• Publications
  • Influence
Cracking Android Pattern Lock in Five Attempts
TLDR
This paper presents a video-based attack to reconstruct Android lock patterns from video footage filmed using a mobile phone camera. Expand
  • 63
  • 7
  • PDF
Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach
TLDR
We present a generic, low-effort yet effective approach to automatically solve text-based captchas based on the generative adversarial network. Expand
  • 41
  • 7
  • PDF
A Video-based Attack for Android Pattern Lock
TLDR
A novel video-based side channel attack that can reconstruct Android locking patterns from video footage filmed using a smartphone. Expand
  • 15
  • PDF
Exploiting Dynamic Scheduling for VM-Based Code Obfuscation
TLDR
This paper presents DSVMP, a novel VM-based code obfuscation approach for software protection.DSVMP uses a dynamic scheduling structure and multiple VMs to increase diversity of program execution. Expand
  • 8
  • PDF
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity
TLDR
We present CoDiver (Code Virtualization Protection with Diversity), a novel VM-based code obfuscation system in this paper. Expand
  • 2
Exploiting Code Diversity to Enhance Code Virtualization Protection
  • Chao Xue, Z. Tang, +5 authors Z. Wang
  • Computer Science
  • IEEE 24th International Conference on Parallel…
  • 11 December 2018
TLDR
We propose DCVP, a VM-based code obfuscation scheme to protect programs against unauthorized analysis. Expand
  • 3
  • PDF
Exploiting Binary-Level Code Virtualization to Protect Android Applications Against App Repackaging
TLDR
This paper presents CodeCloak, a novel anti-repackaging system to protect Android apps at the native code level. Expand
  • 3
VMGuards:A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern
Process-level virtual machine (PVM) based code obfuscation is a viable means for protecting software against runtime code tampering and unauthorized code reverse engineering. PVM-based approachesExpand
  • 2
  • PDF
Deep Program Structure Modeling Through Multi-Relational Graph-based Learning
TLDR
We present POEM, a novel framework that automatically learns useful code representations from graph-based program structures, and compare it against nine learning-based methods. Expand
Compile-time code virtualization for android applications
TLDR
This paper presents a novel approach to transfer code virtualization from DEX level to native level, which possesses strong security strength and good stealth, with only modest cost. Expand
  • 1