(ESEC/FSE 2017)[20]Malton:Towards On-Device Non-Invasive Mobile Malware Analysis for ART[Paper]Lei Xue,Yajin Zhou,Ting Chen,Xiapu Luo,Guofei GuProceedings of the 26th USENIX Security Symposium(USENIX Security 2017)[19]Design and Implementation of SecPod,A Framework for Virtualization-based Security Systems[Paper]Xiaoguang Wang,Yong Qi,Zhi Wang,Yue Chen,Yajin ZhouIEEE Transactions on Dependable and Secure Computing(TDSC)2016[18]Blender:Self-randomizing Address Space Layout for Android Apps[Paper]Mingshen Sun,John C.S.Lui,Yajin ZhouProceedings of the the 19th International Symposium on Research in Attacks,Intrusions and Defenses(RAID 2016)[17]AppShell:Making Data Protection Practical for Lost or Stolen Android Devices[Paper]Yajin Zhou,Kapil Singh,Xuxian JiangProceedings of IEEE/IFIP Network Operations and Management Symposium(NOMS 2016)2015[16]SecPod:a Framework for Virtualization-based Security Systems[Paper]Xiaoguang Wang,Yue Chen,Zhi Wang,Yong Qi,Yajin ZhouProceedings of the 2015 USENIX Annual Technical Conference(USENIX ATC 2015)[15]Harvesting Developer Credentials in Android Apps[Paper]Yajin Zhou,Lei Wu,Zhi Wang,Xuxian JiangProceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks(WiSec 2015)[14]Hybrid User-level Sandboxing of Third-party Android Apps[Paper]Yajin Zhou,Kunal Patel,Lei Wu,Zhi Wang,Xuxian JiangProceedings of the 10th ACM Symposium on Information,Computer and Communications Security(ASIACCS 2015)2014[13]ARMlock:Hardware-based Fault Isolation for ARM[Paper|Slides]Yajin Zhou,Xiaoguang Wang,Yue Chen,Zhi WangProceedings of the 21st ACM Conference on Computer and Communications Security(CCS 2014)[12]Owner-centric Protection of Unstructured Data on Smartphones[Paper]Yajin Zhou,Kapil Singh,Xuxian JiangProceedings of the 7th International Conference on Trust and Trustworthy Computing(TRUST 2014)[11]AirBag:Boosting Smartphone Resistance to Malware Infection[Paper]Chiachih Wu,Yajin Zhou,Kunal Patel,Zhenkai Liang,Xuxian JiangProceedings of the 21st Network and Distributed System Security Symposium(NDSS 2014)[10]DIVILAR:Diversifying Intermediate Language for Anti-Repackaging on Android Platform[Paper]Wu Zhou,Zhi Wang,Yajin Zhou,Xuxian JiangProceedings of the 4th ACM Conference on Data and Application Security and Privacy(CODASPY 2014)2013[9]The Impact of Vendor Customizations on Android Security[Paper]Lei Wu,Michael Grace,Yajin Zhou,Chiachih Wu,Xuxian JiangProceedings of the 20th ACM Conference on Computer and Communications Security(CCS 2013)[8]Fast,Scalable Detection of'Piggybacked'Mobile Applications(Best Paper Award)[Paper]Wu Zhou,Yajin Zhou,Michael Grace,Xuxian Jiang,Shihong ZouProceedings of the 3rd ACM Conference on Data and Application Security and Privacy(CODASPY 2013)[7]Detecting Passive Content Leaks and Pollution in Android Applications[Paper|Slides]Yajin Zhou,Xuxian JiangProceedings of the 20th Network and Distributed System Security Symposium(NDSS 2013)2012[6]RiskRanker:Scalable and Accurate Zero-day Android Malware Detection[Paper]Michael Grace*,Yajin Zhou*,Qiang Zhang,Shihong Zou,Xuxian JiangProceedings of the 10th International Conference on Mobile Systems,Applications and Services(MobiSys 2012)(*The names of the first two authors are in alphabetical order)[5]Dissecting Android Malware:Characterization and Evolution[Paper]Yajin Zhou,Xuxian JiangProceedings of the 33rd IEEE Symposium on Security and Privacy(Oakland 2012)(Our dataset is released atAndroid Malware Genome Project)[4]DroidMOSS:Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces(Best Paper Award)[Paper]Wu Zhou,Yajin Zhou,Xuxian Jiang,Peng NingProceedings of the 2nd ACM Conference on Data and Application Security and Privacy(CODASPY 2012)[3]Hey,You,Get off of My Market:Detecting Malicious Apps in Official and Alternative Android Markets[Paper]Yajin Zhou,Zhi Wang,Wu Zhou and Xuxian JiangProceedings of the 19th Network and Distributed System Security Symposium(NDSS 2012)[2]Systematic Detection of Capability Leaks in Stock Android Smartphones[Paper|Demo Video]Michael Grace,Yajin Zhou,Zhi Wang and Xuxian JiangProceedings of the 19th Network and Distributed System Security Symposium(NDSS 2012)2011[1]Taming Information-Stealing Smartphone Applications(on Android)[Paper]Yajin Zhou,Xinwen Zhang,Xuxian Jiang,Vince W.FreehProceedings of the 4th International Conference on Trust and Trustworthy Computing(TRUST 2011) 相关热点
最新收录
- 千奈美(ちなみん) 06-25
- 皆川琉衣(皆川るい) 06-25
- 凪光(凪ひかる) 06-25
- 织本濑里乃(織本せりの 06-25
- 冈本莉里 岡本莉里 (おか 06-25
- 凯蒂·佩里(水果姐) 06-25
- 吉高宁宁(吉高寧々 Nene 06-25
- 水咲优美(水咲優美) 06-25
- 三月光(三月ひかる) 06-21
- 澪川遥(澪川はるか) 06-21