Papers
- Zhiyong Shan, Iulian Neamtiu, Raina Samuel, Self-Hiding Behavior in Android Apps:
Detection and Characterization, 40th International Conference on Software Engineering
(ICSE 2018).
- Iulian Neamtiu, Xuetao Wei, Michalis Faloutsos, Lorenzo Gomez, Tanzirul Azim, Yongjian
Hu, Zhiyong Shan: Improving Smartphone Security and Reliability. Journal of Interconnection
Networks 17(1): 1-67 (2017)
- Zhiyong Shan, Tanzirul Azim, Iulian Neamtiu. Finding Resume and Restart Errors in
Android Applications. ACM Conference on Object-Oriented Programming, Systems, Languages
& Applications (OOPSLA鈥16), November 2016. Accepted.
- Zhiyong Shan, I. Neamtiu, Z. Qian and D. Torrieri, "Proactive restart as cyber maneuver
for Android," Military Communications Conference, MILCOM 2015 - 2015 IEEE, Tampa,
FL, 2015, pp. 19-24.
- Jin, Xinxin, Soyeon Park, Tianwei Sheng, Rishan Chen, Zhiyong Shan, and Yuanyuan Zhou.
"FTXen: Making hypervisor resilient to hardware faults on relaxed cores." In 2015
IEEE 21st International Symposium on High Performance Computer Architecture (HPCA鈥15),
pp. 451-462. IEEE, 2015.
- Zhiyong Shan, Xin Wang, Tzi-cker Chiueh: Shuttle: Facilitating Inter-Application Interactions
for OS-Level Virtualization. IEEE Trans. Computers 63(5): 1220-1233 (2014)
- Zhiyong Shan, Xin Wang: Growing Grapes in Your Computer to Defend Against Malware. IEEE
Transactions on Information Forensics and Security 9(2): 196-207 (2014)
- Zhiyong Shan, Xin Wang, Tzi-cker Chiueh: Malware Clearance for Secure Commitment of
OS-Level Virtual Machines. IEEE Transactions on Dependable and Secure Computing. 10(2):
70-83 (2013)
- Zhiyong Shan, Xin Wang, Tzi-cker Chiueh: Enforcing Mandatory Access Control in Commodity
OS to Disable Malware. IEEE Transactions on Dependable and Secure Computing 9(4):
541-555 (2012)
- Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, Xiaofeng Meng: Facilitating inter-application
interactions for OS-level virtualization. In Proceedings of the 8th ACM Annual International
Conference on Virtual Execution Environments (VEE鈥12), 75-86
- Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, and Xiaofeng Meng. "Safe side effects commitment
for OS-level virtualization." In Proceedings of the 8th ACM international conference
on Autonomic computing (ICAC鈥11), pp. 111-120. ACM, 2011.
- Zhiyong Shan, Xin Wang, and Tzi-cker Chiueh. 2011. Tracer: enforcing mandatory access
control in commodity OS with the support of light-weight intrusion detection and tracing.
In Proceedings of the 6th ACM Symposium on Information, Computer and Communications
Security (ASIACCS '11). ACM, New York, NY, USA, 135-144. (full paper acceptance rate
16%)
- Shan, Zhiyong, Tzi-cker Chiueh, and Xin Wang. "Virtualizing system and ordinary services
in Windows-based OS-level virtual machines." In Proceedings of the 2011 ACM Symposium
on Applied Computing, pp. 579-583. ACM, 2011.
- Shan, Zhiyong, Yang Yu, and Tzi-cker Chiueh. "Confining windows inter-process communications
for OS-level virtual machine." In Proceedings of the 1st EuroSys Workshop on Virtualization
Technology for Dependable Systems, pp. 30-35. ACM, 2009.
- Shan, Zhiyong. "Compatible and Usable Mandatory Access Control for Good-enough OS
Security." In Electronic Commerce and Security, 2009. ISECS'09. Second International
Symposium on, vol. 1, pp. 246-250. IEEE, 2009.
- Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan. Operating System Mechanisms
for TPM-Based Lifetime Measurement of Process Integrity. Proceedings of the IEEE 6th
International Conference on Mobile Adhoc and Sensor Systems (MASS 2009), Oct., 2009,
Macau SAR, P.R.China, IEEE Computer Society. pp. 783--789.
- Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan. Design of an Architecture
for Process Runtime Integrity Measurement. Microelectronics & Computer, Vol.26, No.9,
Sep 2009:183~186. (in Chinese)
- Zhiyong Shan, Wenchang Shi. 鈥淪TBAC: A New Access Control Model for Operating System鈥.
Journal of Computer Research and Development, Vol.45, No.5, 2008: 758~764.(in Chinese)
- Liang Wang, Yuepeng Li, Zhiyong Shan, Xiaoping Yang. Dependency Graph based Intrusion
Detection. National Computer Security Conference, 2008. (in Chinese)
- Zhiyong Shan, Wenchang Shi. 鈥淎n Access Control Model for Enhancing Survivability鈥.
Computer Engineering and Applications, 2008.12. (in Chinese)
- Wenchang Shi, Zhiyong Shan. 鈥淎 Method for Studying Fine Grained Trust Chain on Operating
System鈥, Computer Science, Vol.35, No.9, 2008, 35(9):1-4. (in Chinese)
- Liang B, Liu H, Shi W, Shan Z. Automatic detection of integer sign vulnerabilities.
In International Conference on Information and Automation, ICIA 2008. (pp. 1204-1209).
IEEE.
- Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng. 鈥淎n OS Security Protection Model for Defeating
Attacks from Network鈥, the Third International Conference on Information Systems Security
(ICISS 2007), 25-36.
- Zhiyong Shan, 鈥淎 Security Administration Framework for Security OS Following CC鈥,
Computer Engineering, 2007.5, 33(09):151-163. (in Chinese)
- Zhiyong Shan, 鈥淩esearch on Framework for Multi-policies鈥, Computer Engineering, 2007.5,
33(09):148-160. (in Chinese)
- Zhiyong Shan, Shi Wenchang, Liao Bin. 鈥淩esearch on the Hierarchical and Distributed
Network Security Management System鈥. Computer Engineering and Applications, 2007.3,
43(2):20-24. (in Chinese)
- Zhiyong Shan, 鈥淎n Architecture for the Hierarchical and Distributed Network Security
Management System鈥, Computer Engineering and Designing, 2007.7, 28(14):3316-3320.
(in Chinese)
- Zhiyong Shan, Yufang Sun, 鈥淪tudy and Implementation of Double-Levels-Cache GFAC鈥,
Chinese Journal of Computers, Nov, 2004, 27(11):1576-1584. (in Chinese)
- Zhiyong Shan, Yufang Sun, 鈥淎n Operating System Oriented RBAC Model and Its Implementation鈥,
Journal of Computer Research and Development, Feb, 2004, 41(2):287-298. (in Chinese)
- Zhiyong Shan, Yufang Sun, 鈥淎 Study of Extending Generalized Framework for Access Control鈥,
Journal of Computer Research and Development, Feb, 2003, 40(2):228-234. (in Chinese)
- Zhiyong Shan, Yufang Sun, 鈥淎 Study of Generalized Environment-Adaptable Multi-Policies
Supporting Framework鈥, Journal of Computer Research and Development, Feb, 2003, 40(2):235-244.
(in Chinese)
- Zhiyong Shan, Research on the Framework for Multi-Policies and Practice in Secure
Operation System. Phd Thesis, Institute of Software, Chinese Academy of Science 2003.
(in Chinese)
- Zhiyong Shan, Yufang Sun, 鈥淎 Study of Security Attributes Immediate Revocation in
Secure OS鈥, Journal of Computer Research and Development, Dec, 2002, 39(12):1681-1688.
(in Chinese)
- Wenchang Shi, Yufang Sun, Hongliang Liang, Xiangfeng Zhang, Qingsong Zhao, Zhiyong
Shan. Design and Implementation of Secure Linux Kernel Security Functions. Journal
of Computer Research and Development, 2001, Vol.38, No.10, 1255-1261.(in Chinese)
Books
- Zhiyong Shan, Wenchang Shi. Research in Access Control of Operating Systems. Science
Press, Beijing, China, Mar 2009. (in Chinese)
- Zhiyong Shan, Zhiqun Guo, E-Commerce Security and Management, China Renmin University
Press, Beijing, China, May 2010. (in Chinese)