Kevin Zhijie Chen
Kevin Zhijie Chen
Email verificata su amazon.com - Home page
Titolo
Citata da
Citata da
Anno
Contextual policy enforcement in android applications with permission event graphs.
KZ Chen, NM Johnson, V D'Silva, S Dai, K MacNamara, TR Magrino, ...
NDSS 234, 2013
1882013
MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery.
CY Cho, D Babic, P Poosankam, KZ Chen, EXJ Wu, D Song
USENIX Security Symposium 139, 2011
1242011
VTint: Defending virtual function tables’ integrity
C Zhang, C Song, KZ Chen, Z Chen, D Song
Symposium on Network and Distributed System Security (NDSS) 160, 173-176, 2015
119*2015
Differential slicing: Identifying causal execution differences for security applications
NM Johnson, J Caballero, KZ Chen, S McCamant, P Poosankam, ...
2011 IEEE Symposium on Security and Privacy, 347-362, 2011
902011
WebPatrol: Automated collection and replay of web-based malware scenarios
KZ Chen, G Gu, J Zhuge, J Nazario, X Han
Proceedings of the 6th ACM Symposium on Information, Computer and…, 2011
562011
JITScope: Protecting web users from control-flow hijacking attacks
C Zhang, M Niknami, KZ Chen, C Song, Z Chen, D Song
2015 IEEE Conference on Computer Communications (INFOCOM), 567-575, 2015
82015
面向蜜场环境的网络攻击流重定向机制的研究与实现
陆腾飞 [1, 陈志杰 [1, 诸葛建伟 [1, 韩心慧 [1, 邹维 [1
南京邮电大学学报: 自然科学版 29 (003), 14-20, 2009
82009
{ASPIRE}: Iterative Specification Synthesis for Security
K Chen, W He, D Akhawe, V D'Silva, P Mittal, D Song
15th Workshop on Hot Topics in Operating Systems (HotOS {XV}), 2015
32015
微软漏洞殃及谷歌
诸葛建伟, 宋程昱, 陈志杰
中国教育网络, 52-54, 2010
2010
DIMACS Workshop on Streaming Data Analysis and Mining
FS Roberts, R Motwani, M Datar, K Chen, L O'Callaghan, S Kannan
基于脚本 Opcode 动态插装的 Heapspray 型网页木马检测方法
陈志杰, 宋程昱, 韩心慧, 诸葛建伟
Il sistema al momento non pu eseguire l'operazione. Riprova pi tardi.
Articoli 1–11