default search action
Zhiqiang Lin
- > Home > Persons > Zhiqiang Lin
Publications
- 2024
- [j48]Yang Zhou, Cheng Xu, Zhiqiang Lin, Xinwei He, Hui Huang:
Point-StyleGAN: Multi-scale point cloud synthesis with style modulation. Comput. Aided Geom. Des. 111: 102309 (2024) - [j47]Ada Lamba, Max Taylor, Vincent Beardsley, Jacob Bambeck, Michael D. Bond, Zhiqiang Lin:
Cocoon: Static Information Flow Control in Rust. Proc. ACM Program. Lang. 8(OOPSLA1): 166-193 (2024) - [j46]Xin Jin, Zhiqiang Lin:
SimLLM: Calculating Semantic Similarity in Code Summaries using a Large Language Model-Based Approach. Proc. ACM Softw. Eng. 1(FSE): 1376-1399 (2024) - [j45]Zhiqiang Lin, Zhouyan He, Chongchong Jin, Ting Luo, Yeyao Chen:
Joint Luminance-Saliency Prior and Attention for Underwater Image Quality Assessment. Remote. Sens. 16(16): 3021 (2024) - [j44]Lianghao Ji, Zhiqiang Lin, Cuijuan Zhang, Shasha Yang, Jun Li, Huaqing Li:
Data-Based Optimal Consensus Control for Multiagent Systems With Time Delays: Using Prioritized Experience Replay. IEEE Trans. Syst. Man Cybern. Syst. 54(5): 3244-3256 (2024) - [c157]Chao Wang, Yue Zhang, Zhiqiang Lin:
RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop. AsiaCCS 2024 - [c156]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. WOOT @ USENIX Security Symposium 2024: 149-169 - [i22]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. CoRR abs/2401.15289 (2024) - [i21]Yifan Mao, Mengya Zhang, Shaileshh Bojja Venkatakrishnan, Zhiqiang Lin:
Flashback: Enhancing Proposer-Builder Design with Future-Block Auctions in Proof-of-Stake Ethereum. CoRR abs/2405.09465 (2024) - 2023
- [j43]Zhiqiang Lin, Fan Yang, Xuyang Wu, Jinsong Su, Xiaoyue Wang:
A Feedback-Enhanced Two-Stage Framework for judicial machine reading comprehension. Eng. Appl. Artif. Intell. 123(Part A): 106178 (2023) - [j42]Haoran Lu, Qingchuan Zhao, Yongliang Chen, Xiaojing Liao, Zhiqiang Lin:
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding. Proc. ACM Meas. Anal. Comput. Syst. 7(1): 18:1-18:27 (2023) - [c155]Pallavi Sivakumaran, Chaoshun Zuo, Zhiqiang Lin, Jorge Blasco:
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide. AsiaCCS 2023: 1004-1015 - [c154]Ali Ahad, Gang Wang, Chung Hwan Kim, Suman Jana, Zhiqiang Lin, Yonghwi Kwon:
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation. ASPLOS (4) 2023: 169-188 - [c153]Yue Zhang, Yuqing Yang, Zhiqiang Lin:
Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs. CCS 2023: 2411-2425 - [c152]Chao Wang, Yue Zhang, Zhiqiang Lin:
Uncovering and Exploiting Hidden APIs in Mobile Super Apps. CCS 2023: 2471-2485 - [c151]Zhiqiang Lin, Xiaojing Liao:
SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps. CCS 2023: 3655-3656 - [c150]Wubing Wang, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV. DIMVA 2023: 46-66 - [c149]Shimpei Fukuoka, Masayuki Uchiyama, Geunsook Park, Alan Chih-Wei Hsiung, Mourad Daoudi, Zhiqiang Lin, Vincent C. Venezia, Lindsay A. Grant:
A 2.2um three-wafer stacked back side illuminated voltage domain global shutter CMOS image sensor. Imaging Sensors and Systems 2023: 1-5 - [c148]Zhuo Zhang, Brian Zhang, Wen Xu, Zhiqiang Lin:
Demystifying Exploitable Bugs in Smart Contracts. ICSE 2023: 615-627 - [c147]Chao Wang, Ronny Ko, Yue Zhang, Yuqing Yang, Zhiqiang Lin:
Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis. ICSE 2023: 932-944 - [c146]Mohit Kumar Jangid, Yue Zhang, Zhiqiang Lin:
Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing. NDSS 2023 - [c145]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin:
Thwarting Smartphone SMS Attacks at the Radio Interface Layer. NDSS 2023 - [c144]Md Sakib Anwar, Chaoshun Zuo, Carter Yagemann, Zhiqiang Lin:
Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating. RAID 2023: 17-31 - [c143]Erick Bauman, Jun Duan, Kevin W. Hamlen, Zhiqiang Lin:
Renewable Just-In-Time Control-Flow Integrity. RAID 2023: 580-594 - [c142]Haoran Lu, Qingchuan Zhao, Yongliang Chen, Xiaojing Liao, Zhiqiang Lin:
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding. SIGMETRICS (Abstracts) 2023: 45-46 - [c141]Jianyi Zhang, Yuchen Wang, Yazhou Tu, Sara Rampazzi, Zhiqiang Lin, Insup Lee, Xiali Hei:
ADC-Bank: Detecting Acoustic Out-of-Band Signal Injection on Inertial Sensors. SmartSP 2023: 53-72 - [c140]Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang:
Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract. USENIX Security Symposium 2023: 1757-1774 - [c139]Chaoshun Zuo, Chao Wang, Zhiqiang Lin:
A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games. USENIX Security Symposium 2023: 3925-3942 - [c138]Haohuang Wen, Zhiqiang Lin:
Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries. USENIX Security Symposium 2023: 3997-4014 - [c137]Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, Yinqian Zhang, Zhiqiang Lin:
Reusable Enclaves for Confidential Serverless Computing. USENIX Security Symposium 2023: 4015-4032 - [c136]Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang:
Controlled Data Races in Enclaves: Attacks and Detection. USENIX Security Symposium 2023: 4069-4086 - [c135]Chao Wang, Yue Zhang, Zhiqiang Lin:
One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat. USENIX Security Symposium 2023: 6629-6646 - [e4]Zhiqiang Lin, Xiaojing Liao:
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, SaTS 2023, Copenhagen, Denmark, 26 November 2023. ACM 2023 [contents] - [e3]Fengjun Li, Kaitai Liang, Zhiqiang Lin, Sokratis K. Katsikas:
Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 462, Springer 2023, ISBN 978-3-031-25537-3 [contents] - [i20]Yuqing Yang, Chao Wang, Yue Zhang, Zhiqiang Lin:
SoK: Decoding the Super App Enigma: The Security Mechanisms, Threats, and Trade-offs in OS-alike Apps. CoRR abs/2306.07495 (2023) - [i19]Chao Wang, Yue Zhang, Zhiqiang Lin:
Uncovering and Exploiting Hidden APIs in Mobile Super Apps. CoRR abs/2306.08134 (2023) - [i18]Yue Zhang, Yuqing Yang, Zhiqiang Lin:
Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs. CoRR abs/2306.08151 (2023) - [i17]Ada Barach, Maxwell Taylor, Vincent Beardsley, Jacob Bambeck, Michael D. Bond, Zhiqiang Lin:
Cocoon: Static Information Flow Control in Rust. CoRR abs/2311.00097 (2023) - [i16]Xin Jin, Jonathan Larson, Weiwei Yang, Zhiqiang Lin:
Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models. CoRR abs/2312.09601 (2023) - [i15]Mengya Zhang, Xiaokuan Zhang, Josh Barbee, Yinqian Zhang, Zhiqiang Lin:
SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. CoRR abs/2312.12573 (2023) - 2022
- [j41]Christopher Ellis, Haohuang Wen, Zhiqiang Lin, Anish Arora:
Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing. Proc. Priv. Enhancing Technol. 2022(4): 727-745 (2022) - [j40]Weizhou Li, Zhiqiang Lin, Qi Chen:
A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses. Secur. Commun. Networks 2022: 1417607:1-1417607:9 (2022) - [j39]Yutao Tang, Zhengrui Qin, Zhiqiang Lin, Yue Li, Shanhe Yi, Fengyuan Xu, Qun Li:
vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS. IEEE Trans. Computers 71(12): 3349-3360 (2022) - [j38]Qi Chen, Chunming Tang, Zhiqiang Lin:
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes. IEEE Trans. Inf. Theory 68(1): 601-631 (2022) - [c134]Qingchuan Zhao, Chaoshun Zuo, Jorge Blasco, Zhiqiang Lin:
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals. AsiaCCS 2022: 521-533 - [c133]Xin Jin, Sunil Manandhar, Kaushal Kafle, Zhiqiang Lin, Adwait Nadkarni:
Understanding IoT Security from a Market-Scale Perspective. CCS 2022: 1615-1629 - [c132]Xin Jin, Kexin Pei, Jun Yeon Won, Zhiqiang Lin:
SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings. CCS 2022: 1631-1645 - [c131]Yuqing Yang, Mohamed Elsabagh, Chaoshun Zuo, Ryan Johnson, Angelos Stavrou, Zhiqiang Lin:
Detecting and Measuring Misconfigured Manifests in Android Apps. CCS 2022: 3063-3077 - [c130]Yuqing Yang, Yue Zhang, Zhiqiang Lin:
Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection. CCS 2022: 3079-3092 - [c129]Yue Zhang, Zhiqiang Lin:
When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure. CCS 2022: 3181-3194 - [c128]Sen Lin, Ming Shi, Anish Arora, Raef Bassily, Elisa Bertino, Constantine Caramanis, Kaushik R. Chowdhury, Eylem Ekici, Atilla Eryilmaz, Stratis Ioannidis, Nan Jiang, Gauri Joshi, Jim Kurose, Yingbin Liang, Zhiqiang Lin, Jia Liu, Mingyan Liu, Tommaso Melodia, Aryan Mokhtari, Rob Nowak, Sewoong Oh, Srini Parthasarathy, Chunyi Peng, Hulya Seferoglu, Ness B. Shroff, Sanjay Shakkottai, Kannan Srinivasan, Ameet Talwalkar, Aylin Yener, Lei Ying:
Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks. CIC 2022: 16-25 - [c127]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin:
A fine-grained telemetry stream for security services in 5G open radio access networks. EmergingWireless@CoNEXT 2022: 18-23 - [c126]Huibo Wang, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures. NDSS 2022 - [c125]Jun Yeon Won, Haohuang Wen, Zhiqiang Lin:
What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling. RAID 2022: 200-213 - [c124]Shixuan Zhao, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
vSGX: Virtualizing SGX Enclaves on AMD SEV. SP 2022: 321-336 - [c123]Chaoshun Zuo, Zhiqiang Lin:
Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games. USENIX Security Symposium 2022: 3093-3110 - [i14]Xingyu Lyu, Mengya Zhang, Xiaokuan Zhang, Jianyu Niu, Yinqian Zhang, Zhiqiang Lin:
An Empirical Study on Ethereum Private Transactions and the Security Implications. CoRR abs/2208.02858 (2022) - [i13]Ronny Ko, Chuan Xiao, Makoto Onizuka, Yihe Huang, Zhiqiang Lin:
Ultraverse: Efficient Retroactive Operation for Attack Recovery in Database Systems and Web Frameworks. CoRR abs/2211.05327 (2022) - 2021
- [j37]Zhiqiang Lin, Taorong Qiu, Ping Liu, Lingyun Zhang, Siwei Zhang, Zhendong Mu:
Fatigue driving recognition based on deep learning and graph neural network. Biomed. Signal Process. Control. 68: 102598 (2021) - [j36]Yue Zhang, Bayan Turkistani, Allen Yuqing Yang, Chaoshun Zuo, Zhiqiang Lin:
A Measurement Study of Wechat Mini-Apps. Proc. ACM Meas. Anal. Comput. Syst. 5(2): 14:1-14:25 (2021) - [j35]Kaiqing Huang, Xueli Wang, Zhiqiang Lin:
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things. Secur. Commun. Networks 2021: 8872699:1-8872699:22 (2021) - [c122]Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV. CCS 2021: 2937-2950 - [c121]Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin:
Specularizer : Detecting Speculative Execution Attacks via Performance Tracing. DIMVA 2021: 151-172 - [c119]Ronghua Xu, Hefeng Meng, Zhiqiang Lin, Yonghui Xu, Lizhen Cui, Jun Lin:
Credit Default Prediction via Explainable Ensemble Learning. ICCSE 2021: 81-87 - [c118]Jiancheng Zhang, Xiao Yang, Hefeng Meng, Zhiqiang Lin, Yonghui Xu, Lizhen Cui:
A Survey on Knowledge Enhanced EHR Data Mining. ICCSE 2021: 124-131 - [c117]Hefeng Meng, Zhiqiang Lin, Fan Yang, Yonghui Xu, Lizhen Cui:
Knowledge Distillation In Medical Data Mining: A Survey. ICCSE 2021: 175-182 - [c116]Xiaowei Li, Hui Shu, Yi Zhai, Zhiqiang Lin:
A Method for Resume Information Extraction Using BERT-BiLSTM-CRF. ICCT 2021: 1437-1442 - [c114]Paul Muntean, Richard Viehoever, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
iTOP: Automating Counterfeit Object-Oriented Programming Attacks. RAID 2021: 162-176 - [c113]Yue Zhang, Bayan Turkistani, Allen Yuqing Yang, Chaoshun Zuo, Zhiqiang Lin:
A Measurement Study of Wechat Mini-Apps. SIGMETRICS (Abstracts) 2021: 19-20 - [c112]Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Towards Formal Verification of State Continuity for Enclave Programs. USENIX Security Symposium 2021: 573-590 - [c111]Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang:
SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting. USENIX Security Symposium 2021: 1665-1682 - [c110]Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, Jim Hao Chen:
Automatic Policy Generation for Inter-Service Access Control of Microservices. USENIX Security Symposium 2021: 3971-3988 - [e2]Jiannong Cao, Man Ho Au, Zhiqiang Lin, Moti Yung:
ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021. ACM 2021, ISBN 978-1-4503-8287-8 [contents] - [i12]Cheng Zhang, Yunze Pan, Yunqi Zhang, Adam C. Champion, Zhaohui Shen, Dong Xuan, Zhiqiang Lin, Ness B. Shroff:
WLAN-Log-Based Superspreader Detection in the COVID-19 Pandemic. CoRR abs/2102.11171 (2021) - 2020
- [j34]Yan Ren, Qiuxia Zhao, Haipeng Guan, Zhiqiang Lin:
On Design of Single-Layer and Multilayer Code-Based Linkable Ring Signatures. IEEE Access 8: 17854-17862 (2020) - [j32]Yan Ren, Qiuxia Zhao, Haipeng Guan, Zhiqiang Lin:
A novel authentication scheme based on edge computing for blockchain-based distributed energy trading system. EURASIP J. Wirel. Commun. Netw. 2020(1): 152 (2020) - [j31]Lingyun Zhang, Taorong Qiu, Zhiqiang Lin, Shuli Zou, Xiaoming Bai:
Construction and Application of Functional Brain Network Based on Entropy. Entropy 22(11): 1234 (2020) - [j30]Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution. IEEE Secur. Priv. 18(3): 28-37 (2020) - [j29]Qi Chen, Chunming Tang, Zhiqiang Lin:
Compartmented Secret Sharing Schemes and Locally Repairable Codes. IEEE Trans. Commun. 68(10): 5976-5987 (2020) - [c109]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings. ACSAC 2020: 466-479 - [c108]Yan Ren, Qiuxia Zhao, Haipeng Guan, Zhiqiang Lin:
On Design of Blockchain-based Transport Scheme. BSCI 2020: 214-215 - [c107]Haohuang Wen, Zhiqiang Lin, Yinqian Zhang:
FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware. CCS 2020: 167-180 - [c106]Haohuang Wen, Qingchuan Zhao, Qi Alfred Chen, Zhiqiang Lin:
Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps. NDSS 2020 - [c105]Qingchuan Zhao, Haohuang Wen, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps. SecureComm (1) 2020: 49-60 - [c104]Jaehyun Han, Zhiqiang Lin, Donald E. Porter:
On the Effectiveness of Behavior-Based Ransomware Detection. SecureComm (2) 2020: 120-140 - [c103]Haohuang Wen, Qingchuan Zhao, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
A Study of the Privacy of COVID-19 Contact Tracing Apps. SecureComm (1) 2020: 297-317 - [c102]Qingchuan Zhao, Chaoshun Zuo, Brendan Dolan-Gavitt, Giancarlo Pellegrino, Zhiqiang Lin:
Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps. SP 2020: 1106-1120 - [c101]Ashish Kundu, Zhiqiang Lin, Joshua Hammond:
Energy Attacks on Mobile Devices. TPS-ISA 2020: 107-117 - [c100]Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. USENIX Security Symposium 2020: 37-54 - [c99]Raul Quinonez, Jairo Giraldo, Luis E. Salazar, Erick Bauman, Alvaro A. Cárdenas, Zhiqiang Lin:
SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. USENIX Security Symposium 2020: 895-912 - [c98]Haohuang Wen, Qi Alfred Chen, Zhiqiang Lin:
Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT. USENIX Security Symposium 2020: 949-965 - [c97]Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin:
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. USENIX Security Symposium 2020: 2379-2396 - [c96]Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin:
TXSPECTOR: Uncovering Attacks in Ethereum from Transactions. USENIX Security Symposium 2020: 2775-2792 - [i11]Yuxiang Luo, Cheng Zhang, Yunqi Zhang, Chaoshun Zuo, Dong Xuan, Zhiqiang Lin, Adam C. Champion, Ness B. Shroff:
ACOUSTIC-TURF: Acoustic-based Privacy-Preserving COVID-19 Contact Tracing. CoRR abs/2006.13362 (2020) - [i10]Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV. CoRR abs/2008.00146 (2020) - 2019
- [j28]Heng Du, Zhiqiang Lin, Yuan Zhang, Hui Chen, Zhimin Xu:
Improved Migration Genetic Algorithm Optimization for Variable-Speed Falling Trajectory of Mobile Crossbeam in Composite Hydraulic Press With Pressure Shock. IEEE Access 7: 39459-39473 (2019) - [j27]Zhiqiang Lin, Shimin Lin, Sen Wu, Ge Ma, Zhongwei Liang:
Vibration Control of a Flexible Spacecraft System With Input Backlash. IEEE Access 7: 87017-87026 (2019) - [j26]Zhiqiang Lin, Shimin Lin, Meihua Huang, Jianing Zhang, Zhongwei Liang:
Vibration Control for Two Kinds of Flexible Mechanical Systems With Full State Output Constraints. IEEE Access 7: 120734-120743 (2019) - [j25]Qi Chen, Chunming Tang, Zhiqiang Lin:
Efficient explicit constructions of compartmented secret sharing schemes. Des. Codes Cryptogr. 87(12): 2913-2940 (2019) - [j24]Jingang Liu, Yongge Wang, Zongxiang Yi, Zhiqiang Lin:
polarRLCE: A New Code-Based Cryptosystem Using Polar Codes. Secur. Commun. Networks 2019: 3086975:1-3086975:10 (2019) - [c95]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
Analyzing control flow integrity with LLVM-CFI. ACSAC 2019: 584-597 - [c94]Qi Chen, Chunming Tang, Zhiqiang Lin:
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes. ASIACRYPT (2) 2019: 505-536 - [c93]Huibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, Yinqian Zhang:
Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach. AsiaCCS 2019: 114-121 - [c92]Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, Yinqian Zhang:
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. CCS 2019: 1469-1483 - [c91]Huibo Wang, Pei Wang, Yu Ding, Mingshen Sun, Yiming Jing, Ran Duan, Long Li, Yulong Zhang, Tao Wei, Zhiqiang Lin:
Towards Memory Safe Enclave Programming with Rust-SGX. CCS 2019: 2333-2350 - [c90]Yuzhong Liu, Zhiqiang Lin, Li Li, Hualiang Li, Yali Shen:
Effects of Extremely Low Frequency Electromagnetic Fields Exposure in an Informationalized Perspective. DPTA 2019: 1191-1201 - [c89]Jiongyi Chen, Chaoshun Zuo, Wenrui Diao, Shuaike Dong, Qingchuan Zhao, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, Kehuan Zhang:
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users. DSN 2019: 222-233 - [c88]Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution. EuroS&P 2019: 142-157 - [c87]Kenneth A. Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang, Xiangyu Zhang, Zhiqiang Lin:
Probabilistic disassembly. ICSE 2019: 1187-1198 - [c86]Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin:
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. NDSS 2019 - [c85]Wubing Wang, Yinqian Zhang, Zhiqiang Lin:
Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries. RAID 2019: 443-457 - [c84]Xing Li, Yan Chen, Zhiqiang Lin:
Towards Automated Inter-Service Authorization for Microservice Applications. SIGCOMM Posters and Demos 2019: 3-5 - [c83]Chaoshun Zuo, Zhiqiang Lin, Yinqian Zhang:
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps. IEEE Symposium on Security and Privacy 2019: 1296-1310 - [c82]Omar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio:
The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends. USENIX Security Symposium 2019: 551-566 - [c81]Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin:
Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization. USENIX Security Symposium 2019: 1257-1272 - [c80]Xiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin:
CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software. USENIX Security Symposium 2019: 1805-1821 - [e1]Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis:
Information Security - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16-18, 2019, Proceedings. Lecture Notes in Computer Science 11723, Springer 2019, ISBN 978-3-030-30214-6 [contents] - [i9]Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode. CoRR abs/1908.10497 (2019) - [i8]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
Analyzing Control Flow Integrity with LLVM-CFI. CoRR abs/1910.01485 (2019) - [i7]Qi Chen, Chunming Tang, Zhiqiang Lin:
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2019: 1100 (2019) - 2018
- [j22]Zongxiang Yi, Zhiqiang Lin, Lishan Ke:
A generic method to construct zero-difference balanced functions. Cryptogr. Commun. 10(4): 591-609 (2018) - [j21]Zhiqiang Lin, Dingyi Pei, Dongdai Lin, Xiaolei Zhang:
Fast construction of binary ring FCSRs for hardware stream ciphers. Des. Codes Cryptogr. 86(4): 939-953 (2018) - [j20]Hang Yang, Peng Li, Xiaobin Guo, Huajun Chen, Zhiqiang Lin:
A review: The effects of imperfect data on incremental decision tree. Int. J. Inf. Commun. Technol. 12(1/2): 162-174 (2018) - [j18]Vincent C. Venezia, Alan Chih-Wei Hsiung, Wu-Zang Yang, Yuying Zhang, Cheng Zhao, Zhiqiang Lin, Lindsay A. Grant:
Second Generation Small Pixel Technology Using Hybrid Bond Stacking. Sensors 18(2): 667 (2018) - [c79]Bo Lu, Xiaokuan Zhang, Ziman Ling, Yinqian Zhang, Zhiqiang Lin:
A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites. ACSAC 2018: 89-100 - [c78]Chao Zhang, Weiliang Yin, Zhiqiang Lin:
Boost Symbolic Execution Using Dynamic State Merging and Forking. QuASoQ@APSEC 2018: 14-21 - [c77]Vishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan, Kevin W. Hamlen:
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering. AsiaCCS 2018: 393-398 - [c76]Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu:
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. CCS 2018: 412-425 - [c75]Erick Bauman, Huibo Wang, Mingwei Zhang, Zhiqiang Lin:
SGXElide: enabling enclave code secrecy via self-modification. CGO 2018: 75-86 - [c74]Qi Chen, Chunming Tang, Zhiqiang Lin:
Locally Repairable Codes with Heterogeneous Locality Constraints. ITW 2018: 1-5 - [c73]Erick Bauman, Zhiqiang Lin, Kevin W. Hamlen:
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. NDSS 2018 - [c72]Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, Kehuan Zhang:
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. NDSS 2018 - [c71]Paul Muntean, Matthias Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, Claudia Eckert:
τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. RAID 2018: 423-444 - [c70]Jiaxi Wu, Xiaotong Lin, Zhiqiang Lin, Yi Tang:
A Security Concern About Deep Learning Models. SciSec 2018: 199-206 - [c68]Sam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, Tongping Liu:
Guarder: A Tunable Secure Allocator. USENIX Security Symposium 2018: 117-133 - [c67]Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei:
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors. USENIX Security Symposium 2018: 1545-1562 - [i6]Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution. CoRR abs/1802.09085 (2018) - [i5]Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei:
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors. CoRR abs/1806.07558 (2018) - 2017
- [j17]Zhiqiang Lin, Dongdai Lin, Dingyi Pei:
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications. Cryptogr. Commun. 9(4): 431-443 (2017) - [j16]Yuyin Yu, Lishan Ke, Zhiqiang Lin, Qiuyan Wang:
Permutation Polynomials over Zpn and Their Randomness. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(3): 913-915 (2017) - [c66]Guofei Gu, Hongxin Hu, Eric Keller, Zhiqiang Lin, Donald E. Porter:
Building a Security OS With Software Defined Infrastructure. APSys 2017: 4:1-4:8 - [c65]Vishal Karande, Erick Bauman, Zhiqiang Lin, Latifur Khan:
SGX-Log: Securing System Logs With SGX. AsiaCCS 2017: 19-30 - [c64]Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin:
AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services. CCS 2017: 799-813 - [c63]Fahad Shaon, Murat Kantarcioglu, Zhiqiang Lin, Latifur Khan:
SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors. CCS 2017: 1211-1228 - [c62]Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu:
FreeGuard: A Faster Secure Heap Allocator. CCS 2017: 2389-2403 - [c61]Taesoo Kim, Zhiqiang Lin, Chia-Che Tsai:
CCS'17 Tutorial Abstract / SGX Security and Privacy. CCS 2017: 2613-2614 - [c60]Yufei Gu, Qingchuan Zhao, Yinqian Zhang, Zhiqiang Lin:
PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace. CODASPY 2017: 173-184 - [c59]Swarup Chandra, Vishal Karande, Zhiqiang Lin, Latifur Khan, Murat Kantarcioglu, Bhavani Thuraisingham:
Securing Data Analytics on SGX with Randomization. ESORICS (1) 2017: 352-369 - [c58]Yangchun Fu, Erick Bauman, Raul Quinonez, Zhiqiang Lin:
Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults. RAID 2017: 357-380 - [c57]Chaoshun Zuo, Zhiqiang Lin:
SMARTGEN: Exposing Server URLs of Mobile Apps With Selective Symbolic Execution. WWW 2017: 867-876 - [i4]Ashish Kundu, Zhiqiang Lin, Joshua Hammond:
Energy Attacks on Mobile Devices. CoRR abs/1704.04464 (2017) - [i3]Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu:
FreeGuard: A Faster Secure Heap Allocator. CoRR abs/1709.02746 (2017) - 2016
- [j15]Juan Caballero, Zhiqiang Lin:
Type Inference on Executables. ACM Comput. Surv. 48(4): 65:1-65:35 (2016) - [c56]Khaled Al-Naami, Swarup Chandra, Ahmad Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani Thuraisingham:
Adaptive encrypted traffic fingerprinting with bi-directional dependence. ACSAC 2016: 177-188 - [c55]Yufei Gu, Zhiqiang Lin:
Derandomizing Kernel Address Space Layout for Memory Introspection and Forensics. CODASPY 2016: 62-72 - [c53]Erick Bauman, Zhiqiang Lin:
A Case for Protecting Computer Games With SGX. SysTEX@Middleware 2016: 4:1-4:6 - [c52]Chaoshun Zuo, Wubing Wang, Zhiqiang Lin, Rui Wang:
Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services. NDSS 2016 - [c51]Junyuan Zeng, Yangchun Fu, Zhiqiang Lin:
Automatic Uncovering of Tap Points from Kernel Executions. RAID 2016: 49-70 - [c50]Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang:
Detecting Stack Layout Corruptions with Robust Stack Unwinding. RAID 2016: 71-94 - 2015
- [j14]Erick Bauman, Gbadebo Ayoade, Zhiqiang Lin:
A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions. ACM Comput. Surv. 48(1): 10:1-10:33 (2015) - [j13]Zhiqiang Lin, Lishan Ke, Dongdai Lin, Jian Gao:
On the LFSRization of a Class of FCSR Automata. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 434-440 (2015) - [j11]Zhusong Liu, Hongyang Yan, Zhiqiang Lin, Lingling Xu:
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure. J. Univers. Comput. Sci. 21(3): 454-472 (2015) - [j10]Aravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin:
On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution. IEEE Trans. Dependable Secur. Comput. 12(5): 557-570 (2015) - [j9]Dingyi Pei, Zhiqiang Lin, Xiaolei Zhang:
Construction of Transition Matrices for Ternary Ring Feedback With Carry Shift Registers. IEEE Trans. Inf. Theory 61(5): 2942-2951 (2015) - [c49]Seung-Hun Kim, Lei Xu, Ziyi Liu, Zhiqiang Lin, Won Woo Ro, Weidong Shi:
Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization. DSN 2015: 251-262 - [c48]Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu:
A Practical Approach for Adaptive Data Structure Layout Randomization. ESORICS (1) 2015: 69-89 - [c47]Erick Bauman, Yafeng Lu, Zhiqiang Lin:
Half a Century of Practice: Who Is Still Storing Plaintext Passwords? ISPEC 2015: 253-267 - [c46]Junyuan Zeng, Zhiqiang Lin:
Towards Automatic Inference of Kernel Object Semantics from Binary Code. RAID 2015: 538-561 - [c45]Yangchun Fu, Zhiqiang Lin, David Brumley:
Automatically deriving pointer reference expressions from binary code for memory dump analysis. ESEC/SIGSOFT FSE 2015: 614-624 - [c44]Jin Chen, Haibo Chen, Erick Bauman, Zhiqiang Lin, Binyu Zang, Haibing Guan:
You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps. USENIX Security Symposium 2015: 657-690 - [c43]Junyuan Zeng, Yangchun Fu, Zhiqiang Lin:
PEMU: A Pin Highly Compatible Out-of-VM Dynamic Binary Instrumentation Framework. VEE 2015: 147-160 - [i2]Zhiqiang Lin, Dingyi Pei, Dongdai Lin:
Construction of Transition Matrices for Binary FCSRs. IACR Cryptol. ePrint Arch. 2015: 1181 (2015) - 2014
- [j7]Yufei Gu, Yangchun Fu, Aravind Prakash, Zhiqiang Lin, Heng Yin:
Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting. IEEE Trans. Cloud Comput. 2(4): 380-394 (2014) - [j6]Junghwan Rhee, Ryan D. Riley, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu:
Data-Centric OS Kernel Malware Characterization. IEEE Trans. Inf. Forensics Secur. 9(1): 72-87 (2014) - [c42]Lishan Ke, Zhiqiang Lin:
Distribution Properties and 2-Adic Complexity of Clock-Controlled FCSR Sequences. 3PGCIC 2014: 386-389 - [c41]Qian Feng, Aravind Prakash, Heng Yin, Zhiqiang Lin:
MACE: high-coverage and robust memory analysis for commodity operating systems. ACSAC 2014: 196-205 - [c40]Ziyi Liu, Weidong Shi, Shouhuai Xu, Zhiqiang Lin:
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy. DATE 2014: 1-6 - [c39]David I. Urbina, Yufei Gu, Juan Caballero, Zhiqiang Lin:
SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification. ESORICS (2) 2014: 237-256 - [c38]Alireza Saberi, Yangchun Fu, Zhiqiang Lin:
Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization. NDSS 2014 - [c37]David Sounthiraraj, Justin Sahs, Garret Greenwood, Zhiqiang Lin, Latifur Khan:
SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps. NDSS 2014 - [c36]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment. RAID 2014: 22-45 - [c35]Swarup Chandra, Zhiqiang Lin, Ashish Kundu, Latifur Khan:
Towards a Systematic Study of the Covert Channel Attacks in Smartphones. SecureComm (1) 2014: 427-435 - [c34]Yangchun Fu, Junyuan Zeng, Zhiqiang Lin:
HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management. USENIX ATC 2014: 85-96 - [c33]Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy:
Preventing Cryptographic Key Leakage in Cloud Virtual Machines. USENIX Security Symposium 2014: 703-718 - [c32]Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su:
X-Force: Force-Executing Binary Programs for Security Applications. USENIX Security Symposium 2014: 829-844 - 2013
- [j5]Yangchun Fu, Zhiqiang Lin:
Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. ACM Trans. Inf. Syst. Secur. 16(2): 7 (2013) - [c31]Yangchun Fu, Zhiqiang Lin, Kevin W. Hamlen:
Subverting system authentication with context-aware, reactive virtual machine introspection. ACSAC 2013: 229-238 - [c30]Junyuan Zeng, Yangchun Fu, Kenneth A. Miller, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Obfuscation resilient binary code reuse through trace-oriented programming. CCS 2013: 487-498 - [c29]Aravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin:
Manipulating semantic values in kernel data structures: Attack assessments and implications. DSN 2013: 1-12 - [c27]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization. ICDCS 2013: 112-123 - [c25]Ziyi Liu, Jong-Hyuk Lee, Junyuan Zeng, Yuanfeng Wen, Zhiqiang Lin, Weidong Shi:
CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM. ISCA 2013: 392-403 - [c24]Yangchun Fu, Zhiqiang Lin:
EXTERIOR: using a dual-VM based external shell for guest-OS introspection, configuration, and recovery. VEE 2013: 97-110 - 2012
- [j4]Scott Hand, Zhiqiang Lin, Guofei Gu, Bhavani Thuraisingham:
Bin-Carver: Automatic recovery of binary executable files. Digit. Investig. 9(Supplement): S108-S117 (2012) - [c23]Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin:
Securing untrusted code via compiler-agnostic binary rewriting. ACSAC 2012: 299-308 - [c22]Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin:
Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. CCS 2012: 157-168 - [c21]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
Automatic generation of vaccines for malware immunization. CCS 2012: 1037-1039 - [c20]Yufei Gu, Yangchun Fu, Aravind Prakash, Zhiqiang Lin, Heng Yin:
OS-Sommelier: memory-only operating system fingerprinting in the cloud. SoCC 2012: 5 - [c19]Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, Dongyan Xu:
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence. NDSS 2012 - [c18]Yangchun Fu, Zhiqiang Lin:
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. IEEE Symposium on Security and Privacy 2012: 586-600 - 2011
- [c17]Junghwan Rhee, Zhiqiang Lin, Dongyan Xu:
Characterizing kernel malware behavior with kernel data access patterns. AsiaCCS 2011: 207-216 - [c16]Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang:
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures. NDSS 2011 - [i1]Zhiqiang Lin, Dingyi Pei:
Constructing a Diversified FCSR with a Given Connection Integer. IACR Cryptol. ePrint Arch. 2011: 358 (2011) - 2010
- [j3]Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications. IEEE Trans. Software Eng. 36(5): 688-703 (2010) - [c15]Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction. DSN 2010: 281-290 - [c14]Tao Bao, Yunhui Zheng, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Strict control dependence and its effect on dynamic information flow analyses. ISSTA 2010: 13-24 - [c13]Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Automatic Reverse Engineering of Data Structures from Binary Execution. NDSS 2010 - 2009
- [c12]Zhiqiang Lin, Ryan D. Riley, Dongyan Xu:
Polymorphing Software by Randomizing Data Structure Layout. DIMVA 2009: 107-126 - [c10]Tielei Wang, Tao Wei, Zhiqiang Lin, Wei Zou:
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. NDSS 2009 - 2008
- [c9]Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Convicting exploitable software vulnerabilities: An efficient input provenance based approach. DSN 2008: 247-256 - [c7]Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang:
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. NDSS 2008 - [c6]Zhiqiang Lin, Xiangyu Zhang:
Deriving input syntactic structure from execution. SIGSOFT FSE 2008: 83-93 - 2006
- [c4]Zhiqiang Lin, Bing Mao, Li Xie:
A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. ARES 2006: 348-357 - [c2]Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie:
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. ISC 2006: 17-31 - 2005
- [j1]Zhiqiang Lin, Chao Wang, Bing Mao, Li Xie:
A policy flexible architecture for secure operating system. ACM SIGOPS Oper. Syst. Rev. 39(3): 24-33 (2005)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-19 00:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint