Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Michael C. Grace
@inproceedings{DBLP:conf/ccs/WuGZWJ13, author = {Lei Wu and Michael C. Grace and Yajin Zhou and Chiachih Wu and Xuxian Jiang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {The impact of vendor customizations on android security}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {623--634}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516728}, doi = {10.1145/2508859.2516728}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WuGZWJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhouZGJZ13, author = {Wu Zhou and Yajin Zhou and Michael C. Grace and Xuxian Jiang and Shihong Zou}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {Fast, scalable detection of "Piggybacked" mobile applications}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {185--196}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435377}, doi = {10.1145/2435349.2435377}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhouZGJZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/WangWGJ12, author = {Zhi Wang and Chiachih Wu and Michael C. Grace and Xuxian Jiang}, editor = {Pascal Felber and Frank Bellosa and Herbert Bos}, title = {Isolating commodity hosted hypervisors with HyperLock}, booktitle = {European Conference on Computer Systems, Proceedings of the Seventh EuroSys Conference 2012, EuroSys '12, Bern, Switzerland, April 10-13, 2012}, pages = {127--140}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2168836.2168850}, doi = {10.1145/2168836.2168850}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/WangWGJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/GraceZZZJ12, author = {Michael C. Grace and Yajin Zhou and Qiang Zhang and Shihong Zou and Xuxian Jiang}, editor = {Nigel Davies and Srinivasan Seshan and Lin Zhong}, title = {RiskRanker: scalable and accurate zero-day android malware detection}, booktitle = {The 10th International Conference on Mobile Systems, Applications, and Services, MobiSys'12, Ambleside, United Kingdom - June 25 - 29, 2012}, pages = {281--294}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2307636.2307663}, doi = {10.1145/2307636.2307663}, timestamp = {Thu, 31 Oct 2019 15:55:26 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/GraceZZZJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GraceZWJ12, author = {Michael C. Grace and Yajin Zhou and Zhi Wang and Xuxian Jiang}, title = {Systematic Detection of Capability Leaks in Stock Android Smartphones}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/systematic-detection-capability-leaks-stock-android-smartphones}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GraceZWJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GraceZJS12, author = {Michael C. Grace and Wu Zhou and Xuxian Jiang and Ahmad{-}Reza Sadeghi}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Unsafe exposure analysis of mobile in-app advertisements}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {101--112}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185464}, doi = {10.1145/2185448.2185464}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GraceZJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWBSGJ11, author = {Jinku Li and Zhi Wang and Tyler K. Bletsch and Deepa Srinivasan and Michael C. Grace and Xuxian Jiang}, title = {Comprehensive and Efficient Protection of Kernel Control Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {4}, pages = {1404--1417}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2011.2159712}, doi = {10.1109/TIFS.2011.2159712}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiWBSGJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiakhGJ10, author = {Siarhei Liakh and Michael C. Grace and Xuxian Jiang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Analyzing and improving Linux kernel memory protection: a model checking approach}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {271--280}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920301}, doi = {10.1145/1920261.1920301}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiakhGJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/LiWJGB10, author = {Jinku Li and Zhi Wang and Xuxian Jiang and Michael C. Grace and Sina Bahram}, editor = {Christine Morin and Gilles Muller}, title = {Defeating return-oriented rootkits with "\emph{Return-Less}" kernels}, booktitle = {European Conference on Computer Systems, Proceedings of the 5th European conference on Computer systems, EuroSys 2010, Paris, France, April 13-16, 2010}, pages = {195--208}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755913.1755934}, doi = {10.1145/1755913.1755934}, timestamp = {Wed, 28 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/LiWJGB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GraceWSLJLL10, author = {Michael C. Grace and Zhi Wang and Deepa Srinivasan and Jinku Li and Xuxian Jiang and Zhenkai Liang and Siarhei Liakh}, editor = {Sushil Jajodia and Jianying Zhou}, title = {Transparent Protection of Commodity {OS} Kernels Using Hardware Virtualization}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {162--180}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_10}, doi = {10.1007/978-3-642-16161-2\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/GraceWSLJLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iticse/StallmannBRBGH07, author = {Matthias F. Stallmann and Suzanne Balik and Robert D. Rodman and Sina Bahram and Michael C. Grace and Susan D. High}, editor = {Janet M. Hughes and D. Ramanee Peiris and Paul T. Tymann}, title = {ProofChecker: an accessible environment for automata theory correctness proofs}, booktitle = {Proceedings of the 12th Annual {SIGCSE} Conference on Innovation and Technology in Computer Science Education, ITiCSE 2007, Dundee, Scotland, UK, June 25-27, 2007}, pages = {48--52}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1268784.1268801}, doi = {10.1145/1268784.1268801}, timestamp = {Tue, 09 Mar 2021 15:32:11 +0100}, biburl = {https://dblp.org/rec/conf/iticse/StallmannBRBGH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.