Chengyu Song
Chengyu Song
Verified email at cs.ucr.edu - Homepage
Title
Cited by
Cited by
Year
Studying malicious websites and the underground economy on the Chinese web
J Zhuge, T Holz, C Song, J Guo, X Han, W Zou
Managing information risk and the economics of security, 225-244, 2009
1532009
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks
K Lu, C Song, B Lee, SP Chung, T Kim, W Lee
2015 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2015
1182015
VTint: Defending virtual function tables' integrity
C Zhang, C Song, KZ Chen, Z Chen, D Song
Symposium on Network and Distributed System Security (NDSS), 2015
107*2015
Spectre Returns! Speculation Attacks using the Return Stack Buffer
EM Koruyeh, KN Khasawneh, C Song, N Abu-Ghazaleh
USENIX Workshop on Offensive Technologies (WOOT), 2018
1032018
Preventing Use-after-free with Dangling Pointers Nullification
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
Symposium on Network and Distributed System Security (NDSS), 2015
1022015
Enforcing Kernel Security Invariants with Data Flow Integrity
C Song, B Lee, K Lu, W Harris, T Kim, W Lee
Symposium on Network and Distributed System Security (NDSS), 2016
812016
Collecting autonomous spreading malware using high-interaction honeypots
J Zhuge, T Holz, X Han, C Song, W Zou
International Conference on Information and Communications Security, 438-451, 2007
802007
Mimesis Aegis: A Mimicry Privacy Shield–A System’s Approach to Data Privacy on Public Cloud
B Lau, S Chung, C Song, Y Jang, W Lee, A Boldyreva
23rd USENIX conference on Security Symposium, 33-48, 2014
682014
VTrust: Regaining Trust on Virtual Calls
C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song
Symposium on Network and Distributed System Security (NDSS), 2016
652016
HDFI: Hardware-Assisted Data-flow Isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 2016
632016
Toward engineering a secure android ecosystem: A survey of existing techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016
612016
Type Casting Verification: Stopping an Emerging Attack Vector
B Lee, C Song, T Kim, W Lee
24th USENIX Security Symposium (USENIX Security 15), 2015
592015
HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle
J Zhuge, X Han, Y Zhou, C Song, J Guo, W Zou
JOURNAL-CHINA INSTITUTE OF COMMUNICATIONS 28 (12), 8, 2007
59*2007
A11y attacks: Exploiting accessibility in operating systems
Y Jang, C Song, SP Chung, T Wang, W Lee
2014 ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2014
562014
Cross-checking semantic correctness: The case of finding file system bugs
C Min, S Kashyap, B Lee, C Song, T Kim
25th Symposium on Operating Systems Principles (SOSP), 361-377, 2015
542015
Exploiting and Protecting Dynamic Code Generation
C Song, C Zhang, T Wang, W Lee, D Melski
Symposium on Network and Distributed System Security (NDSS), 2015
502015
Efficient Protection of Path-Sensitive Control Security
R Ding, C Qian, C Song, B Harris, T Kim, W Lee
26th USENIX Security Symposium (USENIX Security 17), 2017
482017
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages
K Lu, C Song, T Kim, W Lee
2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2016
482016
Mactans: Injecting Malware Into iOS Devices via Malicious Chargers
B Lau, Y Jang, C Song, T Wang, PH Chung, P Royal
BlackHat USA 2013, 2013
452013
Safespec: Banishing the spectre of a meltdown with leakage-free speculation
KN Khasawneh, EM Koruyeh, C Song, D Evtyushkin, D Ponomarev, ...
2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019
312019
The system can't perform the operation now. Try again later.
Articles 1–20