Morpheus: automatically generating heuristics to detect android emulators Y Jing, Z Zhao, GJ Ahn, H Hu Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 138 | 2014 |
RiskMon: Continuous and Automated Risk Assessment of Mobile Applications Y Jing, GJ Ahn, Z Zhao, H Hu Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014 | 108 | 2014 |
Towards memory safe enclave programming with rust-sgx H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 102 | 2019 |
Towards automated risk assessment and mitigation of mobile applications Y Jing, GJ Ahn, Z Zhao, H Hu IEEE Transactions on Dependable and Secure Computing 12 (5), 571-584, 2014 | 42 | 2014 |
Model-based conformance testing for android Y Jing, GJ Ahn, H Hu Advances in Information and Computer Security: 7th International Workshop on …, 2012 | 30 | 2012 |
Checking intent-based communication in android with intent space analysis Y Jing, GJ Ahn, A Doupé, JH Yi Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 24 | 2016 |
Mules, seals, and attacking tools: Analyzing 12 online marketplaces Z Zhao, M Sankaran, GJ Ahn, TJ Holt, Y Jing, H Hu IEEE Security & Privacy 14 (3), 32-43, 2016 | 16 | 2016 |
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 12 | 2020 |
TripleMon: A multi-layer security framework for mediating inter-process communication on Android Y Jing, GJ Ahn, H Hu, H Cho, Z Zhao Journal of Computer Security 24 (4), 2016 | 2 | 2016 |
Toward monitoring, assessing, and confining mobile applications in modern mobile platforms Y Jing Arizona State University, 2015 | | 2015 |