Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shuaifu Dai is active.

Publication


Featured researches published by Shuaifu Dai.


international conference on wireless communications, networking and mobile computing | 2010

Behavior-Based Malware Detection on Mobile Phone

Shuaifu Dai; Yaxin Liu; Tielei Wang; Tao Wei; Wei Zou

Mobile malware is rapidly developing, but current anti-virus products in mobile devices still use the signature-based solutions, which usually need a large database and cannot detect malware variants. In this paper, we proposed a behavior-based malware detection system for Windows Mobile platform called WMMD (Windows Mobile Malware Detection system). WMMD uses API interception techniques to dynamic analyze applications behavior and compare it with malicious behavior characteristics library using model checking. The experiment results show that WMMD can effectively detect the obfuscated or packed malware variants that cannot be detected by other main stream anti-virus products.


ieee symposium on security and privacy | 2012

A Framework to Eliminate Backdoors from Response-Computable Authentication

Shuaifu Dai; Tao Wei; Chao Zhang; Tielei Wang; Yu Ding; Zhenkai Liang; Wei Zou

Response-computable authentication (RCA) is a two-party authentication model widely adopted by authentication systems, where an authentication system independently computes the expected user response and authenticates a user if the actual user response matches the expected value. Such authentication systems have long been threatened by malicious developers who can plant backdoors to bypass normal authentication, which is often seen in insider-related incidents. A malicious developer can plant backdoors by hiding logic in source code, by planting delicate vulnerabilities, or even by using weak cryptographic algorithms. Because of the common usage of cryptographic techniques and code protection in authentication modules, it is very difficult to detect and eliminate backdoors from login systems. In this paper, we propose a framework for RCA systems to ensure that the authentication process is not affected by backdoors. Our approach decomposes the authentication module into components. Components with simple logic are verified by code analysis for correctness, components with cryptographic/ obfuscated logic are sand boxed and verified through testing. The key component of our approach is NaPu, a native sandbox to ensure pure functions, which protects the complex and backdoor-prone part of a login module. We also use a testing-based process to either detect backdoors in the sand boxed component or verify that the component has no backdoors that can be used practically. We demonstrated the effectiveness of our approach in real-world applications by porting and verifying several popular login modules into this framework.


Archive | 2008

Malicious code detection method

Tao Wei; Shuaifu Dai; Wei Zou; Tielei Wang; Chao Zhang; Xinjian Zhao; Jiajing Li


Archive | 2012

High-efficiency dynamic software vulnerability exploiting method

Shuaifu Dai; Yu Ding; Yichun Li; Tielei Wang; Tao Wei; Chao Zhang; Wei Zou


Archive | 2009

Credible electronic transaction method and transaction system

Tao Wei; Shuaifu Dai; Wei Zou; Tielei Wang; Chao Zhang; Xinjian Zhao; Jiajing Li


Archive | 2012

Method for capturing computer software vulnerability exploitation and system

Yu Ding; Tao Wei; Chao Zhang; Shuaifu Dai


Archive | 2010

Method for discovering software vulnerabilities

Shuaifu Dai; Yv Ding; Yichun Li; Tielei Wang; Tao Wei; Chao Zhang; Wei Zou


Journal of Convergence Information Technology | 2013

DroidProbe: A lightweight suspicious behavior detector for Android applications

Shuaifu Dai; Tao Zhang; Tao Wei; Wei Zou


Computing and Convergence Technology (ICCCT), 2012 7th International Conference on | 2013

DroidLogger: Reveal suspicious behavior of Android applications via instrumentation

Shuaifu Dai; Tao Wei; Wei Zou


Archive | 2009

Program decomposing process

Tielei Wang; Tao Wei; Wei Zou; Jiajing Li; Xinjian Zhao; Chao Zhang; Shuaifu Dai

Collaboration


Dive into the Shuaifu Dai's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zhenkai Liang

National University of Singapore

View shared research outputs
Researchain Logo
Decentralizing Knowledge