Obserwuj
Ping Chen
Tytuł
Cytowane przez
Cytowane przez
Rok
DROP: Detecting return-oriented programming malicious code
P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
2972009
JITDefender: A defense against JIT spraying attacks
P Chen, Y Fang, B Mao, L Xie
Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011
662011
Automatic construction of jump-oriented programming shellcode (on the x86)
P Chen, X Xing, B Mao, L Xie, X Shen, X Yin
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
632011
Postmortem program analysis with {Hardware-Enhanced}{Post-Crash} artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017
612017
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
572016
A Practical Approach for Adaptive Data Structure Layout Randomization
PL Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao
ESORICS'15, 2015
52*2015
System call redirection: A practical approach to meeting real-world virtual machine introspection needs
R Wu, P Chen, P Liu, B Mao
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
512014
Efficient detection of the return-oriented programming malicious code
P Chen, X Xing, H Han, B Mao, L Xie
Information Systems Security: 6th International Conference, ICISS 2010 …, 2010
502010
Brick: A binary tool for run-time detecting and locating integer-based vulnerability
P Chen, Y Wang, Z Xin, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 208-215, 2009
492009
Semantics-preserving reinforcement learning attack against graph neural networks for malware detection
L Zhang, P Liu, YH Choi, P Chen
IEEE Transactions on Dependable and Secure Computing 20 (2), 1390-1402, 2022
452022
JITSafe: a framework against Just-in-time spraying attacks
P Chen, R Wu, B Mao
Information Security, IET 7 (4), 283 - 292, 2013
422013
IntFinder: Automatically detecting integer bugs in x86 binary program
P Chen, H Han, Y Wang, X Shen, X Yin, B Mao, L Xie
Information and Communications Security, 336-345, 2009
362009
Return-oriented rootkit without returns (on the x86)
P Chen, X Xing, B Mao, L Xie
Information and Communications Security: 12th International Conference …, 2010
302010
Dancing with wolves: Towards practical event-driven vmm monitoring
L Deng, P Liu, J Xu, P Chen, Q Zeng
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017
282017
RIM: A Method to Defend from JIT Spraying Attack
R Wu, P Chen, B Mao, L Xie
Availability, Reliability and Security (ARES), 143 - 148, 2012
252012
Traffic controller: A practical approach to block network covert timing channel
Y Wang, P Chen, Y Ge, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 349-354, 2009
182009
HARM: Hardware-assisted continuous re-randomization for microcontrollers
J Shi, L Guan, W Li, D Zhang, P Chen, N Zhang
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 520-536, 2022
152022
Method and apparatus for handling bugs
K Chen, J Tao, B Chen, P Chen
US Patent App. 14/568,738, 2015
132015
ROPNN: Detection of ROP payloads using deep neural networks
X Li, Z Hu, H Wang, Y Fu, P Chen, M Zhu, P Liu
arXiv preprint arXiv:1807.11110, 2018
122018
RandHyp: Preventing Attacks via Xen Hypercall Interface
F Wang, P Chen, B Mao, L Xie
SEC 2012, 138-149, 2012
122012
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20