Publications

  • Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu, "iRiS: Vetting Private API Abuse in iOS Applications," Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, CO, October 2015.
  • Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su, "X-Force: Force-Executing Binary Programs for Security Applications," Proceedings of the 23rd USENIX Security Symposium (Security 2014), San Diego, CA, August 2014.
  • Zhui Deng, Xiangyu Zhang, Dongyan Xu, "SPIDER: Stealthy Binary Program Instrumentation and Debugging via Hardware Virtualization," Proceedings of the Annual Computer Security Applications Conference (ACSAC 2013), New Orleans, LA, December 2013.
  • Zhui Deng, Xiangyu Zhang, Dongyan Xu, "BISTRO: Binary Component Extraction and Embedding for Software Security Applications," Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS 2013), Egham, UK, September 2013.
  • Zhongshu Gu, William Sumner, Zhui Deng, Xiangyu Zhang, Dongyan Xu, "DRIP: A Framework for Purifying Trojaned Kernel Drivers," Proceedings of the 43rd IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-PDS 2013), Budapest, Hungary, June 2013.
  • Zhui Deng, Dongyan Xu, Xiangyu Zhang, Xuxian Jiang, "IntroLib: Efficient and Transparent Library Call Introspection for Malware Forensics," Proceedings of the 12th Annual DFRWS Digital Forensics Conference (DFRWS 2012), Washington, DC, August 2012.
  • Zhongshu Gu, Zhui Deng, Dongyan Xu, Xuxian Jiang, "Process Implanting: A New Active Introspection Framework for Virtualization," Proceedings of the IEEE Symposium on Reliable Distributed Systems (SRDS 2011), Madrid, Spain, October 2011.
Comments