​
Login / Signup
Zhi Xin
Publication Activity (10 Years)
Years Active: 2009-2017
Publications (10 Years): 1
Top Topics
Code Reuse
Flow Graphs
Detect Malicious
Static Analysis
Top Venues
TrustCom
ACNS
AsiaCCS
Int. J. Bifurc. Chaos
</>
Publications
</>
Jiang Ming
,
Zhi Xin
,
Pengwei Lan
,
Dinghao Wu
,
Peng Liu
,
Bing Mao
Impeding behavior-based malware analysis via replacement attacks to malware specifications.
J. Comput. Virol. Hacking Tech.
13 (3) (2017)
Jiang Ming
,
Zhi Xin
,
Pengwei Lan
,
Dinghao Wu
,
Peng Liu
,
Bing Mao
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
ACNS
(2015)
Zhi Xin
,
Jian Xu
Analysis of a Car-Following Model with Driver Memory Effect.
Int. J. Bifurc. Chaos
25 (4) (2015)
Xin Sun
,
Yibing Zhongyang
,
Zhi Xin
,
Bing Mao
,
Li Xie
Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph.
SEC
(2014)
Tong Shen
,
Yibing Zhongyang
,
Zhi Xin
,
Bing Mao
,
Hao Huang
Detect Android Malware Variants Using Component Based Topology Graph.
TrustCom
(2014)
Xuerui Pan
,
Yibing Zhongyang
,
Zhi Xin
,
Bing Mao
,
Hao Huang
Defensor: Lightweight and Efficient Security-Enhanced Framework for Android.
TrustCom
(2014)
Wenbiao Ding
,
Xiao Xing
,
Ping Chen
,
Zhi Xin
,
Bing Mao
Automatic construction of printable return-oriented programming payload.
MALWARE
(2014)
Yibing Zhongyang
,
Zhi Xin
,
Bing Mao
,
Li Xie
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware.
AsiaCCS
(2013)
Zhi Xin
,
Huiyu Chen
,
Xinche Wang
,
Peng Liu
,
Sencun Zhu
,
Bing Mao
,
Li Xie
Replacement attacks: automatically evading behavior-based software birthmark.
Int. J. Inf. Sec.
11 (5) (2012)
Zhi Xin
,
Huiyu Chen
,
Xinche Wang
,
Peng Liu
,
Sencun Zhu
,
Bing Mao
,
Li Xie
Replacement Attacks on Behavior Based Software Birthmark.
ISC
(2011)
Zhi Xin
,
Huiyu Chen
,
Hao Han
,
Bing Mao
,
Li Xie
Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation.
ISC
(2010)
Ping Chen
,
Yi Wang
,
Zhi Xin
,
Bing Mao
,
Li Xie
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability.
ARES
(2009)