DROP: Detecting return-oriented programming malicious code P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie Information Systems Security: 5th International Conference, ICISS 2009 …, 2009 | 297 | 2009 |
JITDefender: A defense against JIT spraying attacks P Chen, Y Fang, B Mao, L Xie Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011 | 66 | 2011 |
Automatic construction of jump-oriented programming shellcode (on the x86) P Chen, X Xing, B Mao, L Xie, X Shen, X Yin Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 63 | 2011 |
Postmortem program analysis with {Hardware-Enhanced}{Post-Crash} artifacts J Xu, D Mu, X Xing, P Liu, P Chen, B Mao 26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017 | 61 | 2017 |
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump J Xu, D Mu, P Chen, X Xing, P Wang, P Liu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 57 | 2016 |
A Practical Approach for Adaptive Data Structure Layout Randomization PL Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao ESORICS'15, 2015 | 52* | 2015 |
System call redirection: A practical approach to meeting real-world virtual machine introspection needs R Wu, P Chen, P Liu, B Mao 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 51 | 2014 |
Efficient detection of the return-oriented programming malicious code P Chen, X Xing, H Han, B Mao, L Xie Information Systems Security: 6th International Conference, ICISS 2010 …, 2010 | 50 | 2010 |
Brick: A binary tool for run-time detecting and locating integer-based vulnerability P Chen, Y Wang, Z Xin, B Mao, L Xie 2009 International Conference on Availability, Reliability and Security, 208-215, 2009 | 49 | 2009 |
Semantics-preserving reinforcement learning attack against graph neural networks for malware detection L Zhang, P Liu, YH Choi, P Chen IEEE Transactions on Dependable and Secure Computing 20 (2), 1390-1402, 2022 | 45 | 2022 |
JITSafe: a framework against Just-in-time spraying attacks P Chen, R Wu, B Mao Information Security, IET 7 (4), 283 - 292, 2013 | 42 | 2013 |
IntFinder: Automatically detecting integer bugs in x86 binary program P Chen, H Han, Y Wang, X Shen, X Yin, B Mao, L Xie Information and Communications Security, 336-345, 2009 | 36 | 2009 |
Return-oriented rootkit without returns (on the x86) P Chen, X Xing, B Mao, L Xie Information and Communications Security: 12th International Conference …, 2010 | 30 | 2010 |
Dancing with wolves: Towards practical event-driven vmm monitoring L Deng, P Liu, J Xu, P Chen, Q Zeng Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017 | 28 | 2017 |
RIM: A Method to Defend from JIT Spraying Attack R Wu, P Chen, B Mao, L Xie Availability, Reliability and Security (ARES), 143 - 148, 2012 | 25 | 2012 |
Traffic controller: A practical approach to block network covert timing channel Y Wang, P Chen, Y Ge, B Mao, L Xie 2009 International Conference on Availability, Reliability and Security, 349-354, 2009 | 18 | 2009 |
HARM: Hardware-assisted continuous re-randomization for microcontrollers J Shi, L Guan, W Li, D Zhang, P Chen, N Zhang 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 520-536, 2022 | 15 | 2022 |
Method and apparatus for handling bugs K Chen, J Tao, B Chen, P Chen US Patent App. 14/568,738, 2015 | 13 | 2015 |
ROPNN: Detection of ROP payloads using deep neural networks X Li, Z Hu, H Wang, Y Fu, P Chen, M Zhu, P Liu arXiv preprint arXiv:1807.11110, 2018 | 12 | 2018 |
RandHyp: Preventing Attacks via Xen Hypercall Interface F Wang, P Chen, B Mao, L Xie SEC 2012, 138-149, 2012 | 12 | 2012 |