Bing Mao
Bing Mao
Computer Science, Nanjing University
Zweryfikowany adres z nju.edu.cn
Cytowane przez
Cytowane przez
DROP: Detecting return-oriented programming malicious code
P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie
International Conference on Information Systems Security, 163-177, 2009
Detecting code reuse in android applications using component-based control flow graph
X Sun, Y Zhongyang, Z Xin, B Mao, L Xie
IFIP international information security conference, 142-155, 2014
Role-based access control model for CSCW systems
C Li, Y Zhan, B Mao, L Xie
RUAN JIAN XUE BAO 11 (7), 931-937, 2000
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware
Y Zhongyang, Z Xin, B Mao, L Xie
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018
JITDefender: A defense against JIT spraying attacks
P Chen, Y Fang, B Mao, L Xie
IFIP International Information Security Conference, 142-153, 2011
AutoPaG: towards automated software patch generation with source code root cause identification and repair
Z Lin, X Jiang, D Xu, B Mao, L Xie
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Automatic construction of jump-oriented programming shellcode (on the x86)
P Chen, X Xing, B Mao, L Xie, X Shen, X Yin
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
System call redirection: A practical approach to meeting real-world virtual machine introspection needs
R Wu, P Chen, P Liu, B Mao
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
Efficient detection of the return-oriented programming malicious code
P Chen, X Xing, H Han, B Mao, L Xie
International Conference on Information Systems Security, 140-155, 2010
Textlogger: inferring longer inputs on touch screen using motion sensors
D Ping, X Sun, B Mao
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
A practical approach for adaptive data structure layout randomization
P Chen, J Xu, Z Lin, D Xu, B Mao, P Liu
European Symposium on Research in Computer Security, 69-89, 2015
Brick: A binary tool for run-time detecting and locating integer-based vulnerability
P Chen, Y Wang, Z Xin, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 208-215, 2009
JITSafe: a framework against Just‐in‐time spraying attacks
P Chen, R Wu, B Mao
IET Information Security 7 (4), 283-292, 2013
赵亮, 茅兵, 谢立
计算机工程 30 (2), 1-2, 2004
Detect android malware variants using component based topology graph
T Shen, Y Zhongyang, Z Xin, B Mao, H Huang
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
茅兵, 杜兴, 谢立
计算机研究与发展 33 (4), 241-247, 1996
Detection, classification and characterization of android malware using api data dependency
Y Li, T Shen, X Sun, X Pan, B Mao
International Conference on Security and Privacy in Communication Systems, 23-40, 2015
Impeding behavior-based malware analysis via replacement attacks to malware specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
Journal of Computer Virology and Hacking Techniques 13 (3), 193-207, 2017
Postmortem Program Analysis with {Hardware-Enhanced}{Post-Crash} Artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20