Michael Grace
Michael Grace
Samsung Research America
Verified email at
Cited by
Cited by
Riskranker: scalable and accurate zero-day android malware detection
M Grace, Y Zhou, Q Zhang, S Zou, X Jiang
Proceedings of the 10th international conference on Mobile systems …, 2012
Unsafe exposure analysis of mobile in-app advertisements
MC Grace, W Zhou, X Jiang, AR Sadeghi
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
Systematic detection of capability leaks in stock android smartphones.
MC Grace, Y Zhou, Z Wang, X Jiang
NDSS 14, 19, 2012
Fast, scalable detection of" piggybacked" mobile applications
W Zhou, Y Zhou, M Grace, X Jiang, S Zou
Proceedings of the third ACM conference on Data and application security and …, 2013
Defeating return-oriented rootkits with "Return-Less" kernels
J Li, Z Wang, X Jiang, M Grace, S Bahram
Proceedings of the 5th European conference on Computer systems, 195-208, 2010
The impact of vendor customizations on android security
L Wu, M Grace, Y Zhou, C Wu, X Jiang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Dksm: Subverting virtual machine introspection for fun and profit
S Bahram, X Jiang, Z Wang, M Grace, J Li, D Srinivasan, J Rhee, D Xu
2010 29th IEEE symposium on reliable distributed systems, 82-91, 2010
ReFormat: Automatic reverse engineering of encrypted messages
Z Wang, X Jiang, W Cui, X Wang, M Grace
European Symposium on Research in Computer Security, 200-215, 2009
Isolating commodity hosted hypervisors with hyperlock
Z Wang, C Wu, M Grace, X Jiang
Proceedings of the 7th ACM european conference on Computer Systems, 127-140, 2012
Hare hunting in the wild android: A study on the threat of hanging attribute references
Y Aafer, N Zhang, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Comprehensive and efficient protection of kernel control data
J Li, Z Wang, T Bletsch, D Srinivasan, M Grace, X Jiang
IEEE Transactions on Information Forensics and Security 6 (4), 1404-1417, 2011
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps
S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
Transparent protection of commodity os kernels using hardware virtualization
M Grace, Z Wang, D Srinivasan, J Li, X Jiang, Z Liang, S Liakh
International Conference on Security and Privacy in Communication Systems …, 2010
{PARTEMU}: Enabling Dynamic Analysis of {Real-World}{TrustZone} Software Using Emulation
L Harrison, H Vijayakumar, R Padhye, K Sen, M Grace
29th USENIX Security Symposium (USENIX Security 20), 789-806, 2020
Valve: Securing function workflows on serverless computing platforms
P Datta, P Kumar, T Morris, M Grace, A Rahmati, A Bates
Proceedings of The Web Conference 2020, 939-950, 2020
{ATtention} Spanned: Comprehensive Vulnerability Analysis of {AT} Commands Within the Android Ecosystem
DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ...
27th USENIX Security Symposium (USENIX Security 18), 273-290, 2018
Analyzing and improving linux kernel memory protection: a model checking approach
S Liakh, M Grace, X Jiang
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
Attacking android smartphone systems without permissions
SM Kywe, Y Li, K Petal, M Grace
2016 14th Annual Conference on Privacy, Security and Trust (PST), 147-156, 2016
Proofchecker: an accessible environment for automata theory correctness proofs
MF Stallmann, SP Balik, RD Rodman, S Bahram, MC Grace, SD High
Proceedings of the 12th annual SIGCSE conference on Innovation and …, 2007
System and method for fraud detection in a mobile device
KM Patel, B Kasman, P Ning, MC GRACE
US Patent 10,607,226, 2020
The system can't perform the operation now. Try again later.
Articles 1–20