Author image not provided
 Hao Shi

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.00
Citation Count5
Publication count5
Publication years2012-2017
Available for download3
Average downloads per article70.67
Downloads (cumulative)212
Downloads (12 Months)95
Downloads (6 Weeks)30
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


5 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 5 of 5
Sort by:

1 published by ACM
December 2017 ACM Transactions on Privacy and Security (TOPS): Volume 21 Issue 1, January 2018
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 28,   Downloads (12 Months): 44,   Downloads (Overall): 44

Full text available: PDFPDF
Malware analysis relies heavily on the use of virtual machines (VMs) for functionality and safety. There are subtle differences in operation between virtual and physical machines. Contemporary malware checks for these differences and changes its behavior when it detects a VM presence. These anti-VM techniques hinder malware analysis. Existing research ...
Keywords: assembly, virtual machine testing, reverse engineering, System security

2 published by ACM
April 2017 SAC '17: Proceedings of the Symposium on Applied Computing
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 41,   Downloads (Overall): 41

Full text available: PDFPDF
Malware analysis uses debuggers to understand and manipulate the behaviors of stripped binaries. To circumvent analysis, malware applies a variety of anti-debugging techniques, such as self-modifying, checking for or removing breakpoints, hijacking keyboard and mouse events, escaping the debugger, etc. Most state-of-the-art debuggers are vulnerable to these anti-debugging techniques. In ...
Keywords: malware analysis, anti-debugging

3
August 2014 SEC'14: Proceedings of the 23rd USENIX conference on Security Symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 1

Malware analysis relies heavily on the use of virtual machines for functionality and safety. There are subtle differences in operation between virtual machines and physical machines. Contemporary malware checks for these differences to detect that it is being run in a virtual machine, and modifies its behavior to thwart being ...

4
August 2014 CSET'14: Proceedings of the 7th USENIX conference on Cyber Security Experimentation and Test
Publisher: USENIX Association
Bibliometrics:
Citation Count: 2

In this paper, we advocate for publicly accessible live malware experimentation testbeds. We introduce new advancements for high-fidelity transparent emulation and fine-grain automatic containment that make such experimentation safe and useful to researchers, and we propose a complete, extensible live-malware experimentation framework. Our framework, aided by our new technologies, facilitates ...

5 published by ACM
November 2012 IMC '12: Proceedings of the 2012 Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 10,   Downloads (Overall): 127

Full text available: PDFPDF
Network testbeds have become widely used in computer science, both for evaluation of research technologies and for hands-on teaching. This can naturally lead to oversubscription and resource allocation failures, as limited testbed resources cannot meet the increasing demand. This paper examines the causes of resource allocation failures on DeterLab testbed ...
Keywords: resource allocation, emulab, network testbeds



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us