Yiming Jing
Yiming Jing
Baidu USA
Verified email at asu.edu - Homepage
Title
Cited by
Cited by
Year
Morpheus: automatically generating heuristics to detect android emulators
Y Jing, Z Zhao, GJ Ahn, H Hu
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
842014
RiskMon: Continuous and Automated Risk Assessment of Mobile Applications
Y Jing, GJ Ahn, Z Zhao, H Hu
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
752014
Towards automated risk assessment and mitigation of mobile applications
Y Jing, GJ Ahn, Z Zhao, H Hu
IEEE Transactions on Dependable and Secure Computing 12 (5), 571-584, 2014
272014
Model-based conformance testing for android
Y Jing, GJ Ahn, H Hu
International Workshop on Security, 1-18, 2012
212012
Checking intent-based communication in android with intent space analysis
Y Jing, GJ Ahn, A Doupé, JH Yi
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
172016
Mules, seals, and attacking tools: Analyzing 12 online marketplaces
Z Zhao, M Sankaran, GJ Ahn, TJ Holt, Y Jing, H Hu
IEEE Security & Privacy 14 (3), 32-43, 2016
102016
Towards memory safe enclave programming with rust-sgx
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
72019
TripleMon: A multi-layer security framework for mediating inter-process communication on Android
Y Jing, GJ Ahn, H Hu, H Cho, Z Zhao
Journal of Computer Security 24 (4), 2016
12016
Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave Development
P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing
arXiv preprint arXiv:2005.04367, 2020
2020
Toward Monitoring, Assessing, and Confining Mobile Applications in Modern Mobile Platforms
Y Jing
Arizona State University, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–10