BibTeX records: Michael C. Grace

download as .bib file

@inproceedings{DBLP:conf/ccs/WuGZWJ13,
  author       = {Lei Wu and
                  Michael C. Grace and
                  Yajin Zhou and
                  Chiachih Wu and
                  Xuxian Jiang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {The impact of vendor customizations on android security},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {623--634},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516728},
  doi          = {10.1145/2508859.2516728},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WuGZWJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhouZGJZ13,
  author       = {Wu Zhou and
                  Yajin Zhou and
                  Michael C. Grace and
                  Xuxian Jiang and
                  Shihong Zou},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {Fast, scalable detection of "Piggybacked" mobile applications},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {185--196},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435377},
  doi          = {10.1145/2435349.2435377},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhouZGJZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/WangWGJ12,
  author       = {Zhi Wang and
                  Chiachih Wu and
                  Michael C. Grace and
                  Xuxian Jiang},
  editor       = {Pascal Felber and
                  Frank Bellosa and
                  Herbert Bos},
  title        = {Isolating commodity hosted hypervisors with HyperLock},
  booktitle    = {European Conference on Computer Systems, Proceedings of the Seventh
                  EuroSys Conference 2012, EuroSys '12, Bern, Switzerland, April 10-13,
                  2012},
  pages        = {127--140},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2168836.2168850},
  doi          = {10.1145/2168836.2168850},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/WangWGJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/GraceZZZJ12,
  author       = {Michael C. Grace and
                  Yajin Zhou and
                  Qiang Zhang and
                  Shihong Zou and
                  Xuxian Jiang},
  editor       = {Nigel Davies and
                  Srinivasan Seshan and
                  Lin Zhong},
  title        = {RiskRanker: scalable and accurate zero-day android malware detection},
  booktitle    = {The 10th International Conference on Mobile Systems, Applications,
                  and Services, MobiSys'12, Ambleside, United Kingdom - June 25 - 29,
                  2012},
  pages        = {281--294},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2307636.2307663},
  doi          = {10.1145/2307636.2307663},
  timestamp    = {Thu, 31 Oct 2019 15:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/GraceZZZJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GraceZWJ12,
  author       = {Michael C. Grace and
                  Yajin Zhou and
                  Zhi Wang and
                  Xuxian Jiang},
  title        = {Systematic Detection of Capability Leaks in Stock Android Smartphones},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/systematic-detection-capability-leaks-stock-android-smartphones},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GraceZWJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GraceZJS12,
  author       = {Michael C. Grace and
                  Wu Zhou and
                  Xuxian Jiang and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Unsafe exposure analysis of mobile in-app advertisements},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {101--112},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185464},
  doi          = {10.1145/2185448.2185464},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GraceZJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWBSGJ11,
  author       = {Jinku Li and
                  Zhi Wang and
                  Tyler K. Bletsch and
                  Deepa Srinivasan and
                  Michael C. Grace and
                  Xuxian Jiang},
  title        = {Comprehensive and Efficient Protection of Kernel Control Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {4},
  pages        = {1404--1417},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2011.2159712},
  doi          = {10.1109/TIFS.2011.2159712},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWBSGJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiakhGJ10,
  author       = {Siarhei Liakh and
                  Michael C. Grace and
                  Xuxian Jiang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Analyzing and improving Linux kernel memory protection: a model checking
                  approach},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {271--280},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920301},
  doi          = {10.1145/1920261.1920301},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiakhGJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/LiWJGB10,
  author       = {Jinku Li and
                  Zhi Wang and
                  Xuxian Jiang and
                  Michael C. Grace and
                  Sina Bahram},
  editor       = {Christine Morin and
                  Gilles Muller},
  title        = {Defeating return-oriented rootkits with "\emph{Return-Less}"
                  kernels},
  booktitle    = {European Conference on Computer Systems, Proceedings of the 5th European
                  conference on Computer systems, EuroSys 2010, Paris, France, April
                  13-16, 2010},
  pages        = {195--208},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755913.1755934},
  doi          = {10.1145/1755913.1755934},
  timestamp    = {Wed, 28 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/LiWJGB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GraceWSLJLL10,
  author       = {Michael C. Grace and
                  Zhi Wang and
                  Deepa Srinivasan and
                  Jinku Li and
                  Xuxian Jiang and
                  Zhenkai Liang and
                  Siarhei Liakh},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Transparent Protection of Commodity {OS} Kernels Using Hardware Virtualization},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {162--180},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_10},
  doi          = {10.1007/978-3-642-16161-2\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/GraceWSLJLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/StallmannBRBGH07,
  author       = {Matthias F. Stallmann and
                  Suzanne Balik and
                  Robert D. Rodman and
                  Sina Bahram and
                  Michael C. Grace and
                  Susan D. High},
  editor       = {Janet M. Hughes and
                  D. Ramanee Peiris and
                  Paul T. Tymann},
  title        = {ProofChecker: an accessible environment for automata theory correctness
                  proofs},
  booktitle    = {Proceedings of the 12th Annual {SIGCSE} Conference on Innovation and
                  Technology in Computer Science Education, ITiCSE 2007, Dundee, Scotland,
                  UK, June 25-27, 2007},
  pages        = {48--52},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1268784.1268801},
  doi          = {10.1145/1268784.1268801},
  timestamp    = {Tue, 09 Mar 2021 15:32:11 +0100},
  biburl       = {https://dblp.org/rec/conf/iticse/StallmannBRBGH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics