Follow
runqing yang
runqing yang
Verified email at zju.edu.cn
Title
Cited by
Cited by
Year
Vetting SSL usage in applications with SSLINT
B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, R Yang, Z Zhang
2015 IEEE Symposium on Security and Privacy, 519-534, 2015
802015
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency
C Xiong, T Zhu, W Dong, L Ruan, R Yang, Y Cheng, Y Chen, S Cheng, ...
IEEE Transactions on Dependable and Secure Computing 19 (1), 551-565, 2020
692020
Threat detection and investigation with system-level provenance graphs: a survey
Z Li, QA Chen, R Yang, Y Chen, W Ruan
Computers & Security 106, 102282, 2021
612021
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.
R Yang, S Ma, H Xu, X Zhang, Y Chen
NDSS, 2020
392020
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows
R Yang, X Chen, H Xu, Y Cheng, C Xiong, L Ruan, M Kavousi, Z Li, L Xu, ...
IEEE Transactions on Dependable and Secure Computing 19 (3), 1621-1638, 2020
162020
Automatic benchmark generation framework for malware detection
G Liang, J Pang, Z Shan, R Yang, Y Chen
Security and Communication Networks 2018 (1), 4947695, 2018
102018
SemFlow: Accurate Semantic Identification from Low-Level System Data
M Kavousi, R Yang, S Ma, Y Chen
Security and Privacy in Communication Networks: 17th EAI International …, 2021
12021
SSLINT: A Tool for Detecting TLS Certificate Validation Vulnerabilities
B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, C Xiong, R Yang, ...
2016
A First Look at Evasion against Provenance Graph-based Threat Detection
Z Li, R Yang, QA Chen, Y Chen
The system can't perform the operation now. Try again later.
Articles 1–9