Obserwuj
Zhenkai Liang
Zhenkai Liang
Zweryfikowany adres z comp.nus.edu.sg - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
10732008
Jump-oriented programming: a new class of code-reuse attack
T Bletsch, X Jiang, VW Freeh, Z Liang
Proceedings of the 6th ACM symposium on information, computer and …, 2011
8332011
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
J Caballero, H Yin, Z Liang, D Song
Proceedings of the 14th ACM conference on Computer and communications …, 2007
5802007
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
2016 IEEE Symposium on Security and Privacy (SP), 969-986, 2016
4782016
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection: Countering the Largest Security Threat, 65-88, 2008
3252008
Fast and automated generation of attack signatures: A basis for building self-protecting servers
Z Liang, R Sekar
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2642005
Automatic Generation of {Data-Oriented} Exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th USENIX Security Symposium (USENIX Security 15), 177-192, 2015
2352015
HookFinder: Identifying and understanding malware hooking behaviors
H Yin, Z Liang, D Song
NDSS 2008, 2008
2082008
Neural nets can learn function type signatures from binaries
ZL Chua, S Shen, P Saxena, Z Liang
26th USENIX Security Symposium (USENIX Security 17), 99-116, 2017
1702017
Neural network inversion in adversarial setting via background knowledge alignment
Z Yang, J Zhang, EC Chang, Z Liang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1642019
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
D Brumley, J Caballero, Z Liang, J Newsome, D Song
USENIX Security Symposium 15, 2007
1642007
Isolated program execution: An application transparent approach for executing untrusted programs
Z Liang, VN Venkatakrishnan, R Sekar
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
1512003
Monet: a user-oriented behavior-based malware variants detection system for android
M Sun, X Li, JCS Lui, RTB Ma, Z Liang
IEEE Transactions on Information Forensics and Security 12 (5), 1103-1112, 2016
1432016
Darwin: An approach to debugging evolving programs
D Qi, A Roychoudhury, Z Liang, K Vaswani
ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (3), 1-29, 2012
1412012
AirBag: Boosting Smartphone Resistance to Malware Infection.
C Wu, Y Zhou, K Patel, Z Liang, X Jiang
NDSS, 2014
1182014
BitScope: Automatically dissecting malicious binaries
D Brumley, C Hartwig, MG Kang, Z Liang, J Newsome, P Poosankam, ...
Technical Report CS-07-133, School of Computer Science, Carnegie Mellon …, 2007
1162007
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
W Sun, Z Liang, VN Venkatakrishnan, R Sekar
NDSS, 2005
1052005
Phishing-alarm: Robust and efficient phishing detection via page component similarity
J Mao, W Tian, P Li, T Wei, Z Liang
IEEE Access 5, 17020-17030, 2017
1002017
Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
Z Liang, R Sekar
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-224, 2005
912005
DTaint: detecting the taint-style vulnerability in embedded device firmware
K Cheng, Q Li, L Wang, Q Chen, Y Zheng, L Sun, Z Liang
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
792018
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20