default search action
Xuxian Jiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2013
- [b2]Xuxian Jiang, Yajin Zhou:
Android Malware. Springer Briefs in Computer Science, Springer 2013, ISBN 978-1-4614-7393-0, pp. i-xi, 1-44 - 2006
- [b1]Xuxian Jiang:
Enabling Internet worms and malware investigation and defense using virtualization. Purdue University, USA, 2006
Journal Articles
- 2020
- [j15]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. Proc. ACM Meas. Anal. Comput. Syst. 4(2): 37:1-37:28 (2020) - 2015
- [j14]Karim O. Elish, Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder, Xuxian Jiang:
Profiling user-trigger dependence for Android malware detection. Comput. Secur. 49: 255-273 (2015) - 2014
- [j13]Junghwan Rhee, Ryan D. Riley, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu:
Data-Centric OS Kernel Malware Characterization. IEEE Trans. Inf. Forensics Secur. 9(1): 72-87 (2014) - [j12]Vaibhav Rastogi, Yan Chen, Xuxian Jiang:
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks. IEEE Trans. Inf. Forensics Secur. 9(1): 99-108 (2014) - 2012
- [j11]Zhui Deng, Dongyan Xu, Xiangyu Zhang, Xuxian Jiang:
IntroLib: Efficient and transparent library call introspection for malware forensics. Digit. Investig. 9(Supplement): S13-S23 (2012) - [j10]Guojun Mao, Xindong Wu, Xuxian Jiang:
Intrusion Detection Models Based on Data Mining. Int. J. Comput. Intell. Syst. 5(1): 30-38 (2012) - 2011
- [j9]Jinku Li, Zhi Wang, Tyler K. Bletsch, Deepa Srinivasan, Michael C. Grace, Xuxian Jiang:
Comprehensive and Efficient Protection of Kernel Control Data. IEEE Trans. Inf. Forensics Secur. 6(4): 1404-1417 (2011) - [j8]Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang:
Combining Discretionary Policy with Mandatory Information Flow in Operating Systems. ACM Trans. Inf. Syst. Secur. 14(3): 24:1-24:27 (2011) - 2010
- [j7]Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Xuxian Jiang:
On the billing vulnerabilities of SIP-based VoIP systems. Comput. Networks 54(11): 1837-1847 (2010) - [j6]Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
An Architectural Approach to Preventing Code Injection Attacks. IEEE Trans. Dependable Secur. Comput. 7(4): 351-365 (2010) - [j5]Xuxian Jiang, Xinyuan Wang, Dongyan Xu:
Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction. ACM Trans. Inf. Syst. Secur. 13(2): 12:1-12:28 (2010) - 2009
- [j4]Xuxian Jiang, Xingquan Zhu:
vEye: behavioral footprinting for self-propagating worm detection and profiling. Knowl. Inf. Syst. 18(2): 231-262 (2009) - 2008
- [j3]Xuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford:
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. IEEE Trans. Parallel Distributed Syst. 19(7): 890-902 (2008) - 2006
- [j2]Xuxian Jiang, Dongyan Xu, Yi-Min Wang:
Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. J. Parallel Distributed Comput. 66(9): 1165-1180 (2006) - 2005
- [j1]Paul Ruth, Xuxian Jiang, Dongyan Xu, Sebastien Goasguen:
Virtual Distributed Environments in a Shared Infrastructure. Computer 38(5): 63-69 (2005)
Conference and Workshop Papers
- 2021
- [c77]Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
EOSAFE: Security Analysis of EOSIO Smart Contracts. USENIX Security Symposium 2021: 1271-1288 - 2020
- [c76]Ningyu He, Lei Wu, Haoyu Wang, Yao Guo, Xuxian Jiang:
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. Financial Cryptography 2020: 654-675 - [c75]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. SIGMETRICS (Abstracts) 2020: 83-84 - 2018
- [c74]Jian Mao, Jingdong Bian, Hanjun Ma, Yaoqi Jia, Zhenkai Liang, Xuxian Jiang:
Robust Detection of Android UI Similarity. ICC 2018: 1-6 - 2016
- [c73]Xuxian Jiang, Kapil Singh, Yajin Zhou:
AppShell: Making data protection practical for lost or stolen Android devices. NOMS 2016: 502-508 - 2015
- [c72]Yajin Zhou, Kunal Patel, Lei Wu, Zhi Wang, Xuxian Jiang:
Hybrid User-level Sandboxing of Third-party Android Apps. AsiaCCS 2015: 19-30 - [c71]Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang:
Harvesting developer credentials in Android apps. WISEC 2015: 23:1-23:12 - 2014
- [c70]Mingshen Sun, Min Zheng, John C. S. Lui, Xuxian Jiang:
Design and implementation of an Android host-based intrusion prevention system. ACSAC 2014: 226-235 - [c69]Ning Zhang, Wenjing Lou, Xuxian Jiang, Y. Thomas Hou:
Enabling Trusted Data-intensive execution in cloud computing. CNS 2014: 355-363 - [c68]Wu Zhou, Zhi Wang, Yajin Zhou, Xuxian Jiang:
DIVILAR: diversifying intermediate language for anti-repackaging on android platform. CODASPY 2014: 199-210 - [c67]Chiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang, Xuxian Jiang:
AirBag: Boosting Smartphone Resistance to Malware Infection. NDSS 2014 - [c66]Yajin Zhou, Kapil Singh, Xuxian Jiang:
Owner-Centric Protection of Unstructured Data on Smartphones. TRUST 2014: 55-73 - 2013
- [c65]Wu Zhou, Xinwen Zhang, Xuxian Jiang:
AppInk: watermarking android apps for repackaging deterrence. AsiaCCS 2013: 1-12 - [c64]Weiliang Luo, Shouhuai Xu, Xuxian Jiang:
Real-time detection and prevention of android SMS permission abuses. SESP@CCS Asia 2013: 11-18 - [c63]Vaibhav Rastogi, Yan Chen, Xuxian Jiang:
DroidChameleon: evaluating Android anti-malware against transformation attacks. AsiaCCS 2013: 329-334 - [c62]Lei Wu, Michael C. Grace, Yajin Zhou, Chiachih Wu, Xuxian Jiang:
The impact of vendor customizations on android security. CCS 2013: 623-634 - [c61]Wu Zhou, Yajin Zhou, Michael C. Grace, Xuxian Jiang, Shihong Zou:
Fast, scalable detection of "Piggybacked" mobile applications. CODASPY 2013: 185-196 - [c60]Chiachih Wu, Zhi Wang, Xuxian Jiang:
Taming Hosted Hypervisors with (Mostly) Deprivileged Execution. NDSS 2013 - [c59]Yajin Zhou, Xuxian Jiang:
Detecting Passive Content Leaks and Pollution in Android Applications. NDSS 2013 - 2012
- [c58]Minh Tran, Xinshu Dong, Zhenkai Liang, Xuxian Jiang:
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations. ACNS 2012: 418-435 - [c57]Titus Barik, Brent E. Harrison, David L. Roberts, Xuxian Jiang:
Spatial Game Signatures for Bot Detection in Social Games. AIIDE 2012 - [c56]William Enck, Xuxian Jiang:
CCS'12 co-located workshop summary for SPSM 2012. CCS 2012: 1062-1063 - [c55]Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning:
Detecting repackaged smartphone applications in third-party android marketplaces. CODASPY 2012: 317-326 - [c54]Zhi Wang, Chiachih Wu, Michael C. Grace, Xuxian Jiang:
Isolating commodity hosted hypervisors with HyperLock. EuroSys 2012: 127-140 - [c53]Michael C. Grace, Yajin Zhou, Qiang Zhang, Shihong Zou, Xuxian Jiang:
RiskRanker: scalable and accurate zero-day android malware detection. MobiSys 2012: 281-294 - [c52]Michael C. Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang:
Systematic Detection of Capability Leaks in Stock Android Smartphones. NDSS 2012 - [c51]Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang:
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. NDSS 2012 - [c50]Yajin Zhou, Xuxian Jiang:
Dissecting Android Malware: Characterization and Evolution. IEEE Symposium on Security and Privacy 2012: 95-109 - [c49]Michael C. Grace, Wu Zhou, Xuxian Jiang, Ahmad-Reza Sadeghi:
Unsafe exposure analysis of mobile in-app advertisements. WISEC 2012: 101-112 - 2011
- [c48]Xinshu Dong, Minh Tran, Zhenkai Liang, Xuxian Jiang:
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements. ACSAC 2011: 297-306 - [c47]Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh:
Mitigating code-reuse attacks with control-flow locking. ACSAC 2011: 353-362 - [c46]Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Zhenkai Liang:
Jump-oriented programming: a new class of code-reuse attack. AsiaCCS 2011: 30-40 - [c45]Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu:
Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring. CCS 2011: 363-374 - [c44]Kailas Patil, Xinshu Dong, Xiaolei Li, Zhenkai Liang, Xuxian Jiang:
Towards Fine-Grained Access Control in JavaScript Contexts. ICDCS 2011: 720-729 - [c43]Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang:
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures. NDSS 2011 - [c42]Minh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning:
On the Expressiveness of Return-into-libc Attacks. RAID 2011: 121-141 - [c41]Deepa Srinivasan, Xuxian Jiang:
Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots. SecureComm 2011: 209-226 - [c40]Zhongshu Gu, Zhui Deng, Dongyan Xu, Xuxian Jiang:
Process Implanting: A New Active Introspection Framework for Virtualization. SRDS 2011: 147-156 - [c39]Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh:
Taming Information-Stealing Smartphone Applications (on Android). TRUST 2011: 93-107 - 2010
- [c38]Siarhei Liakh, Michael C. Grace, Xuxian Jiang:
Analyzing and improving Linux kernel memory protection: a model checking approach. ACSAC 2010: 271-280 - [c37]Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky:
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. CCS 2010: 38-49 - [c36]Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace, Sina Bahram:
Defeating return-oriented rootkits with "Return-Less" kernels. EuroSys 2010: 195-208 - [c35]Xinyuan Wang, Xuxian Jiang:
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self. ISC 2010: 166-180 - [c34]Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang:
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory. RAID 2010: 178-197 - [c33]Michael C. Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh:
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. SecureComm 2010: 162-180 - [c32]Zhi Wang, Xuxian Jiang:
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. IEEE Symposium on Security and Privacy 2010: 380-395 - [c31]Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, Deepa Srinivasan, Junghwan Rhee, Dongyan Xu:
DKSM: Subverting Virtual Machine Introspection for Fun and Profit. SRDS 2010: 82-91 - 2009
- [c30]Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang:
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. ARES 2009: 74-81 - [c29]Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui Yang, Xuxian Jiang:
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. AsiaCCS 2009: 61-69 - [c28]Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning:
Countering kernel rootkits with lightweight hook protection. CCS 2009: 545-554 - [c27]Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang:
Mapping kernel objects to enable systematic integrity checking. CCS 2009: 555-565 - [c26]Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace:
ReFormat: Automatic Reverse Engineering of Encrypted Messages. ESORICS 2009: 200-215 - [c25]Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
Multi-aspect profiling of kernel rootkit behavior. EuroSys 2009: 47-60 - [c24]Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang:
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. ISPEC 2009: 59-70 - [c23]Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang:
Trojan horse resistant discretionary access control. SACMAT 2009: 237-246 - 2008
- [c22]Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang:
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. NDSS 2008 - [c21]Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. RAID 2008: 1-20 - [c20]Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang:
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. RAID 2008: 21-38 - [c19]Daniel Ramsbrock, Xinyuan Wang, Xuxian Jiang:
A First Step towards Live Botmaster Traceback. RAID 2008: 59-77 - [c18]Xinyuan Wang, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera:
Voice pharming attack and the trust of VoIP. SecureComm 2008: 24 - 2007
- [c17]Xuxian Jiang, Xinyuan Wang, Dongyan Xu:
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. CCS 2007: 128-138 - [c16]Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
An Architectural Approach to Preventing Code Injection Attacks. DSN 2007: 30-40 - [c15]Xuxian Jiang, Xinyuan Wang:
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. RAID 2007: 198-218 - [c14]Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang:
Towards a VMM-based usage control framework for OS kernel integrity protection. SACMAT 2007: 71-80 - [c13]Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang:
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. SRDS 2007: 209-218 - [c12]Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Xuxian Jiang:
Billing Attacks on SIP-Based VoIP Systems. WOOT 2007 - 2006
- [c11]Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang:
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. ICDCS 2006: 38 - [c10]Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King:
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. NDSS 2006 - [c9]Xuxian Jiang, Dongyan Xu:
Profiling self-propagating worms via behavioral footprinting. WORM 2006: 17-24 - 2005
- [c8]Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford:
Virtual Playgrounds for Worm Behavior Investigation. RAID 2005: 1-21 - 2004
- [c7]Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann:
Protection mechanisms for application service hosting platforms. CCGRID 2004: 656-663 - [c6]Xuxian Jiang, Dongyan Xu:
VIOLIN: Virtual Internetworking on Overlay Infrastructure. ISPA 2004: 937-946 - [c5]Dongyan Xu, Xuxian Jiang:
Towards an integrated multimedia service hosting overlay. ACM Multimedia 2004: 96-103 - [c4]Xuxian Jiang, Dongyan Xu:
Collapsar: A VM-Based Architecture for Network Attack Detention Center. USENIX Security Symposium 2004: 15-28 - 2003
- [c3]Xuxian Jiang, Dongyan Xu:
SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms. HPDC 2003: 174-183 - [c2]Xuxian Jiang, Yu Dong, Dongyan Xu, Bharat K. Bhargava:
GnuStream: a P2P media streaming system prototype. ICME 2003: 325-328 - [c1]Xuxian Jiang, Dongyan Xu:
vBET: a VM-based emulation testbed. MoMeTools@SIGCOMM 2003: 95-104
Editorship
- 2012
- [e2]Ting Yu, William Enck, Xuxian Jiang:
SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2012, October 19, 2012, Raleigh, NC, USA. ACM 2012, ISBN 978-1-4503-1666-8 [contents] - 2011
- [e1]Xuxian Jiang, Amiya Bhattacharya, Partha Dasgupta, William Enck:
SPSM'11, Proceedings of the 1st ACM Workshop Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2011, October 17, 2011, Chicago, IL, USA. ACM 2011, ISBN 978-1-4503-1000-0 [contents]
Informal and Other Publications
- 2020
- [i3]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Characterizing EOSIO Blockchain. CoRR abs/2002.05369 (2020) - [i2]Ningyu He, Ruiyi Zhang, Lei Wu, Haoyu Wang, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
Security Analysis of EOSIO Smart Contracts. CoRR abs/2003.06568 (2020) - 2019
- [i1]Ningyu He, Lei Wu, Haoyu Wang, Yao Guo, Xuxian Jiang:
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. CoRR abs/1905.00272 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-27 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint