
Chengyu Song
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j2]Kangjie Lu
, Meng Xu, Chengyu Song
, Taesoo Kim
, Wenke Lee:
Stopping Memory Disclosures via Diversification and Replicated Execution. IEEE Trans. Dependable Secur. Comput. 18(1): 160-173 (2021) - 2020
- [c41]Pan Zhang, Chengyu Song
, Heng Yin
, Deqing Zou, Elaine Shi, Hai Jin:
Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks. ASPLOS 2020: 1263-1276 - [c40]Shasha Li, Shitong Zhu, Sudipta Paul, Amit K. Roy-Chowdhury, Chengyu Song
, Srikanth V. Krishnamurthy, Ananthram Swami, Kevin S. Chan:
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency. ECCV (23) 2020: 396-413 - [c39]Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun:
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. NDSS 2020 - [c38]Yizhuo Zhai, Yu Hao, Hang Zhang, Daimeng Wang, Chengyu Song, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy, Paul Yu:
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel. ESEC/SIGSOFT FSE 2020: 221-232 - [c37]Suhwan Song, Chengyu Song, Yeongjin Jang, Byoungyoung Lee:
CrFuzz: fuzzing multi-purpose programs through input validation. ESEC/SIGSOFT FSE 2020: 690-700 - [c36]Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, Khaled N. Khasawneh, Chengyu Song
, Nael B. Abu-Ghazaleh:
SpecCFI: Mitigating Spectre Attacks using CFI Informed Speculation. IEEE Symposium on Security and Privacy 2020: 39-53 - [i9]Shasha Li, Shitong Zhu, Sudipta Paul, Amit K. Roy-Chowdhury, Chengyu Song, Srikanth V. Krishnamurthy, Ananthram Swami, Kevin S. Chan:
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency. CoRR abs/2007.09763 (2020) - [i8]Shasha Li, Karim Khalil, Rameswar Panda, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami:
Measurement-driven Security Analysis of Imperceptible Impersonation Attacks. CoRR abs/2008.11772 (2020)
2010 – 2019
- 2019
- [c35]Yue Cao, Zhongjie Wang, Zhiyun Qian, Chengyu Song
, Srikanth V. Krishnamurthy, Paul Yu:
Principled Unearthing of TCP Side Channel Vulnerabilities. CCS 2019: 211-224 - [c34]Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song
, Dmitry Evtyushkin, Dmitry Ponomarev, Nael B. Abu-Ghazaleh
:
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. DAC 2019: 60 - [c33]Ioannis Gasparis, Zhiyun Qian
, Chengyu Song
, Srikanth V. Krishnamurthy
, Rajiv Gupta
, Paul Yu:
Figment: Fine-grained Permission Management for Mobile Apps. INFOCOM 2019: 1405-1413 - [c32]Dongliang Mu, Wenbo Guo, Alejandro Cuevas, Yueqi Chen, Jinxuan Gai, Xinyu Xing, Bing Mao, Chengyu Song
:
RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis. ASE 2019: 924-935 - [c31]Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami:
Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems. NDSS 2019 - [c30]Jinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song:
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. RAID 2019: 1-15 - [c29]Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, Limin Sun:
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. USENIX Security Symposium 2019: 1099-1114 - [i7]Wookhyun Han, Md. Lutfor Rahman, Yuxuan Chen, Chengyu Song, Byoungyoung Lee, Insik Shin:
SynFuzz: Efficient Concolic Execution via Branch Condition Synthesis. CoRR abs/1905.09532 (2019) - [i6]Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation. CoRR abs/1906.01345 (2019) - 2018
- [c28]Md. Lutfor Rahman, Ajaya Neupane, Chengyu Song
:
IAC: On the Feasibility of Utilizing Neural Signals for Access Control. ACSAC 2018: 641-652 - [c27]Ioannis Gasparis, Azeem Aqil, Zhiyun Qian
, Chengyu Song
, Srikanth V. Krishnamurthy
, Rajiv Gupta
, Edward Colbert:
Droid M+: Developer Support for Imbibing Android's New Permission Model. AsiaCCS 2018: 765-776 - [c26]Dang Tu Nguyen, Chengyu Song
, Zhiyun Qian
, Srikanth V. Krishnamurthy
, Edward J. M. Colbert, Patrick D. McDaniel:
IotSan: fortifying the safety of IoT systems. CoNEXT 2018: 191-203 - [c25]Wookhyun Han, Byunggill Joe, Byoungyoung Lee, Chengyu Song, Insik Shin:
Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing. NDSS 2018 - [c24]Md. Lutfor Rahman, Sharmistha Bardhan, Ajaya Neupane, Evangelos E. Papalexakis
, Chengyu Song
:
Learning Tensor-Based Representations from Brain-Computer Interface Data for Cybersecurity. ECML/PKDD (3) 2018: 389-404 - [c23]Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
Spectre Returns! Speculation Attacks using the Return Stack Buffer. WOOT @ USENIX Security Symposium 2018 - [i5]Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael B. Abu-Ghazaleh:
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. CoRR abs/1806.05179 (2018) - [i4]Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami:
Adversarial Perturbations Against Real-Time Video Classification Systems. CoRR abs/1807.00458 (2018) - [i3]Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
Spectre Returns! Speculation Attacks using the Return Stack Buffer. CoRR abs/1807.07940 (2018) - [i2]Ketan Bhardwaj, Ming-Wei Shih, Ada Gavrilovska, Taesoo Kim, Chengyu Song:
SPX: Preserving End-to-End Security for Edge Computing. CoRR abs/1809.09038 (2018) - [i1]Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Patrick D. McDaniel:
IoTSan: Fortifying the Safety of IoT Systems. CoRR abs/1810.09551 (2018) - 2017
- [c22]Zhongjie Wang, Yue Cao, Zhiyun Qian
, Chengyu Song
, Srikanth V. Krishnamurthy
:
Your state is not mine: a closer look at evading stateful internet censorship. Internet Measurement Conference 2017: 114-127 - [c21]Ren Ding, Chenxiong Qian, Chengyu Song, William Harris, Taesoo Kim, Wenke Lee:
Efficient Protection of Path-Sensitive Control Security. USENIX Security Symposium 2017: 131-148 - [c20]Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy:
Detecting Android Root Exploits by Learning from Root Providers. USENIX Security Symposium 2017: 1129-1144 - 2016
- [b1]Chengyu Song:
Preventing exploits against memory corruption vulnerabilities. Georgia Institute of Technology, Atlanta, GA, USA, 2016 - [j1]Meng Xu, Chengyu Song
, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, Taesoo Kim:
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques. ACM Comput. Surv. 49(2): 38:1-38:47 (2016) - [c19]Kangjie Lu, Chengyu Song
, Taesoo Kim, Wenke Lee:
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. CCS 2016: 920-932 - [c18]Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris, Taesoo Kim, Wenke Lee:
Enforcing Kernel Security Invariants with Data Flow Integrity. NDSS 2016 - [c17]Chao Zhang, Dawn Song, Scott A. Carr, Mathias Payer, Tongxin Li, Yu Ding, Chengyu Song:
VTrust: Regaining Trust on Virtual Calls. NDSS 2016 - [c16]Chengyu Song
, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, Yunheung Paek:
HDFI: Hardware-Assisted Data-Flow Isolation. IEEE Symposium on Security and Privacy 2016: 1-17 - 2015
- [c15]Kangjie Lu, Chengyu Song
, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee:
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. CCS 2015: 280-291 - [c14]Chao Zhang, Mehrdad Niknami, Kevin Zhijie Chen, Chengyu Song
, Zhaofeng Chen, Dawn Song:
JITScope: Protecting web users from control-flow hijacking attacks. INFOCOM 2015: 567-575 - [c13]Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee:
Preventing Use-after-free with Dangling Pointers Nullification. NDSS 2015 - [c12]Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski:
Exploiting and Protecting Dynamic Code Generation. NDSS 2015 - [c11]Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaofeng Chen, Dawn Song:
VTint: Protecting Virtual Function Tables' Integrity. NDSS 2015 - [c10]Changwoo Min, Sanidhya Kashyap, Byoungyoung Lee, Chengyu Song
, Taesoo Kim:
Cross-checking semantic correctness: the case of finding file system bugs. SOSP 2015: 361-377 - [c9]Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee:
Type Casting Verification: Stopping an Emerging Attack Vector. USENIX Security Symposium 2015: 81-96 - 2014
- [c8]Yeongjin Jang, Chengyu Song
, Simon P. Chung, Tielei Wang, Wenke Lee:
A11y Attacks: Exploiting Accessibility in Operating Systems. CCS 2014: 103-115 - [c7]Tielei Wang, Chengyu Song
, Wenke Lee:
Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. DIMVA 2014: 255-275 - [c6]Billy Lau, Simon P. Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva:
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud. USENIX Security Symposium 2014: 33-48 - 2012
- [c5]Chengyu Song, Paul Royal, Wenke Lee:
Impeding Automated Malware Analysis with Environment-sensitive Malware. HotSec 2012 - 2011
- [c4]Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, David Cok, Denis Gopan, David Melski, Wenke Lee, Chengyu Song
, Thomas Bracewell, David Hyde, Brian Mastropietro:
PEASOUP: preventing exploits against software of uncertain provenance (position paper). SESS@ICSE 2011: 43-49 - 2010
- [c3]Chengyu Song
, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye:
Preventing drive-by download via inter-module communication monitoring. AsiaCCS 2010: 124-134
2000 – 2009
- 2009
- [p1]Jianwei Zhuge, Thorsten Holz
, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zou:
Studying Malicious Websites and the Underground Economy on the Chinese Web. Managing Information Risk and the Economics of Security 2009: 225-244 - 2008
- [c2]Jianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zou:
Studying Malicious Websites and the Underground Economy on the Chinese Web. WEIS 2008 - 2007
- [c1]Jianwei Zhuge, Thorsten Holz
, Xinhui Han, Chengyu Song, Wei Zou:
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. ICICS 2007: 438-451
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-26 23:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint