Overview

Zhiyong Shan is an associate professor in the School of Computing and the director of Software Analysis & Intelligence Laboratory.

Information

Areas of Research Interest

Research Interests

  • Program Analysis
  • Mobile Phone Security
  • Virtual Machine
Areas of Teaching Interest
  • Aug 2017-Dec 2018, Operating System (麻豆破解版 State University).
  • Aug 2017-Dec 2018, Software Analytics (麻豆破解版 State University).
  • Aug 2016-Dec 2016, Advanced Software Engineering (University of Central Missouri)
  • May 2016-June 2016, Advanced Android Application Programing (University of Central Missouri)
  • Jan 2016-May 2016, Advanced Computer Network and Security (University of Central Missouri)
  • Aug 2015-Dec 2015, Advanced Operating System (University of Central Missouri)
Publications

Papers

  1. Zhiyong Shan, Iulian Neamtiu, Raina Samuel, Self-Hiding Behavior in Android Apps: Detection and Characterization, 40th International Conference on Software Engineering (ICSE 2018).
  2. Iulian Neamtiu, Xuetao Wei, Michalis Faloutsos, Lorenzo Gomez, Tanzirul Azim, Yongjian Hu, Zhiyong Shan: Improving Smartphone Security and Reliability. Journal of Interconnection Networks 17(1): 1-67 (2017)
  3. Zhiyong Shan, Tanzirul Azim, Iulian Neamtiu. Finding Resume and Restart Errors in Android Applications. ACM Conference on Object-Oriented Programming, Systems, Languages & Applications (OOPSLA鈥16), November 2016. Accepted.
  4. Zhiyong Shan, I. Neamtiu, Z. Qian and D. Torrieri, "Proactive restart as cyber maneuver for Android," Military Communications Conference, MILCOM 2015 - 2015 IEEE, Tampa, FL, 2015, pp. 19-24.
  5. Jin, Xinxin, Soyeon Park, Tianwei Sheng, Rishan Chen, Zhiyong Shan, and Yuanyuan Zhou. "FTXen: Making hypervisor resilient to hardware faults on relaxed cores." In 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA鈥15), pp. 451-462. IEEE, 2015.
  6. Zhiyong Shan, Xin Wang, Tzi-cker Chiueh: Shuttle: Facilitating Inter-Application Interactions for OS-Level Virtualization. IEEE Trans. Computers 63(5): 1220-1233 (2014)
  7. Zhiyong Shan, Xin Wang: Growing Grapes in Your Computer to Defend Against Malware. IEEE Transactions on Information Forensics and Security 9(2): 196-207 (2014)
  8. Zhiyong Shan, Xin Wang, Tzi-cker Chiueh: Malware Clearance for Secure Commitment of OS-Level Virtual Machines. IEEE Transactions on Dependable and Secure Computing. 10(2): 70-83 (2013)
  9. Zhiyong Shan, Xin Wang, Tzi-cker Chiueh: Enforcing Mandatory Access Control in Commodity OS to Disable Malware. IEEE Transactions on Dependable and Secure Computing 9(4): 541-555 (2012)
  10. Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, Xiaofeng Meng: Facilitating inter-application interactions for OS-level virtualization. In Proceedings of the 8th ACM Annual International Conference on Virtual Execution Environments (VEE鈥12), 75-86
  11. Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, and Xiaofeng Meng. "Safe side effects commitment for OS-level virtualization." In Proceedings of the 8th ACM international conference on Autonomic computing (ICAC鈥11), pp. 111-120. ACM, 2011.
  12. Zhiyong Shan, Xin Wang, and Tzi-cker Chiueh. 2011. Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11). ACM, New York, NY, USA, 135-144. (full paper acceptance rate 16%)
  13. Shan, Zhiyong, Tzi-cker Chiueh, and Xin Wang. "Virtualizing system and ordinary services in Windows-based OS-level virtual machines." In Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 579-583. ACM, 2011.
  14. Shan, Zhiyong, Yang Yu, and Tzi-cker Chiueh. "Confining windows inter-process communications for OS-level virtual machine." In Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, pp. 30-35. ACM, 2009.
  15. Shan, Zhiyong. "Compatible and Usable Mandatory Access Control for Good-enough OS Security." In Electronic Commerce and Security, 2009. ISECS'09. Second International Symposium on, vol. 1, pp. 246-250. IEEE, 2009.
  16. Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan. Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity. Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS 2009), Oct., 2009, Macau SAR, P.R.China, IEEE Computer Society. pp. 783--789.
  17. Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan. Design of an Architecture for Process Runtime Integrity Measurement. Microelectronics & Computer, Vol.26, No.9, Sep 2009:183~186.
  18. Zhiyong Shan, Wenchang Shi. 鈥淪TBAC: A New Access Control Model for Operating System鈥. Journal of Computer Research and Development, Vol.45, No.5, 2008: 758~764.
  19. Liang Wang, Yuepeng Li, Zhiyong Shan, Xiaoping Yang. Dependency Graph based Intrusion Detection. National Computer Security Conference, 2008.
  20. Zhiyong Shan, Wenchang Shi. 鈥淎n Access Control Model for Enhancing Survivability鈥. Computer Engineering and Applications, 2008.12.
  21. Wenchang Shi, Zhiyong Shan. 鈥淎 Method for Studying Fine Grained Trust Chain on Operating System鈥, Computer Science, Vol.35, No.9, 2008, 35(9):1-4.
  22. Liang B, Liu H, Shi W, Shan Z. Automatic detection of integer sign vulnerabilities. In International Conference on Information and Automation, ICIA 2008. (pp. 1204-1209). IEEE.
  23. Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng. 鈥淎n OS Security Protection Model for Defeating Attacks from Network鈥, the Third International Conference on Information Systems Security (ICISS 2007), 25-36.
  24. Zhiyong Shan, 鈥淎 Security Administration Framework for Security OS Following CC鈥, Computer Engineering, 2007.5, 33(09):151-163.
  25. Zhiyong Shan, 鈥淩esearch on Framework for Multi-policies鈥, Computer Engineering, 2007.5, 33(09):148-160.
  26. Zhiyong Shan, Shi Wenchang, Liao Bin. 鈥淩esearch on the Hierarchical and Distributed Network Security Management System鈥. Computer Engineering and Applications, 2007.3, 43(2):20-24.
  27. Zhiyong Shan, 鈥淎n Architecture for the Hierarchical and Distributed Network Security Management System鈥, Computer Engineering and Designing, 2007.7, 28(14):3316-3320.
  28. Zhiyong Shan, Yufang Sun, 鈥淪tudy and Implementation of Double-Levels-Cache GFAC鈥, Chinese Journal of Computers, Nov, 2004, 27(11):1576-1584.
  29. Zhiyong Shan, Yufang Sun, 鈥淎n Operating System Oriented RBAC Model and Its Implementation鈥, Journal of Computer Research and Development, Feb, 2004, 41(2):287-298.
  30. Zhiyong Shan, Yufang Sun, 鈥淎 Study of Extending Generalized Framework for Access Control鈥, Journal of Computer Research and Development, Feb, 2003, 40(2):228-234.
  31. Zhiyong Shan, Yufang Sun, 鈥淎 Study of Generalized Environment-Adaptable Multi-Policies Supporting Framework鈥, Journal of Computer Research and Development, Feb, 2003, 40(2):235-244.
  32. Zhiyong Shan, Research on the Framework for Multi-Policies and Practice in Secure Operation System. Phd Thesis, Institute of Software, Chinese Academy of Science 2003. (in Chinese)
  33. Zhiyong Shan, Yufang Sun, 鈥淎 Study of Security Attributes Immediate Revocation in Secure OS鈥, Journal of Computer Research and Development, Dec, 2002, 39(12):1681-1688. (in Chinese)
  34. Wenchang Shi, Yufang Sun, Hongliang Liang, Xiangfeng Zhang, Qingsong Zhao, Zhiyong Shan. Design and Implementation of Secure Linux Kernel Security Functions. Journal of Computer Research and Development, 2001, Vol.38, No.10, 1255-1261.(in Chinese)

Books

  1. Zhiyong Shan, Wenchang Shi. Research in Access Control of Operating Systems. Science Press, Beijing, China, Mar 2009. (in Chinese)
  2. Zhiyong Shan, Zhiqun Guo, E-Commerce Security and Management, China Renmin University Press, Beijing, China, May 2010. (in Chinese)
Professional Experience
  • Aug 2017-Dec 2018, Operating System (麻豆破解版 State University).
  • Aug 2017-Dec 2018, Software Analytics (麻豆破解版 State University).
  • Aug 2016-Dec 2016, Advanced Software Engineering (University of Central Missouri)
  • May 2016-June 2016, Advanced Android Application Programing (University of Central Missouri)
  • Jan 2016-May 2016, Advanced Computer Network and Security (University of Central Missouri)
  • Aug 2015-Dec 2015, Advanced Operating System (University of Central Missouri)
  • Feb 2004-July 2004, Feb 2005-July 2005, Feb 2007-July 2007, Operating System Principles. (Renmin University of China)
  • Sep 2004-Jan 2005, Sep 2005-Jan 2006, Sep 2006-Jan 2007, Computer Basics. (Renmin University of China)
  • Sep 2004-Jan 2005, Linux Kernel Analysis. (Renmin University of China)
  • Feb 2009-July 2009, C Language. (Renmin University of China)
  • Feb 2010-July 2010, Operating System Practices. (Renmin University of China)
  • Feb 2009-July 2009, Feb 2010-July 2010, Feb 2011-July 2011, Feb 2012-July 2012, Feb 2013-July 2013, Database Systems and Application. (Renmin University of China)
  • Sep 2010-Jan 2011, Sep 2011-Jan 2012, Sep 2012-Jan 2013, Software Engineering. (Renmin University of China)
  • Sep 2005-Jan 2006, Sep 2006-Jan 2007, Information Security. (Renmin University of China)
  • Sep 2009-Jan 2010, Sep 2010-Jan 2011, Sep 2011-Jan 2012, Sep 2012-Jan 2013, E-Commerce Security. (Renmin University of China)
Additional Information

Ph.D. Students

  • Hoang Dang 
  • Preethi Santhanam

Master's Students

  • Anusha Konduru
  • Ameya Jaykumar Jadhav

Undergraduate Students

  • Luke Baird
  • Seth Allen Rodgers