Biblio

Export 14 results:
Sort by:
Filters: Author is Yao, Danfeng Daphne  [Clear All Filters]
2017
Bosu, A., F. Liu, G. Wang, and D. D. Yao, "Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications", Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, Abu Dhabi, United Arab EmiratesNew York, New York, USA, ACM Press, pp. 71 - 85, 2017.
2015
Shu, X., D. D. Yao, and B. Ryder, "A Formal Framework for Program Anomaly Detection", 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan, 11/2015.
Shu, X., D. D. Yao, and N. Ramakrishnan, "Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths", 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), Denver, Colorado, ACM, 10/2015.
Xu, K., K. Tian, D. D. Yao, and B. Ryder, "Probabilistic Program Modeling for High-Precision Anomaly Classification", 2015 IEEE Computer Security Foundations Symposium (CSF), Verona, Italy, IEEE, 07/2015.
Dou, Y., C. Zeng, Y. Yang, and D. D. Yao, "MadeCR: Correlation-based Malware Detection for Cognitive Radio", IEEE Conference on Computer Communications (INFOCOM), Hong Kong, IEEE, 04/2015.
Liu, F., X. Shu, D. D. Yao, and A. Butt, "Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce", ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, ACM, 03/2015.
Shu, X., J. Zhang, D. D. Yao, and W. - C. Feng, "Fast Detection of Transformed Data Leaks", IEEE Transactions on Information Forensics & Security (TIFS), 2015.
2014
Zhang, H., D. D. Yao, and N. Ramakrishnan, "Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery", he 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, 06/2014.
Almohri, H., D. D. Yao, and D. Kafura, "DroidBarrier: Know What is Executing on Your Android", ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, ACM, 03/2014.
Almohri, H., D. D. Yao, and D. Kafura, "Process Authentication for High System Assurance", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 11, no. 2, 03/2014.
Zhang, H., D. D. Yao, and N. Ramakrishnan, "Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery", Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, New York, NY, USA, ACM, pp. 39–50, 2014.
2013
Zhang, H., D. D. Yao, and N. Ramakrishnan, "POSTER: A semantic-aware approach to reasoning about network traffic relations", Proceedings of the 2013 ACM SIGSAC conference on Computer &\#38; communications security, New York, NY, USA, ACM, pp. 1375–1378, 2013.