Zhenkai Liang
Zhenkai Liang
Email verificata su comp.nus.edu.sg - Home page
TitoloCitata daAnno
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
International Conference on Information Systems Security, 1-25, 2008
7842008
Jump-oriented programming: a new class of code-reuse attack
T Bletsch, X Jiang, VW Freeh, Z Liang
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
4332011
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
J Caballero, H Yin, Z Liang, D Song
Proceedings of the 14th ACM conference on Computer and communications …, 2007
4202007
Fast and automated generation of attack signatures: A basis for building self-protecting servers
Z Liang, R Sekar
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2392005
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection, 65-88, 2008
2272008
HookFinder: Identifying and understanding malware hooking behaviors
H Yin, Z Liang, D Song
NDSS 2008, 2008
1762008
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
2016 IEEE Symposium on Security and Privacy (SP), 969-986, 2016
1512016
Isolated program execution: An application transparent approach for executing untrusted programs
Z Liang, VN Venkatakrishnan, R Sekar
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
1422003
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
D Brumley, J Caballero, Z Liang, J Newsome, D Song
USENIX Security Symposium, 15, 2007
1352007
Darwin: An approach to debugging evolving programs
D Qi, A Roychoudhury, Z Liang, K Vaswani
ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (3), 19, 2012
1082012
Automatic generation of data-oriented exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th {USENIX} Security Symposium ({USENIX} Security 15), 177-192, 2015
972015
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
W Sun, Z Liang, VN Venkatakrishnan, R Sekar
NDSS, 2005
972005
BitScope: Automatically dissecting malicious binaries
D Brumley, C Hartwig, MG Kang, Z Liang, J Newsome, P Poosankam, ...
Technical Report CS-07-133, School of Computer Science, Carnegie Mellon …, 2007
962007
AirBag: Boosting Smartphone Resistance to Malware Infection.
C Wu, Y Zhou, K Patel, Z Liang, X Jiang
NDSS, 2014
862014
Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
Z Liang, R Sekar
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-224, 2005
802005
Test generation to expose changes in evolving programs
D Qi, A Roychoudhury, Z Liang
Proceedings of the IEEE/ACM international conference on Automated software …, 2010
552010
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements
X Dong, M Tran, Z Liang, X Jiang
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
452011
Towards fine-grained access control in javascript contexts
K Patil, X Dong, X Li, Z Liang, X Jiang
2011 31st International Conference on Distributed Computing Systems, 720-729, 2011
422011
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks
Y Ding, T Wei, TL Wang, Z Liang, W Zou
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
422010
Monet: a user-oriented behavior-based malware variants detection system for android
M Sun, X Li, JCS Lui, RTB Ma, Z Liang
IEEE Transactions on Information Forensics and Security 12 (5), 1103-1112, 2016
402016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20