Yiming Jing
Yiming Jing
Baidu USA
Verified email at asu.edu - Homepage
TitleCited byYear
Morpheus: automatically generating heuristics to detect android emulators
Y Jing, Z Zhao, GJ Ahn, H Hu
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
732014
RiskMon: Continuous and Automated Risk Assessment of Mobile Applications
Y Jing, GJ Ahn, Z Zhao, H Hu
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
662014
Towards automated risk assessment and mitigation of mobile applications
Y Jing, GJ Ahn, Z Zhao, H Hu
IEEE Transactions on Dependable and Secure Computing 12 (5), 571-584, 2014
252014
Model-based conformance testing for android
Y Jing, GJ Ahn, H Hu
International Workshop on Security, 1-18, 2012
212012
Checking intent-based communication in android with intent space analysis
Y Jing, GJ Ahn, A Doupé, JH Yi
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
152016
Mules, seals, and attacking tools: Analyzing 12 online marketplaces
Z Zhao, M Sankaran, GJ Ahn, TJ Holt, Y Jing, H Hu
IEEE Security & Privacy 14 (3), 32-43, 2016
82016
Towards Memory Safe Enclave Programming with Rust-SGX
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
22019
TripleMon: A multi-layer security framework for mediating inter-process communication on Android
Y Jing, GJ Ahn, H Hu, H Cho, Z Zhao
Journal of Computer Security 24 (4), 2016
12016
Toward Monitoring, Assessing, and Confining Mobile Applications in Modern Mobile Platforms
Y Jing
Arizona State University, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–9