当前位置: X-MOL首页全球导师 国内导师 › 周亚金

个人简介

周亚金是浙江大学“百人计划”研究员。2015年北卡州立大学获得博士学位。 招收博士/硕士/访问学生,要求有比较好的系统/安全功底,对编程和系统搭建有浓厚兴趣。 更多信息请访问: https://yajin.org 教学与课程 操作系统: 2018秋冬学期 信息安全综合实验:2019夏学期

研究领域

操作系统安全 嵌入式系统安全 软件安全,二进制分析 CPU体系结构安全

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

2019 [9]Different is Good:Detecting the Use of Uninitialized Variables through Differential Replay[Paper] Mengchen Cao,Xiantong Hou,Tao Wang,Hunter Qu,Yajin Zhou,Xiaolong Bai,Fuwei Wang Proceedings of the 26th ACM Conference on Computer and Communications(ACM CCS 2019) [8]LightBox:Full-stack Protected Stateful Middlebox at Lightning Speed[Paper] Huayi Duan,Cong Wang,Xingliang Yuan,Yajin Zhou,Qian Wang,Kui Ren Proceedings of the 26th ACM Conference on Computer and Communications(ACM CCS 2019) [7]Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum[Paper] Zhen Cheng*,Xinrui Hou*,Runhuai Li,Yajin Zhou,Xiapu Luo,Jinku Li,Kui Ren Proceedings of the 22nd International Symposium on Research in Attacks,Intrusions and Defenses(RAID 2019) (*The names of the first two authors are in alphabetical order) [6]SPEED:Accelerating Enclave Applications via Secure Deduplication[Paper] Helei Cui,Huayi Duan,Zhan Qin,Cong Wang,Yajin Zhou Proceedings of the 39th IEEE International Conference on Distributed Computing Systems(IEEE ICDCS 2019) [5]Dating with Scambots:Understanding the Ecosystem of Fraudulent Dating Applications[Paper] Yangyu Hu,Haoyu Wang,Yajin Zhou,Yao Guo,Li Li,Bingxuan Luo,Fangren Xu IEEE Transactions on Dependable and Secure Computing(TDSC) [4]Adaptive Call-site Sensitive Control Flow Integrity(Best Paper Award)[Paper|Code] Mustakimur Khandaker,Abu Naser,Wenqing Liu,Zhi Wang,Yajin Zhou,Yueqiang Cheng Proceedings of the 4th IEEE European Symposium on Security and Privacy(IEEE EuroS&P 2019) [3]NDroid:Towards Tracking Information Flows Across Multiple Android Contexts[Paper] Lei Xue,Chenxiong Qian,Hao Zhou,Xiapu Luo,Yajin Zhou,Yuru Shao and Alvin T.S.Chan IEEE Transactions on Information Forensics&Security(TIFS),Volume:14,Issue:3,pp.814–828,March 2019 2018 [2]Towards Privacy-Preserving Malware Detection Systems for Android(Best Paper Award)[Paper] Helei Cui,Yajin Zhou,Cong Wang,Qi Li,Kui Ren Proceedings of the 24th International Conference on Parallel and Distributed Systems(IEEE ICPADS 2018) [1]AdCapsule:Practical Confinement of Advertisements in Android Applications[Paper] Xiaonan Zhu,Jinku Li,Yajin Zhou,Jianfeng Ma IEEE Transactions on Dependable and Secure Computing(TDSC) Before 2018 2017 [21]When Program Analysis Meets Mobile Security:An Industrial Study of Misusing Android Internet Sockets[Paper] Wenqi Bu,Minhui Xue,Lihua Xu,Yajin Zhou,Zhushou Tang,Tao Xie Proceedings of the 11th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering(ESEC/FSE 2017) [20]Malton:Towards On-Device Non-Invasive Mobile Malware Analysis for ART[Paper] Lei Xue,Yajin Zhou,Ting Chen,Xiapu Luo,Guofei Gu Proceedings of the 26th USENIX Security Symposium(USENIX Security 2017) [19]Design and Implementation of SecPod,A Framework for Virtualization-based Security Systems[Paper] Xiaoguang Wang,Yong Qi,Zhi Wang,Yue Chen,Yajin Zhou IEEE Transactions on Dependable and Secure Computing(TDSC) 2016 [18]Blender:Self-randomizing Address Space Layout for Android Apps[Paper] Mingshen Sun,John C.S.Lui,Yajin Zhou Proceedings of the the 19th International Symposium on Research in Attacks,Intrusions and Defenses(RAID 2016) [17]AppShell:Making Data Protection Practical for Lost or Stolen Android Devices[Paper] Yajin Zhou,Kapil Singh,Xuxian Jiang Proceedings of IEEE/IFIP Network Operations and Management Symposium(NOMS 2016) 2015 [16]SecPod:a Framework for Virtualization-based Security Systems[Paper] Xiaoguang Wang,Yue Chen,Zhi Wang,Yong Qi,Yajin Zhou Proceedings of the 2015 USENIX Annual Technical Conference(USENIX ATC 2015) [15]Harvesting Developer Credentials in Android Apps[Paper] Yajin Zhou,Lei Wu,Zhi Wang,Xuxian Jiang Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks(WiSec 2015) [14]Hybrid User-level Sandboxing of Third-party Android Apps[Paper] Yajin Zhou,Kunal Patel,Lei Wu,Zhi Wang,Xuxian Jiang Proceedings of the 10th ACM Symposium on Information,Computer and Communications Security(ASIACCS 2015) 2014 [13]ARMlock:Hardware-based Fault Isolation for ARM[Paper|Slides] Yajin Zhou,Xiaoguang Wang,Yue Chen,Zhi Wang Proceedings of the 21st ACM Conference on Computer and Communications Security(CCS 2014) [12]Owner-centric Protection of Unstructured Data on Smartphones[Paper] Yajin Zhou,Kapil Singh,Xuxian Jiang Proceedings of the 7th International Conference on Trust and Trustworthy Computing(TRUST 2014) [11]AirBag:Boosting Smartphone Resistance to Malware Infection[Paper] Chiachih Wu,Yajin Zhou,Kunal Patel,Zhenkai Liang,Xuxian Jiang Proceedings of the 21st Network and Distributed System Security Symposium(NDSS 2014) [10]DIVILAR:Diversifying Intermediate Language for Anti-Repackaging on Android Platform[Paper] Wu Zhou,Zhi Wang,Yajin Zhou,Xuxian Jiang Proceedings of the 4th ACM Conference on Data and Application Security and Privacy(CODASPY 2014) 2013 [9]The Impact of Vendor Customizations on Android Security[Paper] Lei Wu,Michael Grace,Yajin Zhou,Chiachih Wu,Xuxian Jiang Proceedings of the 20th ACM Conference on Computer and Communications Security(CCS 2013) [8]Fast,Scalable Detection of'Piggybacked'Mobile Applications(Best Paper Award)[Paper] Wu Zhou,Yajin Zhou,Michael Grace,Xuxian Jiang,Shihong Zou Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy(CODASPY 2013) [7]Detecting Passive Content Leaks and Pollution in Android Applications[Paper|Slides] Yajin Zhou,Xuxian Jiang Proceedings of the 20th Network and Distributed System Security Symposium(NDSS 2013) 2012 [6]RiskRanker:Scalable and Accurate Zero-day Android Malware Detection[Paper] Michael Grace*,Yajin Zhou*,Qiang Zhang,Shihong Zou,Xuxian Jiang Proceedings of the 10th International Conference on Mobile Systems,Applications and Services(MobiSys 2012) (*The names of the first two authors are in alphabetical order) [5]Dissecting Android Malware:Characterization and Evolution[Paper] Yajin Zhou,Xuxian Jiang Proceedings of the 33rd IEEE Symposium on Security and Privacy(Oakland 2012) (Our dataset is released atAndroid Malware Genome Project) [4]DroidMOSS:Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces(Best Paper Award)[Paper] Wu Zhou,Yajin Zhou,Xuxian Jiang,Peng Ning Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy(CODASPY 2012) [3]Hey,You,Get off of My Market:Detecting Malicious Apps in Official and Alternative Android Markets[Paper] Yajin Zhou,Zhi Wang,Wu Zhou and Xuxian Jiang Proceedings of the 19th Network and Distributed System Security Symposium(NDSS 2012) [2]Systematic Detection of Capability Leaks in Stock Android Smartphones[Paper|Demo Video] Michael Grace,Yajin Zhou,Zhi Wang and Xuxian Jiang Proceedings of the 19th Network and Distributed System Security Symposium(NDSS 2012) 2011 [1]Taming Information-Stealing Smartphone Applications(on Android)[Paper] Yajin Zhou,Xinwen Zhang,Xuxian Jiang,Vince W.Freeh Proceedings of the 4th International Conference on Trust and Trustworthy Computing(TRUST 2011)

推荐链接
down
wechat
bug