Morpheus: automatically generating heuristics to detect android emulators Y Jing, Z Zhao, GJ Ahn, H Hu Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 117 | 2014 |
RiskMon: Continuous and Automated Risk Assessment of Mobile Applications Y Jing, GJ Ahn, Z Zhao, H Hu Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014 | 97 | 2014 |
Towards memory safe enclave programming with rust-sgx H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 67 | 2019 |
Towards automated risk assessment and mitigation of mobile applications Y Jing, GJ Ahn, Z Zhao, H Hu IEEE Transactions on Dependable and Secure Computing 12 (5), 571-584, 2014 | 43 | 2014 |
Model-based conformance testing for android Y Jing, GJ Ahn, H Hu Advances in Information and Computer Security: 7th International Workshop on …, 2012 | 28 | 2012 |
Checking intent-based communication in android with intent space analysis Y Jing, GJ Ahn, A Doupé, JH Yi Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 26 | 2016 |
Mules, seals, and attacking tools: Analyzing 12 online marketplaces Z Zhao, M Sankaran, GJ Ahn, TJ Holt, Y Jing, H Hu IEEE Security & Privacy 14 (3), 32-43, 2016 | 15 | 2016 |
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 9 | 2020 |
TripleMon: A multi-layer security framework for mediating inter-process communication on Android Y Jing, GJ Ahn, H Hu, H Cho, Z Zhao Journal of Computer Security 24 (4), 2016 | 1 | 2016 |
Toward monitoring, assessing, and confining mobile applications in modern mobile platforms Y Jing Arizona State University, 2015 | | 2015 |