Zheng Leong Chua
TitoloCitata daAnno
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
2016 IEEE Symposium on Security and Privacy (SP), 969-986, 2016
1662016
Preventing page faults from telling your secrets
S Shinde, ZL Chua, V Narayanan, P Saxena
Proceedings of the 11th ACM on Asia Conference on Computer andá…, 2016
1092016
Automatic generation of data-oriented exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th {USENIX} Security Symposium ({USENIX} Security 15), 177-192, 2015
1042015
A Look at Targeted Attacks Through the Lense of an {NGO}
S Le Blond, A Uritesc, C Gilbert, ZL Chua, P Saxena, E Kirda
23rd {USENIX} Security Symposium ({USENIX} Security 14), 543-558, 2014
562014
Neural nets can learn function type signatures from binaries
ZL Chua, S Shen, P Saxena, Z Liang
26th {USENIX} Security Symposium ({USENIX} Security 17), 99-116, 2017
422017
Preventing your faults from telling your secrets: Defenses against pigeonhole attacks
S Shinde, ZL Chua, V Narayanan, P Saxena
arXiv preprint arXiv:1506.04832, 2015
222015
The Web/Local Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communicationsá…, 2016
142016
Understanding Rowhammer attacks through the lens of a unified reference framework
X Lou, F Zhang, ZL Chua, Z Liang, Y Cheng, Y Zhou
arXiv preprint arXiv:1901.03538, 2019
32019
Data-Oriented Programming
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
On the Expressiveness of Non-Control Data Attacks, 2016
22016
One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics.
ZL Chua, Y Wang, T Baluta, P Saxena, Z Liang, P Su
NDSS, 2019
12019
Fuzzing Program Logic Deeply Hidden in Binary Program Stages
Y Wang, ZL Chua, Y Liu, P Su, Z Liang
2019 IEEE 26th International Conference on Software Analysis, Evolution andá…, 2019
2019
Enabling practical experimentation in cyber-security training
J Mao, ZL Chua, Z Liang
2017 IEEE Conference on Dependable and Secure Computing, 516-517, 2017
2017
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software
H Hu, ZL Chua, Z Liang, P Saxena
European Symposium on Research in Computer Security, 312-331, 2015
2015
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation
VLL Thing, ZL Chua
IFIP International Information Security Conference, 217-230, 2013
2013
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–14