Riskranker: scalable and accurate zero-day android malware detection M Grace, Y Zhou, Q Zhang, S Zou, X Jiang Proceedings of the 10th international conference on Mobile systems …, 2012 | 886 | 2012 |
Unsafe exposure analysis of mobile in-app advertisements MC Grace, W Zhou, X Jiang, AR Sadeghi Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 673 | 2012 |
Systematic detection of capability leaks in stock android smartphones. MC Grace, Y Zhou, Z Wang, X Jiang NDSS 14, 19, 2012 | 603 | 2012 |
Fast, scalable detection of" piggybacked" mobile applications W Zhou, Y Zhou, M Grace, X Jiang, S Zou Proceedings of the third ACM conference on Data and application security and …, 2013 | 308 | 2013 |
Defeating return-oriented rootkits with "Return-Less" kernels J Li, Z Wang, X Jiang, M Grace, S Bahram Proceedings of the 5th European conference on Computer systems, 195-208, 2010 | 250 | 2010 |
The impact of vendor customizations on android security L Wu, M Grace, Y Zhou, C Wu, X Jiang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 246 | 2013 |
Dksm: Subverting virtual machine introspection for fun and profit S Bahram, X Jiang, Z Wang, M Grace, J Li, D Srinivasan, J Rhee, D Xu 2010 29th IEEE symposium on reliable distributed systems, 82-91, 2010 | 229 | 2010 |
ReFormat: Automatic reverse engineering of encrypted messages Z Wang, X Jiang, W Cui, X Wang, M Grace Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 223 | 2009 |
Isolating commodity hosted hypervisors with hyperlock Z Wang, C Wu, M Grace, X Jiang Proceedings of the 7th ACM european conference on Computer Systems, 127-140, 2012 | 85 | 2012 |
Hare hunting in the wild android: A study on the threat of hanging attribute references Y Aafer, N Zhang, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 66 | 2015 |
Comprehensive and efficient protection of kernel control data J Li, Z Wang, T Bletsch, D Srinivasan, M Grace, X Jiang IEEE Transactions on Information Forensics and Security 6 (4), 1404-1417, 2011 | 64 | 2011 |
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 62 | 2017 |
Partemu: Enabling dynamic analysis of real-world trustzone software using emulation L Harrison, H Vijayakumar, R Padhye, K Sen, M Grace Proceedings of the 29th USENIX Conference on Security Symposium, 789-806, 2020 | 43 | 2020 |
Valve: Securing function workflows on serverless computing platforms P Datta, P Kumar, T Morris, M Grace, A Rahmati, A Bates Proceedings of The Web Conference 2020, 939-950, 2020 | 38 | 2020 |
Transparent protection of commodity os kernels using hardware virtualization M Grace, Z Wang, D Srinivasan, J Li, X Jiang, Z Liang, S Liakh Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010 | 36 | 2010 |
Attention spanned: Comprehensive vulnerability analysis of {AT} commands within the android ecosystem DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ... 27th {USENIX} Security Symposium ({USENIX} Security 18), 273-290, 2018 | 31 | 2018 |
Analyzing and improving linux kernel memory protection: a model checking approach S Liakh, M Grace, X Jiang Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 22 | 2010 |
System and method for fraud detection in a mobile device KM Patel, B Kasman, P Ning, MC GRACE US Patent 10,607,226, 2020 | 17 | 2020 |
Attacking android smartphone systems without permissions SM Kywe, Y Li, K Petal, M Grace 2016 14th Annual Conference on Privacy, Security and Trust (PST), 147-156, 2016 | 15 | 2016 |
Guardian of the HAN: Thwarting mobile attacks on smart-home devices using OS-level situation awareness S Demetriou, N Zhang, Y Lee, X Wang, C Gunter, X Zhou, M Grace arXiv preprint arXiv:1703.01537, 2017 | 11 | 2017 |