Michael Grace
Michael Grace
Samsung Research America
Verified email at
Cited by
Cited by
Riskranker: scalable and accurate zero-day android malware detection
M Grace, Y Zhou, Q Zhang, S Zou, X Jiang
Proceedings of the 10th international conference on Mobile systems …, 2012
Unsafe exposure analysis of mobile in-app advertisements
MC Grace, W Zhou, X Jiang, AR Sadeghi
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
Systematic detection of capability leaks in stock android smartphones.
MC Grace, Y Zhou, Z Wang, X Jiang
NDSS 14, 19, 2012
Fast, scalable detection of" piggybacked" mobile applications
W Zhou, Y Zhou, M Grace, X Jiang, S Zou
Proceedings of the third ACM conference on Data and application security and …, 2013
Defeating return-oriented rootkits with "Return-Less" kernels
J Li, Z Wang, X Jiang, M Grace, S Bahram
Proceedings of the 5th European conference on Computer systems, 195-208, 2010
The impact of vendor customizations on android security
L Wu, M Grace, Y Zhou, C Wu, X Jiang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Dksm: Subverting virtual machine introspection for fun and profit
S Bahram, X Jiang, Z Wang, M Grace, J Li, D Srinivasan, J Rhee, D Xu
2010 29th IEEE symposium on reliable distributed systems, 82-91, 2010
ReFormat: Automatic reverse engineering of encrypted messages
Z Wang, X Jiang, W Cui, X Wang, M Grace
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
Isolating commodity hosted hypervisors with hyperlock
Z Wang, C Wu, M Grace, X Jiang
Proceedings of the 7th ACM european conference on Computer Systems, 127-140, 2012
Hare hunting in the wild android: A study on the threat of hanging attribute references
Y Aafer, N Zhang, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Comprehensive and efficient protection of kernel control data
J Li, Z Wang, T Bletsch, D Srinivasan, M Grace, X Jiang
IEEE Transactions on Information Forensics and Security 6 (4), 1404-1417, 2011
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps
S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
Partemu: Enabling dynamic analysis of real-world trustzone software using emulation
L Harrison, H Vijayakumar, R Padhye, K Sen, M Grace
Proceedings of the 29th USENIX Conference on Security Symposium, 789-806, 2020
Valve: Securing function workflows on serverless computing platforms
P Datta, P Kumar, T Morris, M Grace, A Rahmati, A Bates
Proceedings of The Web Conference 2020, 939-950, 2020
Transparent protection of commodity os kernels using hardware virtualization
M Grace, Z Wang, D Srinivasan, J Li, X Jiang, Z Liang, S Liakh
Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010
Attention spanned: Comprehensive vulnerability analysis of {AT} commands within the android ecosystem
DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 273-290, 2018
Analyzing and improving linux kernel memory protection: a model checking approach
S Liakh, M Grace, X Jiang
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
System and method for fraud detection in a mobile device
KM Patel, B Kasman, P Ning, MC GRACE
US Patent 10,607,226, 2020
Attacking android smartphone systems without permissions
SM Kywe, Y Li, K Petal, M Grace
2016 14th Annual Conference on Privacy, Security and Trust (PST), 147-156, 2016
Guardian of the HAN: Thwarting mobile attacks on smart-home devices using OS-level situation awareness
S Demetriou, N Zhang, Y Lee, X Wang, C Gunter, X Zhou, M Grace
arXiv preprint arXiv:1703.01537, 2017
The system can't perform the operation now. Try again later.
Articles 1–20