His main research concerns Computer security, Android, Malware, Operating system and Hypervisor. His Computer security research integrates issues from Short Message Service and Scalability. Xuxian Jiang usually deals with Android and limits it to topics linked to World Wide Web and Exploit.
His work on Cryptovirology and Mobile malware as part of general Malware research is often related to Call stack, thus linking different fields of science. In his research, Mobile computing and Computer virus is intimately related to Android malware, which falls under the overarching field of Mobile malware. His work on Offset, Reverse engineering and Byte as part of general Operating system research is frequently linked to Dynamic Host Configuration Protocol and Open Shortest Path First, thereby connecting diverse disciplines of science.
His scientific interests lie mostly in Computer security, Operating system, Malware, Android and Virtual machine. His research in Computer security intersects with topics in Control flow, Computer network and World Wide Web. His work on Rootkit as part of general Operating system study is frequently connected to Hypervisor, Hardware virtualization and Call stack, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.
His work on Cryptovirology and Android malware is typically connected to Static program analysis as part of general Malware study, connecting several disciplines of science. When carried out as part of a general Android research project, his work on Mobile malware is frequently linked to work in Phone, therefore connecting diverse disciplines of study. His study in Embedded system is interdisciplinary in nature, drawing from both Code injection and Software.
His primary areas of investigation include Computer security, Android, World Wide Web, Malware and Mobile device. Computer security is often connected to Personalization in his work. He has included themes like Virtual machine, Information sensitivity and Internet privacy in his Android study.
His World Wide Web research is multidisciplinary, incorporating perspectives in Credential, Static analysis and Login. In general Malware, his work in Cryptovirology and Mobile malware is often linked to Static program analysis linking many areas of study. His Rendering study combines topics in areas such as Embedded system and Operating system.
Xuxian Jiang mainly focuses on Computer security, Android, World Wide Web, Mobile device and Malware. In the field of Computer security, his study on Cyber-collection overlaps with subjects such as Static program analysis. His work on Mobile malware as part of his general Android study is frequently connected to Repackaging, thereby bridging the divide between different branches of science.
His primary area of study in Malware is in the field of Cryptovirology. His work carried out in the field of Internet privacy brings together such families of science as Short Message Service and Access control. Xuxian Jiang combines subjects such as Scalability, Computer network and Feature vector with his study of Search algorithm.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Dissecting Android Malware: Characterization and Evolution
Yajin Zhou;Xuxian Jiang.
ieee symposium on security and privacy (2012)
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
Yajin Zhou;Zhi Wang;Wu Zhou;Xuxian Jiang.
network and distributed system security symposium (2012)
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction
Xuxian Jiang;Xinyuan Wang;Dongyan Xu.
ACM Transactions on Information and System Security (2010)
RiskRanker: scalable and accurate zero-day android malware detection
Michael Grace;Yajin Zhou;Qiang Zhang;Shihong Zou.
international conference on mobile systems, applications, and services (2012)
Detecting repackaged smartphone applications in third-party android marketplaces
Wu Zhou;Yajin Zhou;Xuxian Jiang;Peng Ning.
conference on data and application security and privacy (2012)
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
Xuxian Jiang;Xinyuan Wang;Dongyan Xu.
computer and communications security (2007)
Jump-oriented programming: a new class of code-reuse attack
Tyler Bletsch;Xuxian Jiang;Vince W. Freeh;Zhenkai Liang.
computer and communications security (2011)
Systematic Detection of Capability Leaks in Stock Android Smartphones.
Michael C. Grace;Yajin Zhou;Zhi Wang;Xuxian Jiang.
network and distributed system security symposium (2012)
Taming information-stealing smartphone applications (on Android)
Yajin Zhou;Xinwen Zhang;Xuxian Jiang;Vincent W. Freeh.
trust and trustworthy computing (2011)
Unsafe exposure analysis of mobile in-app advertisements
Michael C. Grace;Wu Zhou;Xuxian Jiang;Ahmad-Reza Sadeghi.
wireless network security (2012)
Purdue University West Lafayette
Purdue University West Lafayette
Microsoft (United States)
The Ohio State University
Google (United States)
Hong Kong Polytechnic University
North Carolina State University
Samsung (South Korea)
Purdue University West Lafayette
6crickets
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: