Follow
Jia Song
Jia Song
Assistant Professor, University of Idaho
Verified email at uidaho.edu
Title
Cited by
Cited by
Year
The DARPA Cyber Grand Challenge: A Competitor's Perspective
J Song, J Alves-Foss
IEEE Security & Privacy 13 (6), 72-76, 2015
512015
The DARPA Cyber Grand Challenge: A Competitor's Perspective, Part 2
J Song, J Alves-Foss
IEEE Security & Privacy 14 (1), 76-81, 2016
312016
Function boundary detection in stripped binaries
J Alves-Foss, J Song
Proceedings of the 35th Annual Computer Security Applications Conference, 84-96, 2019
272019
Performance review of zero copy techniques
J Song, J Alves-Foss
International Journal of Computer Science and Security (IJCSS) 6 (4), 256, 2012
252012
Security tagging for a zero-kernel operating system
J Song, J Alves-Foss
System Sciences (HICSS), 2013 46th Hawaii International Conference on, 5049-5058, 2013
232013
A Review on Data Falsification-Based attacks In Cooperative Intelligent Transportation Systems
SA Almalki, J Song
International Journal of Computer Science and Security (IJCSS) 14 (2), 22, 2020
142020
Dynamic Taint Analysis Tools: A Review
AM Alashjaee, S Duraibi, J Song
International Journal of Computer Science and Security (IJCSS) 13 (6), 231, 2019
92019
A Review on Grammar-Based Fuzzing Techniques
H Al Salem, J Song
International Journal of Computer Science & Security (IJCSS) 13 (3), 114, 2019
92019
A new operating system for security tagged architecture hardware in support of multiple independent levels of security (mils) compliant system
J Alves-Foss, J Song, S Steiner, S Zakeri
IDAHO UNIV MOSCOW CENTER FOR SECURE AND DEPENDABLE SYSTEMS, 2014
72014
Development and evaluation of a security tagging scheme for a real-time zero operating system kernel
J Song
University of Idaho, 2012
72012
IoT-Taint: IoT Malware Detection Framework Using Dynamic Taint Analysis
AM Alashjaee, S Duraibi, J Song
2019 International Conference on Computational Science and Computational …, 2019
62019
A Study on Using Code Coverage Information Extracted from Binary to Guide Fuzzing
B Lou, J Song
International Journal of Computer Science and Security (IJCSS) 14 (5), 200, 2020
52020
A Survey of Symbolic Execution Tools
S Duraibi, AM Alashjaee, J Song
Int. J. Comput. Sci. and Secur.(IJCSS) 13, 244, 2019
52019
Hardware security tags for enhanced operating system security
J Song, J Alves-Foss
Issues in Information Systems 14 (1), 61-71, 2013
52013
Security Tagging for a Real-time Zero-kernel Operating System: Implementation and Verification
J Song
University of Idaho, 2014
42014
Implications of Multi-Core Architectures on the Development of Multiple Independent Levels of Security (MILS) Compliant Systems
J Alves-Foss, P Oman, R Bradetich, X He, J Song
IDAHO UNIV MOSCOW CENTER FOR SECURE AND DEPENDABLE SYSTEMS, 2012
32012
Grammar-based Fuzzing Tool Using Markov Chain Model to Generate New Fuzzing Inputs
H Al Salem, J Song
2021 International Conference on Computational Science and Computational …, 2021
22021
Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms
J Alves-Foss, J Song, AS Amack, L Kerr, S Steiner
System Sciences (HICSS), 2015 48th Hawaii International Conference on, 5201-5210, 2015
22015
Cyber Security
K Haltinner, D Sarathchandra, J Alves-Foss, K Chang, DC de Leon, ...
Springer,, 2016
12016
IoT Smart Home Devices’ Security, Privacy, and Firmware Labeling System
NW Rajkhan, J Song
2021 International Conference on Computational Science and Computational …, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20