• 7222 Citations
  • 40 h-Index
19992020

Research output per year

If you made any changes in Pure these will be visible here soon.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects

Research Output

  • 7222 Citations
  • 40 h-Index
  • 73 Conference contribution
  • 24 Article
  • 2 Chapter

TruZ-view: Developing trustZone user interface for mobile oS using delegation integration model

Ying, K., Thavai, P. & Du, W., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 1-12 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
  • TruZ-Droid: Integrating TrustZone with mobile operating system

    Ying, K., Ahlawat, A., Alsharifi, B., Jiang, Y., Thavai, P. & Du, W., Jun 10 2018, MobiSys 2018 - Proceedings of the 16th ACM International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 14-27 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 5 Scopus citations

    Harvesting inconsistent security configurations in custom android ROMs via differential analysis

    Aafer, Y., Zhang, X. & Du, W., Jan 1 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 1153-1168 16 p. (Proceedings of the 25th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Hey, you, get off of my image: Detecting data residue in android images

    Zhang, X., Aafer, Y., Ying, K. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer Verlag, Vol. 9878 LNCS. p. 401-421 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 3 Scopus citations

    Intentio ex machina: Android intent access control via an extensible application hook

    Yagemann, C. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer Verlag, Vol. 9878 LNCS. p. 383-400 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1 Scopus citations