What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yajin Zhou
Google Scholar
ORCID:
0000-0001-7610-4736
37
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Dissecting Payload-based Transaction Phishing on Ethereum.
Zhuo Chen
Yufeng Hu
Bowen He
Dong Luo
Lei Wu
Yajin Zhou
2025
journals/compsec
Detecting DBMS bugs with context-sensitive instantiation and multi-plan execution.
Jiaqi Li
Ke Wang
Yaoguang Chen
Yajin Zhou
Lei Wu
Jiashui Wang
2025
conf/esorics
NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation.
Lin Ma
Xingwei Lin
Ziming Zhang
Yajin Zhou
2025
conf/uss
Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System.
Haochen Gong
Siyu Hong
Shenyi Yang
Rui Chang
Wenbo Shen
Ziqi Yuan
Chenyang Yu
Yajin Zhou
2025
conf/uss
Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer.
Zuchao Ma
Muhui Jiang
Feng Luo
Xiapu Luo
Yajin Zhou
2024
journals/tifs
RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping.
Xingjian Zhang
Haochen Gong
Rui Chang
Yajin Zhou
2024
conf/ccs
Toss a Fault to BpfChecker: Revealing Implementation Flaws for eBPF runtimes with Differential Fuzzing.
Chaoyuan Peng
Muhui Jiang
Lei Wu
Yajin Zhou
2024
conf/uss
DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks.
Xingkai Wang
Wenbo Shen
Yujie Bu
Jinmeng Zhou
Yajin Zhou
2023
conf/ccs
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum.
Bowen He
Yuan Chen
Zhuo Chen
Xiaohui Hu
Yufeng Hu
Lei Wu
Rui Chang
Haoyu Wang
Yajin Zhou
2023
conf/ccs
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Boyang Ma
Yilin Yang
Jinku Li
Fengwei Zhang
Wenbo Shen
Yajin Zhou
Jianfeng Ma
2023
conf/uss
MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation.
Jinyan Xu
Yiyuan Liu
Sirui He
Haoran Lin
Yajin Zhou
Cong Wang
2023
conf/sp
ViDeZZo: Dependency-aware Virtual Device Fuzzing.
Qiang Liu
Flavio Toffalini
Yajin Zhou
Mathias Payer
2023
conf/sp
When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel.
Lin Ma
Duoming Zhou
Hanjie Wu
Yajin Zhou
Rui Chang
Hao Xiong
Lei Wu
Kui Ren
2022
conf/uss
Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.
Le Yu
Yangyang Liu
Pengfei Jing
Xiapu Luo
Lei Xue
Kaifa Zhao
Yajin Zhou
Ting Wang
Guofei Gu
Sen Nie
Shi Wu
2022
conf/uss
SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
Yuan Chen
Jiaqi Li
Guorui Xu
Yajin Zhou
Zhi Wang
Cong Wang
Kui Ren
2022
conf/uss
SAID: State-aware Defense Against Injection Attacks on In-vehicle Network.
Lei Xue
Yangyang Liu
Tianqi Li
Kaifa Zhao
Jianfeng Li
Le Yu
Xiapu Luo
Yajin Zhou
Guofei Gu
2022
conf/ndss
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android.
Hao Zhou
Haoyu Wang
Xiapu Luo
Ting Chen
Yajin Zhou
Ting Wang
2021
conf/ccs
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels.
Muhui Jiang
Lin Ma
Yajin Zhou
Qiang Liu
Cen Zhang
Zhi Wang
Xiapu Luo
Lei Wu
Kui Ren
2021
conf/sp
Happer: Unpacking Android Apps via a Hardware-Assisted Approach.
Lei Xue
Hao Zhou
Xiapu Luo
Yajin Zhou
Yang Shi
Guofei Gu
Fengwei Zhang
Man Ho Au
2021
conf/esorics
Succinct Scriptable NIZK via Trusted Hardware.
Bingsheng Zhang
Yuan Chen
Jiaqi Li
Yajin Zhou
Phuc Thai
Hong-Sheng Zhou
Kui Ren
2021
conf/ndss
POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming.
Min Zheng
Xiaolong Bai
Yajin Zhou
Chao Zhang
Fuping Qu
2020
journals/tifs
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures.
Fan Zhang
Xiaofei Dong
Bolin Yang
Yajin Zhou
Kui Ren
2020
conf/ccs
Faster Secure Multiparty Computation of Adaptive Gradient Descent.
Wen-jie Lu
Yixuan Fang
Zhicong Huang
Cheng Hong
Chaochao Chen
Hunter Qu
Yajin Zhou
Kui Ren
2019
journals/tifs
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts.
Lei Xue
Chenxiong Qian
Hao Zhou
Xiapu Luo
Yajin Zhou
Yuru Shao
Alvin T. S. Chan
2019
conf/ccs
Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay.
Mengchen Cao
Xiantong Hou
Tao Wang
Hunter Qu
Yajin Zhou
Xiaolong Bai
Fuwei Wang
2019
conf/ccs
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed.
Huayi Duan
Cong Wang
Xingliang Yuan
Yajin Zhou
Qian Wang
Kui Ren
2019
conf/eurosp
Adaptive Call-Site Sensitive Control Flow Integrity.
Mustakimur Khandaker
Abu Naser
Wenqing Liu
Zhi Wang
Yajin Zhou
Yueqiang Cheng
2017
conf/uss
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART.
Lei Xue
Yajin Zhou
Ting Chen
Xiapu Luo
Guofei Gu
2015
conf/ccs
Hybrid User-level Sandboxing of Third-party Android Apps.
Yajin Zhou
Kunal Patel
Lei Wu
Zhi Wang
Xuxian Jiang
2015
conf/wisec
Harvesting developer credentials in Android apps.
Yajin Zhou
Lei Wu
Zhi Wang
Xuxian Jiang
2014
conf/ccs
ARMlock: Hardware-based Fault Isolation for ARM.
Yajin Zhou
Xiaoguang Wang
Yue Chen
Zhi Wang
2014
conf/ndss
AirBag: Boosting Smartphone Resistance to Malware Infection.
Chiachih Wu
Yajin Zhou
Kunal Patel
Zhenkai Liang
Xuxian Jiang
2013
conf/ccs
The impact of vendor customizations on android security.
Lei Wu
Michael C. Grace
Yajin Zhou
Chiachih Wu
Xuxian Jiang
2013
conf/ndss
Detecting Passive Content Leaks and Pollution in Android Applications.
Yajin Zhou
Xuxian Jiang
2012
conf/sp
Dissecting Android Malware: Characterization and Evolution.
Yajin Zhou
Xuxian Jiang
2012
conf/ndss
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.
Yajin Zhou
Zhi Wang
Wu Zhou
Xuxian Jiang
2012
conf/ndss
Systematic Detection of Capability Leaks in Stock Android Smartphones.
Michael C. Grace
Yajin Zhou
Zhi Wang
Xuxian Jiang
Coauthors
Abu Naser
(1)
Alvin T. S. Chan
(1)
Bingsheng Zhang
(1)
Bolin Yang
(1)
Bowen He
(2)
Boyang Ma
(1)
Cen Zhang
(1)
Chao Zhang
(1)
Chaochao Chen
(1)
Chaoyuan Peng
(1)
Cheng Hong
(1)
Chenxiong Qian
(1)
Chenyang Yu
(1)
Chiachih Wu
(2)
Cong Wang
(3)
Dong Luo
(1)
Duoming Zhou
(1)
Fan Zhang
(1)
Feng Luo
(1)
Fengwei Zhang
(2)
Flavio Toffalini
(1)
Fuping Qu
(1)
Fuwei Wang
(1)
Guofei Gu
(4)
Guorui Xu
(1)
Hanjie Wu
(1)
Hao Xiong
(1)
Hao Zhou
(3)
Haochen Gong
(2)
Haoran Lin
(1)
Haoyu Wang
(2)
Hong-Sheng Zhou
(1)
Huayi Duan
(1)
Hunter Qu
(2)
Jianfeng Li
(1)
Jianfeng Ma
(1)
Jiaqi Li
(3)
Jiashui Wang
(1)
Jinku Li
(1)
Jinmeng Zhou
(1)
Jinyan Xu
(1)
Kaifa Zhao
(2)
Ke Wang
(1)
Kui Ren
(7)
Kunal Patel
(2)
Le Yu
(2)
Lei Wu
(9)
Lei Xue
(5)
Lin Ma
(3)
Man Ho Au
(1)
Mathias Payer
(1)
Mengchen Cao
(1)
Michael C. Grace
(2)
Min Zheng
(1)
Muhui Jiang
(3)
Mustakimur Khandaker
(1)
Pengfei Jing
(1)
Phuc Thai
(1)
Qian Wang
(1)
Qiang Liu
(2)
Rui Chang
(4)
Sen Nie
(1)
Shenyi Yang
(1)
Shi Wu
(1)
Sirui He
(1)
Siyu Hong
(1)
Tao Wang
(1)
Tianqi Li
(1)
Ting Chen
(2)
Ting Wang
(2)
Wen-jie Lu
(1)
Wenbo Shen
(3)
Wenqing Liu
(1)
Wu Zhou
(1)
Xiantong Hou
(1)
Xiaofei Dong
(1)
Xiaoguang Wang
(1)
Xiaohui Hu
(1)
Xiaolong Bai
(2)
Xiapu Luo
(8)
Xingjian Zhang
(1)
Xingkai Wang
(1)
Xingliang Yuan
(1)
Xingwei Lin
(1)
Xuxian Jiang
(8)
Yajin Zhou
(37)
Yang Shi
(1)
Yangyang Liu
(2)
Yaoguang Chen
(1)
Yilin Yang
(1)
Yixuan Fang
(1)
Yiyuan Liu
(1)
Yuan Chen
(3)
Yue Chen
(1)
Yueqiang Cheng
(1)
Yufeng Hu
(2)
Yujie Bu
(1)
Yuru Shao
(1)
Zhenkai Liang
(1)
Zhi Wang
(8)
Zhicong Huang
(1)
Zhuo Chen
(2)
Ziming Zhang
(1)
Ziqi Yuan
(1)
Zuchao Ma
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to