Yiming Jing
Yiming Jing
Baidu USA
Verified email at - Homepage
Cited by
Cited by
Morpheus: automatically generating heuristics to detect android emulators
Y Jing, Z Zhao, GJ Ahn, H Hu
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
RiskMon: Continuous and Automated Risk Assessment of Mobile Applications
Y Jing, GJ Ahn, Z Zhao, H Hu
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
Towards memory safe enclave programming with rust-sgx
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Towards automated risk assessment and mitigation of mobile applications
Y Jing, GJ Ahn, Z Zhao, H Hu
IEEE Transactions on Dependable and Secure Computing 12 (5), 571-584, 2014
Model-based conformance testing for android
Y Jing, GJ Ahn, H Hu
Advances in Information and Computer Security: 7th International Workshop on …, 2012
Checking intent-based communication in android with intent space analysis
Y Jing, GJ Ahn, A Doupé, JH Yi
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Mules, seals, and attacking tools: Analyzing 12 online marketplaces
Z Zhao, M Sankaran, GJ Ahn, TJ Holt, Y Jing, H Hu
IEEE Security & Privacy 14 (3), 32-43, 2016
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development
P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
TripleMon: A multi-layer security framework for mediating inter-process communication on Android
Y Jing, GJ Ahn, H Hu, H Cho, Z Zhao
Journal of Computer Security 24 (4), 2016
Toward monitoring, assessing, and confining mobile applications in modern mobile platforms
Y Jing
Arizona State University, 2015
The system can't perform the operation now. Try again later.
Articles 1–10