Heng Yin
Heng Yin
Professor of Computer Science, UC Riverside
Verified email at cs.ucr.edu - Homepage
Title
Cited by
Cited by
Year
Panorama: capturing system-wide information flow for malware detection and analysis
H Yin, D Song, M Egele, C Kruegel, E Kirda
Proceedings of the 14th ACM conference on Computer and communications …, 2007
9592007
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
International Conference on Information Systems Security, 1-25, 2008
8742008
DroidScope: Seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis
LK Yan, H Yin
Proceedings of the 21st USENIX Security Symposium, 2012
8672012
DroidAPIMiner: Mining API-level features for robust malware detection in Android
Y Aafer, W Du, H Yin
International conference on security and privacy in communication systems …, 2013
5952013
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
J Caballero, H Yin, Z Liang, D Song
Proceedings of the 14th ACM conference on Computer and communications …, 2007
4612007
Renovo: A hidden code extractor for packed executables
MG Kang, P Poosankam, H Yin
Proceedings of the 2007 ACM workshop on Recurring malcode, 46-53, 2007
3792007
Semantics-aware Android malware classification using weighted contextual API dependency graphs
M Zhang, Y Duan, H Yin, Z Zhao
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
3782014
Dynamic spyware analysis
M Egele, C Kruegel, E Kirda, H Yin, D Song
Advanced Computing Systems Professional and Technical Association, 2007
3032007
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection, 65-88, 2008
2552008
Attacks on WebView in the Android system
T Luo, H Hao, W Du, Y Wang, H Yin
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
2322011
HookFinder: Identifying and understanding malware hooking behaviors
H Yin, Z Liang, D Song
NDSS, 2008
1832008
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
X Xu, C Liu, Q Feng, H Yin, L Song, D Song
ACM Conference on Computer and Communications Security (CCS), 2017
1672017
Code injection attacks on HTML5-based mobile apps: Characterization, detection and mitigation
X Jin, X Hu, K Ying, W Du, H Yin, GN Peri
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1642014
AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.
M Zhang, H Yin
Network and Distributed System Security Symposium (NDSS), 2014
1462014
Scalable graph-based bug search for firmware images
Q Feng, R Zhou, C Xu, Y Cheng, B Testa, H Yin
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1442016
Emulating emulation-resistant malware
MG Kang, H Yin, S Hanna, S McCamant, D Song
Proceedings of the 1st ACM workshop on Virtual machine security, 11-22, 2009
1332009
vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.
A Prakash, X Hu, H Yin
Network and Distributed System Security Symposium (NDSS), 2015
1022015
BitScope: Automatically dissecting malicious binaries
D Brumley, C Hartwig, MG Kang, Z Liang, J Newsome, P Poosankam, ...
Technical Report CS-07-133, School of Computer Science, Carnegie Mellon …, 2007
1012007
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform
A Henderson, A Prakash, LK Yan, X Hu, X Wang, R Zhou, H Yin
Proceedings of the 2014 International Symposium on Software Testing and …, 2014
992014
V2E: Combining hardware virtualization and software emulation for transparent and extensible malware analysis
LK Yan, M Jayachandra, M Zhang, H Yin
Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012
862012
The system can't perform the operation now. Try again later.
Articles 1–20