Michael Grace
Michael Grace
Samsung Research America
Verified email at ncsu.edu
TitleCited byYear
Riskranker: scalable and accurate zero-day android malware detection
M Grace, Y Zhou, Q Zhang, S Zou, X Jiang
Proceedings of the 10th international conference on Mobile systems …, 2012
6362012
Systematic detection of capability leaks in stock android smartphones.
MC Grace, Y Zhou, Z Wang, X Jiang
NDSS 14, 19, 2012
4982012
Unsafe exposure analysis of mobile in-app advertisements
MC Grace, W Zhou, X Jiang, AR Sadeghi
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
4732012
Fast, scalable detection of piggybacked mobile applications
W Zhou, Y Zhou, M Grace, X Jiang, S Zou
Proceedings of the third ACM conference on Data and application security and …, 2013
2262013
Defeating return-oriented rootkits with return-less kernels
J Li, Z Wang, X Jiang, M Grace, S Bahram
Proceedings of the 5th European conference on Computer systems, 195-208, 2010
1902010
The impact of vendor customizations on android security
L Wu, M Grace, Y Zhou, C Wu, X Jiang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1612013
Isolating commodity hosted hypervisors with hyperlock
Z Wang, C Wu, M Grace, X Jiang
Proceedings of the 7th ACM european conference on Computer Systems, 127-140, 2012
582012
Hare hunting in the wild android: A study on the threat of hanging attribute references
Y Aafer, N Zhang, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
442015
Comprehensive and efficient protection of kernel control data
J Li, Z Wang, T Bletsch, D Srinivasan, M Grace, X Jiang
IEEE Transactions on Information Forensics and Security 6 (4), 1404-1417, 2011
432011
Transparent protection of commodity os kernels using hardware virtualization
M Grace, Z Wang, D Srinivasan, J Li, X Jiang, Z Liang, S Liakh
International Conference on Security and Privacy in Communication Systems …, 2010
312010
Analyzing and improving linux kernel memory protection: a model checking approach
S Liakh, M Grace, X Jiang
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
142010
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps
S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
132017
Proofchecker: an accessible environment for automata theory correctness proofs
MF Stallmann, SP Balik, RD Rodman, S Bahram, MC Grace, SD High
ACM SIGCSE Bulletin 39 (3), 48-52, 2007
102007
Attacking android smartphone systems without permissions
SM Kywe, Y Li, K Petal, M Grace
2016 14th Annual Conference on Privacy, Security and Trust (PST), 147-156, 2016
82016
Apparatus and method for transparent, secure element-based mediation of on-board diagnostic operations
P Ning, SE Mclaughlin, MC Grace, AM Azab, R Bhutkar, W Shen, X Chen, ...
US Patent App. 15/048,531, 2017
42017
Methods and apparatus to enable runtime checksum verification of block device images
J Shah, S Wei, A Azab, X Chen, P Ning, W Shen, M Grace
US Patent 9,984,255, 2018
32018
Authorized control of an embedded system using end-to-end secure element communication
P Ning, YH Lin, SE McLaughlin, MC Grace, AM Azab, R Bhutkar, Y Choi
US Patent App. 15/584,892, 2018
32018
ATtention Spanned: Comprehensive Vulnerability Analysis of {AT} Commands Within the Android Ecosystem
DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 273-290, 2018
32018
Ghost installer in the shadow: Security analysis of app installation on android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
32017
Detecting capability leaks in android-based smartphones
M Grace, Y Zhou, Z Wang, X Jiang
Tech. rep. TR-2011-15. North Carolina State University, 2011
32011
The system can't perform the operation now. Try again later.
Articles 1–20