Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. Y Zhou, Z Wang, W Zhou, X Jiang NDSS 25 (4), 50-52, 2012 | 1243 | 2012 |
Detecting repackaged smartphone applications in third-party android marketplaces W Zhou, Y Zhou, X Jiang, P Ning Proceedings of the second ACM conference on Data and Application Security …, 2012 | 898 | 2012 |
Unsafe exposure analysis of mobile in-app advertisements MC Grace, W Zhou, X Jiang, AR Sadeghi Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 712 | 2012 |
Deep ground truth analysis of current android malware F Wei, Y Li, S Roy, X Ou, W Zhou Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017 | 545 | 2017 |
Fast, scalable detection of" piggybacked" mobile applications W Zhou, Y Zhou, M Grace, X Jiang, S Zou Proceedings of the third ACM conference on Data and application security and …, 2013 | 322 | 2013 |
AppInk: watermarking android apps for repackaging deterrence W Zhou, X Zhang, X Jiang Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 163 | 2013 |
{EASEAndroid}: Automatic Policy Analysis and Refinement for Security Enhanced Android via {Large-Scale}{Semi-Supervised} Learning R Wang, W Enck, D Reeves, X Zhang, P Ning, D Xu, W Zhou, AM Azab 24th USENIX Security Symposium (USENIX Security 15), 351-366, 2015 | 96 | 2015 |
Always up-to-date: scalable offline patching of vm images in a compute cloud W Zhou, P Ning, X Zhang, G Ammons, R Wang, V Bala Proceedings of the 26th annual computer security applications conference …, 2010 | 68 | 2010 |
Divilar: Diversifying intermediate language for anti-repackaging on android platform W Zhou, Z Wang, Y Zhou, X Jiang Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014 | 61 | 2014 |
Method and system for implementing watchpoints Z Wu, DE Ren, HB Peng, JD Sun US Patent App. 11/944,703, 2008 | 30 | 2008 |
Android malware development on public malware scanning platforms: A large-scale data-driven study H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, S Chari, C Zhang 2016 IEEE International Conference on Big Data (Big Data), 1090-1099, 2016 | 28 | 2016 |
Learning from big malwares L Song, H Huang, W Zhou, W Wu, Y Zhang Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems, 1-8, 2016 | 17 | 2016 |
A large-scale study of android malware development phenomenon on public malware submission and scanning platform H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, I Molloy, S Chari, ... IEEE Transactions on Big Data 7 (2), 255-270, 2018 | 15 | 2018 |
Slembunk: An evolving Android Trojan family targeting users of worldwide banking apps W Zhou, Z Chen, J Su, J Xie, H Huang Retrieved from FireEye: https://www. fireeye. com/blog/threat-research/2015 …, 2015 | 3 | 2015 |
System and method for program security protection W Zhou US Patent 10,089,448, 2018 | 2 | 2018 |
Repackaged smartphone applications: Threats and defenses W Zhou North Carolina State University, 2013 | 2 | 2013 |
System and method for program security protection W Zhou US Patent 10,853,457, 2020 | | 2020 |
Unsafe Exposure Analysis of Mobile In-App Advertisements X Jiang, M Grace, AR Sadeghi, W Zhou ACM, 2012 | | 2012 |