Wang, Xueqiang; Wang, Yuewu; Liu, Limin; Lei, Lingguang; Jing, Jiwu WrapDroid: flexible and fine-grained scheme towards regulating behaviors of android apps. (English) Zbl 06481220 Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, South Korea, December 3–5, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-15942-3/pbk; 978-3-319-15943-0/ebook). Lecture Notes in Computer Science 8949, 255-268 (2015). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{X. Wang} et al., Lect. Notes Comput. Sci. 8949, 255--268 (2015; Zbl 06481220) Full Text: DOI
Zhang, Zhongwen; Wang, Yuewu; Jing, Jiwu; Wang, Qiongxiao; Lei, Lingguang Once root always a threat: analyzing the security threats of Android permission system. (English) Zbl 1337.94090 Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 354-369 (2014). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{Z. Zhang} et al., Lect. Notes Comput. Sci. 8544, 354--369 (2014; Zbl 1337.94090) Full Text: DOI
Nie, Xiaofeng; Jing, Jiwu; Wang, Yuewu A novel contagion-like patch dissemination mechanism against peer-to-peer file-sharing worms. (English) Zbl 1281.94047 Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 313-323 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{X. Nie} et al., Lect. Notes Comput. Sci. 6151, 313--323 (2010; Zbl 1281.94047) Full Text: DOI