Donghai Tian
Donghai Tian
Verified email at bit.edu.cn
Title
Cited by
Cited by
Year
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
X Xiong, D Tian, P Liu
NDSS 11, 2011
982011
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
D Tian, Q Zeng, D Wu, P Liu, C Hu
NDSS, 2012
282012
Hierarchical distributed alert correlation model
D Tian, H Changzhen, Y Qi, W Jianqiao
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
192009
Defeating buffer overflow attacks via virtualization
D Tian, X Xiong, C Hu, P Liu
Computers & Electrical Engineering 40 (6), 1940-1950, 2014
102014
Semantic aware attribution analysis of remote exploits
D Kong, D Tian, Q Pan, P Liu, D Wu
Security and Communication Networks, 2012
82012
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits
D Kong, D Tian, P Liu, D Wu
International Conference on Security and Privacy in Communication Systems …, 2011
82011
MSYM: A multichannel communication system for android devices
W Wang, D Tian, W Meng, X Jia, R Zhao, R Ma
Computer Networks 168, 107024, 2020
62020
E-WBM: an effort-based vulnerability discovery model
X Wang, R Ma, B Li, D Tian, X Wang
IEEE Access 7, 44276-44292, 2019
52019
A policy‐centric approach to protecting OS kernel from vulnerable LKMs
D Tian, X Xiong, C Hu, P Liu
Software: Practice and Experience 48 (6), 1269-1284, 2018
52018
An Online Approach for Kernel-level Keylogger Detection and Defense.
D Tian, X Jia, J Chen, C Hu
J. Inf. Sci. Eng. 33 (2), 445-461, 2017
52017
Policy-centric protection of OS kernel from vulnerable loadable kernel modules
D Tian, X Xiong, C Hu, P Liu
International Conference on Information Security Practice and Experience …, 2011
42011
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
D Tian, R Ma, X Jia, C Hu
IEEE Access 7, 91657-91666, 2019
32019
An online approach to defeating return-oriented-programming attacks
D Tian, X Jia, L Zhan, C Hu, J Xue
International Symposium on Cyberspace Safety and Security, 236-247, 2017
32017
Software cruising: A new technology for building concurrent software monitor
D Wu, P Liu, Q Zeng, D Tian
Secure Cloud Computing, 303-324, 2014
32014
Findevasion: an effective environment-sensitive malware detection system for the cloud
X Jia, G Zhou, Q Huang, W Zhang, D Tian
International Conference on Digital Forensics and Cyber Crime, 3-17, 2017
22017
A practical method to confine sensitive API invocations on commodity hardware
D Tian, D Qi, L Zhan, Y Yin, C Hu, J Xue
International Conference on Network and System Security, 145-159, 2017
22017
A practical online approach to protecting kernel heap buffers in kernel modules
D Tian, X Jia, J Chen, C Hu, J Xue
China Communications 13 (11), 143-152, 2016
22016
Shellix: An Efficient Approach for Shellcode Detection
M Chen, D Tian, Y Liu, C Hu, X Wang, N Li
International Journal of Security and Its Applications 10 (6), 107-122, 2016
22016
A concurrent security monitoring method for virtualization environments
T Donghai, J Xiaoqi, C Junhua, H Changzhen
China Communications 13 (1), 113-123, 2016
22016
Efficient Shellcode Detection on Commodity Hardware
D Tian, M Chen, C Hu, X Li
IEICE TRANSACTIONS on Information and Systems 96 (10), 2272-2276, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–20