Zhiqiang Lin
Zhiqiang Lin
Associate Professor of Computer Science and Engineering, The Ohio State University
Email verificata su cse.ohio-state.edu - Home page
TitoloCitata daAnno
Binary Stirring: Self-randomizing Instruction Addresses of Legacy x86 Binary Code
R Wartell, V Mohan, KW Hamlen, Z Lin
19th ACM Conference on Computer and Communications Security, 2012
Automatic protocol format reverse engineering through context-aware monitored execution
Z Lin, X Jiang, D Xu, X Zhang
In 15th Symposium on Network and Distributed System Security (NDSS, 2008
Automatic reverse engineering of data structures from binary execution
Z Lin, X Zhang, D Xu
Proceedings of the 17th Network and Distributed System Security Symposium, 2010, 2010
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
Y Fu, Z Lin
IEEE Symposium on Security and Privacy, 586 - 600, 2012
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
T Wang, T Wei, Z Lin, W Zou
NDSS, 2009
SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps
D Sounthiraraj, J Sahs, G Greenwood, Z Lin, L Khan
NDSS, 2014
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Z Lin, J Rhee, X Zhang, D Xu, X Jiang
Ndss, 2011
Sgxpectre attacks: Stealing intel secrets from sgx enclaves via speculative execution
G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai
arXiv preprint arXiv:1802.09085, 2018
Polymorphing software by randomizing data structure layout
Z Lin, RD Riley, D Xu
International Conference on Detection of Intrusions and Malware, andá…, 2009
Securing Untrusted Code via Compiler-Agnostic Binary Rewriting
R Wartell, V Mohan, KW Hamlen, Z Lin
28th Annual Computer Security and Applications Conference, 2012
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
E Bauman, G Ayoade, Z Lin
ACM Computing Surveys (CSUR) 48 (1), 10, 2015
Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery
Y Fu, Z Lin
Acm Sigplan Notices 48 (7), 97-110, 2013
Obfuscation resilient binary code reuse through trace-oriented programming
J Zeng, Y Fu, KA Miller, Z Lin, X Zhang, D Xu
Proceedings of the 2013 ACM CCS, 487-498, 2013
Strict control dependence and its effect on dynamic information flow analyses
T Bao, Y Zheng, Z Lin, X Zhang, D Xu
Proceedings of the 19th international symposium on Software testing andá…, 2010
X-force: force-executing binary programs for security applications
F Peng, Z Deng, X Zhang, D Xu, Z Lin, Z Su
23rd {USENIX} Security Symposium ({USENIX} Security 14), 829-844, 2014
Deriving input syntactic structure from execution
Z Lin, X Zhang
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundationsá…, 2008
AutoPaG: towards automated software patch generation with source code root cause identification and repair
Z Lin, X Jiang, D Xu, B Mao, L Xie
Proceedings of the 2nd ACM symposium on Information, computer andá…, 2007
Bridging the semantic gap in virtual machine introspection via online kernel data redirection
Y Fu, Z Lin
ACM Transactions on Information and System Security (TISSEC) 16 (2), 7, 2013
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Z Lin, X Zhang, D Xu
2008 IEEE International Conference on Dependable Systems and Networks Withá…, 2008
OS-SOMMELIER: Memory-Only Operating System Fingerprinting in the Cloud
Y Gu, Y Fu, A Prakash, Z Lin, H Yin
The 3rd ACM Symposium on Cloud Computing (SOCC'12), 2012
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20