Chengyu Song
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2017
- [c22]Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy:
Your state is not mine: a closer look at evading stateful internet censorship. IMC 2017: 114-127 - [c21]Ren Ding, Chenxiong Qian, Chengyu Song, William Harris, Taesoo Kim, Wenke Lee:
Efficient Protection of Path-Sensitive Control Security. USENIX Security Symposium 2017: 131-148 - [c20]Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy:
Detecting Android Root Exploits by Learning from Root Providers. USENIX Security Symposium 2017: 1129-1144 - 2016
- [b1]Chengyu Song:
Preventing exploits against memory corruption vulnerabilities. Georgia Institute of Technology, Atlanta, GA, USA 2016 - [j1]Meng Xu, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, Taesoo Kim:
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques. ACM Comput. Surv. 49(2): 38:1-38:47 (2016) - [c19]Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee:
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. ACM Conference on Computer and Communications Security 2016: 920-932 - [c18]Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris, Taesoo Kim, Wenke Lee:
Enforcing Kernel Security Invariants with Data Flow Integrity. NDSS 2016 - [c17]Chao Zhang, Dawn Song, Scott A. Carr, Mathias Payer, Tongxin Li, Yu Ding, Chengyu Song:
VTrust: Regaining Trust on Virtual Calls. NDSS 2016 - [c16]Chengyu Song, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, Yunheung Paek:
HDFI: Hardware-Assisted Data-Flow Isolation. IEEE Symposium on Security and Privacy 2016: 1-17 - 2015
- [c15]Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee:
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. ACM Conference on Computer and Communications Security 2015: 280-291 - [c14]Chao Zhang, Mehrdad Niknami, Kevin Zhijie Chen, Chengyu Song, Zhaofeng Chen, Dawn Song:
JITScope: Protecting web users from control-flow hijacking attacks. INFOCOM 2015: 567-575 - [c13]Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee:
Preventing Use-after-free with Dangling Pointers Nullification. NDSS 2015 - [c12]Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski:
Exploiting and Protecting Dynamic Code Generation. NDSS 2015 - [c11]Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaofeng Chen, Dawn Song:
VTint: Protecting Virtual Function Tables' Integrity. NDSS 2015 - [c10]Changwoo Min, Sanidhya Kashyap, Byoungyoung Lee, Chengyu Song, Taesoo Kim:
Cross-checking semantic correctness: the case of finding file system bugs. SOSP 2015: 361-377 - [c9]Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee:
Type Casting Verification: Stopping an Emerging Attack Vector. USENIX Security Symposium 2015: 81-96 - 2014
- [c8]Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, Wenke Lee:
A11y Attacks: Exploiting Accessibility in Operating Systems. ACM Conference on Computer and Communications Security 2014: 103-115 - [c7]Tielei Wang, Chengyu Song, Wenke Lee:
Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. DIMVA 2014: 255-275 - [c6]Billy Lau, Simon P. Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva:
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud. USENIX Security Symposium 2014: 33-48 - 2012
- [c5]Chengyu Song, Paul Royal, Wenke Lee:
Impeding Automated Malware Analysis with Environment-sensitive Malware. HotSec 2012 - 2011
- [c4]Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, David Cok, Denis Gopan, David Melski, Wenke Lee, Chengyu Song, Thomas Bracewell, David Hyde, Brian Mastropietro:
PEASOUP: preventing exploits against software of uncertain provenance (position paper). SESS@ICSE 2011: 43-49 - 2010
- [c3]Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye:
Preventing drive-by download via inter-module communication monitoring. AsiaCCS 2010: 124-134
2000 – 2009
- 2008
- [c2]Jianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zou:
Studying Malicious Websites and the Underground Economy on the Chinese Web. WEIS 2008 - 2007
- [c1]Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou:
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. ICICS 2007: 438-451
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-01-17 21:33 CET by the dblp team