Bing Mao
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2017
- [j6]Yongfeng Li, Jinbin Ouyang, Bing Mao, Kai Ma, Shanqing Guo:
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks. ICST Trans. Security Safety 4(11): e2 (2017) - [j5]Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Impeding behavior-based malware analysis via replacement attacks to malware specifications. J. Computer Virology and Hacking Techniques 13(3): 193-207 (2017) - [c31]Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu:
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon. DSN 2017: 451-462 - [c30]Junjie Tang, Xingmin Cui, Ziming Zhao, Shanqing Guo, Xin-Shun Xu, Chengyu Hu, Tao Ban, Bing Mao:
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps. ICST 2017: 492-499 - [c29]Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, Bing Mao:
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. USENIX Security Symposium 2017: 17-32 - 2016
- [c28]Yongfeng Li, Jinbin Ouyang, Shanqing Guo, Bing Mao:
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling. SecureComm 2016: 637-654 - 2015
- [c27]Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications. ACNS 2015: 497-517 - [c26]Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu:
A Practical Approach for Adaptive Data Structure Layout Randomization. ESORICS (1) 2015: 69-89 - [c25]Yongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao:
Detection, Classification and Characterization of Android Malware Using API Data Dependency. SecureComm 2015: 23-40 - [c24]Dan Ping, Xin Sun, Bing Mao:
TextLogger: inferring longer inputs on touch screen using motion sensors. WISEC 2015: 24:1-24:12 - 2014
- [c23]
- [c22]Wenbiao Ding, Xiao Xing, Ping Chen, Zhi Xin, Bing Mao:
Automatic construction of printable return-oriented programming payload. MALWARE 2014: 18-25 - [c21]Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie:
Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph. SEC 2014: 142-155 - [c20]Xuerui Pan, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang:
Defensor: Lightweight and Efficient Security-Enhanced Framework for Android. TrustCom 2014: 260-267 - [c19]Tong Shen, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang:
Detect Android Malware Variants Using Component Based Topology Graph. TrustCom 2014: 406-413 - 2013
- [j4]Ping Chen, Rui Wu, Bing Mao:
JITSafe: a framework against Just-in-time spraying attacks. IET Information Security 7(4): 283-292 (2013) - [c18]Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie:
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware. AsiaCCS 2013: 353-358 - 2012
- [j3]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:
Replacement attacks: automatically evading behavior-based software birthmark. Int. J. Inf. Sec. 11(5): 293-304 (2012) - [c17]
- [c16]Ping Chen, Dongyan Xu, Bing Mao:
CloudER: a framework for automatic software vulnerability location and patching in the cloud. AsiaCCS 2012: 50 - [c15]Feifei Wang, Ping Chen, Bing Mao, Li Xie:
RandHyp: Preventing Attacks via Xen Hypercall Interface. SEC 2012: 138-149 - 2011
- [c14]Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen, Xinchun Yin:
Automatic construction of jump-oriented programming shellcode (on the x86). AsiaCCS 2011: 20-29 - [c13]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:
Replacement Attacks on Behavior Based Software Birthmark. ISC 2011: 1-16 - [c12]
- 2010
- [c11]Ping Chen, Xiao Xing, Bing Mao, Li Xie:
Return-Oriented Rootkit without Returns (on the x86). ICICS 2010: 340-354 - [c10]Ping Chen, Xiao Xing, Hao Han, Bing Mao, Li Xie:
Efficient Detection of the Return-Oriented Programming Malicious Code. ICISS 2010: 140-155 - [c9]Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie:
Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation. ISC 2010: 181-195
2000 – 2009
- 2009
- [c8]
- [c7]
- [c6]Ping Chen, Hao Han, Yi Wang, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie:
IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program. ICICS 2009: 336-345 - [c5]Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie:
DROP: Detecting Return-Oriented Programming Malicious Code. ICISS 2009: 163-177 - 2006
- [c4]Zhiqiang Lin, Bing Mao, Li Xie:
A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. ARES 2006: 348-357 - [c3]Nai Xia, Bing Mao, Qingkai Zeng, Li Xie:
Efficient and Practical Control Flow Monitoring for Program Security. ASIAN 2006: 90-104 - [c2]Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie:
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. ISC 2006: 17-31 - 2005
- [j2]Zhiqiang Lin, Chao Wang, Bing Mao, Li Xie:
A policy flexible architecture for secure operating system. Operating Systems Review 39(3): 24-33 (2005) - 2004
- [j1]Jiannong Cao, Ying Liu, Li Xie, Bing Mao, Kang Zhang:
The design and implementation of a runtime system for graph-oriented parallel and distributed programming. Journal of Systems and Software 72(3): 389-399 (2004)
1990 – 1999
- 1999
- [c1]Chengkai Li, Bing Mao, Daoxu Chen, Li Xie:
Object Mapping for Layered Cooperative Systems. TOOLS (31) 1999: 67-76
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-04-19 21:55 CEST by the dblp team