Papers

  1. Zhiyong Shan, Iulian Neamtiu, Raina Samuel, Self-Hiding Behavior in Android Apps: Detection and Characterization, 40th International Conference on Software Engineering (ICSE 2018).
  2. Iulian Neamtiu, Xuetao Wei, Michalis Faloutsos, Lorenzo Gomez, Tanzirul Azim, Yongjian Hu, Zhiyong Shan: Improving Smartphone Security and Reliability. Journal of Interconnection Networks 17(1): 1-67 (2017)
  3. Zhiyong Shan, Tanzirul Azim, Iulian Neamtiu. Finding Resume and Restart Errors in Android Applications. ACM Conference on Object-Oriented Programming, Systems, Languages & Applications (OOPSLA鈥16), November 2016. Accepted.
  4. Zhiyong Shan, I. Neamtiu, Z. Qian and D. Torrieri, "Proactive restart as cyber maneuver for Android," Military Communications Conference, MILCOM 2015 - 2015 IEEE, Tampa, FL, 2015, pp. 19-24.
  5. Jin, Xinxin, Soyeon Park, Tianwei Sheng, Rishan Chen, Zhiyong Shan, and Yuanyuan Zhou. "FTXen: Making hypervisor resilient to hardware faults on relaxed cores." In 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA鈥15), pp. 451-462. IEEE, 2015.
  6. Zhiyong Shan, Xin Wang, Tzi-cker Chiueh: Shuttle: Facilitating Inter-Application Interactions for OS-Level Virtualization. IEEE Trans. Computers 63(5): 1220-1233 (2014)
  7. Zhiyong Shan, Xin Wang: Growing Grapes in Your Computer to Defend Against Malware. IEEE Transactions on Information Forensics and Security 9(2): 196-207 (2014)
  8. Zhiyong Shan, Xin Wang, Tzi-cker Chiueh: Malware Clearance for Secure Commitment of OS-Level Virtual Machines. IEEE Transactions on Dependable and Secure Computing. 10(2): 70-83 (2013)
  9. Zhiyong Shan, Xin Wang, Tzi-cker Chiueh: Enforcing Mandatory Access Control in Commodity OS to Disable Malware. IEEE Transactions on Dependable and Secure Computing 9(4): 541-555 (2012)
  10. Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, Xiaofeng Meng: Facilitating inter-application interactions for OS-level virtualization. In Proceedings of the 8th ACM Annual International Conference on Virtual Execution Environments (VEE鈥12), 75-86
  11. Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, and Xiaofeng Meng. "Safe side effects commitment for OS-level virtualization." In Proceedings of the 8th ACM international conference on Autonomic computing (ICAC鈥11), pp. 111-120. ACM, 2011.
  12. Zhiyong Shan, Xin Wang, and Tzi-cker Chiueh. 2011. Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11). ACM, New York, NY, USA, 135-144. (full paper acceptance rate 16%)
  13. Shan, Zhiyong, Tzi-cker Chiueh, and Xin Wang. "Virtualizing system and ordinary services in Windows-based OS-level virtual machines." In Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 579-583. ACM, 2011.
  14. Shan, Zhiyong, Yang Yu, and Tzi-cker Chiueh. "Confining windows inter-process communications for OS-level virtual machine." In Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, pp. 30-35. ACM, 2009.
  15. Shan, Zhiyong. "Compatible and Usable Mandatory Access Control for Good-enough OS Security." In Electronic Commerce and Security, 2009. ISECS'09. Second International Symposium on, vol. 1, pp. 246-250. IEEE, 2009.
  16. Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan. Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity. Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS 2009), Oct., 2009, Macau SAR, P.R.China, IEEE Computer Society. pp. 783--789.
  17. Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan. Design of an Architecture for Process Runtime Integrity Measurement. Microelectronics & Computer, Vol.26, No.9, Sep 2009:183~186. (in Chinese)
  18. Zhiyong Shan, Wenchang Shi. 鈥淪TBAC: A New Access Control Model for Operating System鈥. Journal of Computer Research and Development, Vol.45, No.5, 2008: 758~764.(in Chinese)
  19. Liang Wang, Yuepeng Li, Zhiyong Shan, Xiaoping Yang. Dependency Graph based Intrusion Detection. National Computer Security Conference, 2008. (in Chinese)
  20. Zhiyong Shan, Wenchang Shi. 鈥淎n Access Control Model for Enhancing Survivability鈥. Computer Engineering and Applications, 2008.12. (in Chinese)
  21. Wenchang Shi, Zhiyong Shan. 鈥淎 Method for Studying Fine Grained Trust Chain on Operating System鈥, Computer Science, Vol.35, No.9, 2008, 35(9):1-4. (in Chinese)
  22. Liang B, Liu H, Shi W, Shan Z. Automatic detection of integer sign vulnerabilities. In International Conference on Information and Automation, ICIA 2008. (pp. 1204-1209). IEEE.
  23. Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng. 鈥淎n OS Security Protection Model for Defeating Attacks from Network鈥, the Third International Conference on Information Systems Security (ICISS 2007), 25-36.
  24. Zhiyong Shan, 鈥淎 Security Administration Framework for Security OS Following CC鈥, Computer Engineering, 2007.5, 33(09):151-163. (in Chinese)
  25. Zhiyong Shan, 鈥淩esearch on Framework for Multi-policies鈥, Computer Engineering, 2007.5, 33(09):148-160. (in Chinese)
  26. Zhiyong Shan, Shi Wenchang, Liao Bin. 鈥淩esearch on the Hierarchical and Distributed Network Security Management System鈥. Computer Engineering and Applications, 2007.3, 43(2):20-24. (in Chinese)
  27. Zhiyong Shan, 鈥淎n Architecture for the Hierarchical and Distributed Network Security Management System鈥, Computer Engineering and Designing, 2007.7, 28(14):3316-3320. (in Chinese)
  28. Zhiyong Shan, Yufang Sun, 鈥淪tudy and Implementation of Double-Levels-Cache GFAC鈥, Chinese Journal of Computers, Nov, 2004, 27(11):1576-1584. (in Chinese)
  29. Zhiyong Shan, Yufang Sun, 鈥淎n Operating System Oriented RBAC Model and Its Implementation鈥, Journal of Computer Research and Development, Feb, 2004, 41(2):287-298. (in Chinese)
  30. Zhiyong Shan, Yufang Sun, 鈥淎 Study of Extending Generalized Framework for Access Control鈥, Journal of Computer Research and Development, Feb, 2003, 40(2):228-234. (in Chinese)
  31. Zhiyong Shan, Yufang Sun, 鈥淎 Study of Generalized Environment-Adaptable Multi-Policies Supporting Framework鈥, Journal of Computer Research and Development, Feb, 2003, 40(2):235-244. (in Chinese)
  32. Zhiyong Shan, Research on the Framework for Multi-Policies and Practice in Secure Operation System. Phd Thesis, Institute of Software, Chinese Academy of Science 2003. (in Chinese)
  33. Zhiyong Shan, Yufang Sun, 鈥淎 Study of Security Attributes Immediate Revocation in Secure OS鈥, Journal of Computer Research and Development, Dec, 2002, 39(12):1681-1688. (in Chinese)
  34. Wenchang Shi, Yufang Sun, Hongliang Liang, Xiangfeng Zhang, Qingsong Zhao, Zhiyong Shan. Design and Implementation of Secure Linux Kernel Security Functions. Journal of Computer Research and Development, 2001, Vol.38, No.10, 1255-1261.(in Chinese)

Books

  1. Zhiyong Shan, Wenchang Shi. Research in Access Control of Operating Systems. Science Press, Beijing, China, Mar 2009. (in Chinese)
  2. Zhiyong Shan, Zhiqun Guo, E-Commerce Security and Management, China Renmin University Press, Beijing, China, May 2010. (in Chinese)