• Publications
  • Influence
Dissecting Android Malware: Characterization and Evolution
The popularity and adoption of smart phones has greatly stimulated the spread of mobile malware, especially on Android. Expand
Jump-oriented programming: a new class of code-reuse attack
Return-oriented programming is an effective code-reuse attack in which short code sequences ending in a ret instruction are found within existing binaries and executed in arbitrary order by taking control of the stack. Expand
Detecting repackaged smartphone applications in third-party android marketplaces
In this paper, we perform a systematic study on six popular Android-based third-party marketplaces. Expand
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
We present a systematic study to better understand the overall health of existing Android Markets, including both official and unofficial (third-party) ones. Expand
RiskRanker: scalable and accurate zero-day android malware detection
We propose a proactive scheme to spot zero-day Android malware. Expand
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable stealthy and in-context measurement of the runtime integrity of a running hypervisor (or any other highest privileged software layer on a system). Expand
Unsafe exposure analysis of mobile in-app advertisements
In recent years, there has been explosive growth in smartphone sales, which is accompanied with the availability of a huge number of smartphone applications (or simply apps). Expand
DroidChameleon: evaluating Android anti-malware against transformation attacks
We evaluate the state-of-the-art commercial mobile antimalware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Expand
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
  • Zhi Wang, X. Jiang
  • Computer Science
  • IEEE Symposium on Security and Privacy
  • 16 May 2010
In this paper, we present HyperSafe, a lightweight approach that endows existing Type-I bare-metal hypervisors with a unique self-protection capability to provide lifetime control flow integrity. Expand
Taming Information-Stealing Smartphone Applications (on Android)
In this paper, we argue for the need of a new privacy mode in smartphones. Expand