My name is Yajin Zhou (周亚金). I am a ZJU100 Young Professor (since 2018), with both the College of Computer Science and Technology and the Institute of Cyberspace Research at Zhejiang University, China. I earned my Ph.D. (2015) in Computer Science from North Carolina State University, and then worked as a senior security researcher at Qihoo 360. I have published more than 20 papers, with 5700+ citations (Google Scholar). Two of my papers have been selected to the list of normalized Top-100 security papers since 1981.

My current focus is on identifying real-world threats (how to hack) and building practical solutions (how to defend), in the context of software security of embedded systems (or IoT devices). I am also interested in emerging threats, e.g., security of smart contracts. I usually leverage the knowledge from other areas, including program/binary analysis, operating systems, computer architecture. My Research has been supported by National Natural Science Foundation of China (NSFC), and Alibaba Group.

I am serving the program committee for the following conferences. Please consider submitting your paper and/or attending the conference.

ACM ASIACCS 2019 | IEEE EuroS&P 2019 | IEEE ICDCS 2019 | ACM CCS 2019 | ACM ASIACCS 2020

I'm looking for motivated Ph.D./master/undergraduate students, postdocs and (visiting) research students who have a solid background in systems and/or security. If you enjoy building systems and (or) security, we should talk.


Publications

2019

[8] LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed [Paper]
Huayi Duan, Cong Wang, Xingliang Yuan, Yajin Zhou, Qian Wang, Kui Ren
Proceedings of the 26th ACM Conference on Computer and Communications (ACM CCS 2019)

[7] Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum [Paper]
Zhen Cheng*, Xinrui Hou*, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren
arXiv:1904.01981
(*The names of the first two authors are in alphabetical order)

[6] SPEED: Accelerating Enclave Applications via Secure Deduplication [Paper]
Helei Cui, Huayi Duan, Zhan Qin, Cong Wang, Yajin Zhou
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2019)

[5] Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications [Paper]
Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo, Fangren Xu
IEEE Transactions on Dependable and Secure Computing (TDSC)

[4] Adaptive Call-site Sensitive Control Flow Integrity [Paper | Code]
Mustakimur Khandaker, Abu Naser, Wenqing Liu, Zhi Wang, Yajin Zhou, Yueqiang Cheng
Proceedings of the 4th IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2019)

[3] NDroid: Towards Tracking Information Flows Across Multiple Android Contexts [Paper]
Lei Xue, Chenxiong Qian, Hao Zhou, Xiapu Luo, Yajin Zhou, Yuru Shao and Alvin T.S. Chan
IEEE Transactions on Information Forensics & Security (TIFS), Volume: 14, Issue: 3, pp. 814–828, March 2019

2018

[2] Towards Privacy-Preserving Malware Detection Systems for Android (Best Paper Award) [Paper]
Helei Cui, Yajin Zhou, Cong Wang, Qi Li, Kui Ren
Proceedings of the 24th International Conference on Parallel and Distributed Systems (IEEE ICPADS 2018)

[1] AdCapsule: Practical Confinement of Advertisements in Android Applications [Paper]
Xiaonan Zhu, Jinku Li, Yajin Zhou, Jianfeng Ma
IEEE Transactions on Dependable and Secure Computing (TDSC)


Before 2018


2017

[21] When Program Analysis Meets Mobile Security: An Industrial Study of Misusing Android Internet Sockets [Paper]
Wenqi Bu, Minhui Xue, Lihua Xu, Yajin Zhou, Zhushou Tang, Tao Xie
Proceedings of the 11th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2017)

[20] Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART [Paper]
Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, Guofei Gu
Proceedings of the 26th USENIX Security Symposium (USENIX Security 2017)

[19] Design and Implementation of SecPod, A Framework for Virtualization-based Security Systems [Paper]
Xiaoguang Wang, Yong Qi, Zhi Wang, Yue Chen, Yajin Zhou
IEEE Transactions on Dependable and Secure Computing (TDSC)

2016

[18] Blender: Self-randomizing Address Space Layout for Android Apps [Paper]
Mingshen Sun, John C.S. Lui, Yajin Zhou
Proceedings of the the 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2016)

[17] AppShell: Making Data Protection Practical for Lost or Stolen Android Devices [Paper]
Yajin Zhou, Kapil Singh, Xuxian Jiang
Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS 2016)

2015

[16] SecPod: a Framework for Virtualization-based Security Systems [Paper]
Xiaoguang Wang, Yue Chen, Zhi Wang, Yong Qi, Yajin Zhou
Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC 2015)

[15] Harvesting Developer Credentials in Android Apps [Paper]
Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2015)

[14] Hybrid User-level Sandboxing of Third-party Android Apps [Paper]
Yajin Zhou, Kunal Patel, Lei Wu, Zhi Wang, Xuxian Jiang
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)

2014

[13] ARMlock: Hardware-based Fault Isolation for ARM [Paper | Slides]
Yajin Zhou, Xiaoguang Wang, Yue Chen, Zhi Wang
Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS 2014)

[12] Owner-centric Protection of Unstructured Data on Smartphones [Paper]
Yajin Zhou, Kapil Singh, Xuxian Jiang
Proceedings of the 7th International Conference on Trust and Trustworthy Computing (TRUST 2014)

[11] AirBag: Boosting Smartphone Resistance to Malware Infection [Paper]
Chiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang, Xuxian Jiang
Proceedings of the 21st Network and Distributed System Security Symposium (NDSS 2014)

[10] DIVILAR: Diversifying Intermediate Language for Anti-Repackaging on Android Platform [Paper]
Wu Zhou, Zhi Wang, Yajin Zhou, Xuxian Jiang
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014)

2013

[9] The Impact of Vendor Customizations on Android Security [Paper]
Lei Wu, Michael Grace, Yajin Zhou, Chiachih Wu, Xuxian Jiang
Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013)

[8] Fast, Scalable Detection of "Piggybacked" Mobile Applications (Best Paper Award) [Paper]
Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, Shihong Zou
Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY 2013)

[7] Detecting Passive Content Leaks and Pollution in Android Applications [Paper | Slides]
Yajin Zhou, Xuxian Jiang
Proceedings of the 20th Network and Distributed System Security Symposium (NDSS 2013)

2012

[6] RiskRanker: Scalable and Accurate Zero-day Android Malware Detection [Paper]
Michael Grace*, Yajin Zhou*, Qiang Zhang, Shihong Zou, Xuxian Jiang
Proceedings of the 10th International Conference on Mobile Systems, Applications and Services (MobiSys 2012)
(*The names of the first two authors are in alphabetical order)

[5] Dissecting Android Malware: Characterization and Evolution [Paper]
Yajin Zhou, Xuxian Jiang
Proceedings of the 33rd IEEE Symposium on Security and Privacy (Oakland 2012)
(Our dataset is released at Android Malware Genome Project)

[4] DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces (Best Paper Award) [Paper]
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning
Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (CODASPY 2012)

[3] Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets [Paper]
Yajin Zhou, Zhi Wang, Wu Zhou and Xuxian Jiang
Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012)

[2] Systematic Detection of Capability Leaks in Stock Android Smartphones [Paper | Demo Video]
Michael Grace, Yajin Zhou, Zhi Wang and Xuxian Jiang
Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012)

2011

[1] Taming Information-Stealing Smartphone Applications (on Android) [Paper]
Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vince W. Freeh
Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST 2011)