Stop the war!
Остановите войну!
for scientists:
default search action
Zhenkai Liang
Person information
- affiliation: National University of Singapore
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c83]Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland H. C. Yap, Zhenkai Liang, Manuel Rigger:
Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation. ICSE 2024: 46:1-46:12 - [c82]Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, Zhenkai Liang:
UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation. USENIX Security Symposium 2024 - [i8]Jiahao Liu, Jun Zeng, Fabio Pierazzi, Lorenzo Cavallaro, Zhenkai Liang:
Unraveling the Key of Machine Learning Solutions for Android Malware Detection. CoRR abs/2402.02953 (2024) - [i7]Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang:
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities. CoRR abs/2404.11107 (2024) - [i6]Bonan Ruan, Jiahao Liu, Weibo Zhao, Zhenkai Liang:
VulZoo: A Comprehensive Vulnerability Intelligence Dataset. CoRR abs/2406.16347 (2024) - 2023
- [j21]Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Shengling Wang, Jian Mao, Zhenkai Liang:
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association. IEEE Trans. Dependable Secur. Comput. 20(2): 1017-1030 (2023) - [c81]Jiahao Liu, Jun Zeng, Xiang Wang, Zhenkai Liang:
Learning Graph-based Code Representations for Source-level Functional Similarity Detection. ICSE 2023: 345-357 - 2022
- [j20]Jian Mao, Ziwen Liu, Qixiao Lin, Zhenkai Liang:
Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages. IEEE Internet Things J. 9(12): 9151-9166 (2022) - [c80]Yuancheng Jiang, Roland H. C. Yap, Zhenkai Liang, Hubert Rosier:
RecIPE: Revisiting the Evaluation of Memory Error Defenses. AsiaCCS 2022: 574-588 - [c79]Tu Yu, Zhenkai Liang, Hanyang Zhang, Haiyu Zhang, Wei Gao, Wentao Han:
Non-uniform Deformation Behavior of Magneto-Sensitive Elastomer Containing Uniform Sphere Particles with V-ShapedArrangement. BIC-TA 2022: 520-530 - [c78]Jun Zeng, Chuqi Zhang, Zhenkai Liang:
PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability. CCS 2022: 3135-3149 - [c77]Zhenyuan Li, Jun Zeng, Yan Chen, Zhenkai Liang:
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports. ESORICS (1) 2022: 589-609 - [c76]Yuancheng Jiang, Gregory J. Duck, Roland H. C. Yap, Zhenkai Liang, Pinghai Yuan:
Extensible Virtual Call Integrity. ESORICS (3) 2022: 723-739 - [c75]Jiahao Liu, Jun Zeng, Xiang Wang, Kaihang Ji, Zhenkai Liang:
TeLL: log level suggestions via modeling multi-level code block information. ISSTA 2022: 27-38 - [c74]Jun Zeng, Xiang Wang, Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, Zheng Leong Chua:
SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records. SP 2022: 489-506 - [c73]Liang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang:
FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries. USENIX Security Symposium 2022: 2497-2512 - [c72]Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, Abhik Roychoudhury:
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation. USENIX Security Symposium 2022: 2567-2584 - 2021
- [j19]Kulani Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Yan Liu, Jin Song Dong, Zhenkai Liang:
Scrutinizing Implementations of Smart Home Integrations. IEEE Trans. Software Eng. 47(12): 2667-2683 (2021) - [c71]Kulani Mahadewa, Yanjun Zhang, Guangdong Bai, Lei Bu, Zhiqiang Zuo, Dileepa Fernando, Zhenkai Liang, Jin Song Dong:
Identifying privacy weaknesses from multi-party trigger-action integration platforms. ISSTA 2021: 2-15 - [c70]Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao:
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics. NDSS 2021 - [i5]Zhenyuan Li, Jun Zeng, Yan Chen, Zhenkai Liang:
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports. CoRR abs/2111.07093 (2021) - 2020
- [j18]Sang Kil Cha, Zhenkai Liang:
Asia's surging interest in binary analysis. Commun. ACM 63(4): 86-88 (2020) - [c69]Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust P2P Primitives Using SGX Enclaves. ICDCS 2020: 1185-1186 - [c68]Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust P2P Primitives Using SGX Enclaves. RAID 2020: 209-224
2010 – 2019
- 2019
- [j17]Jian Mao, Jingdong Bian, Wenqian Tian, Shishi Zhu, Tao Wei, Aili Li, Zhenkai Liang:
Phishing page detection via learning classifiers from page layout feature. EURASIP J. Wirel. Commun. Netw. 2019: 43 (2019) - [j16]Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Jiguo Yu, Zhenkai Liang, Zhi Tian:
I Can See Your Brain: Investigating Home-Use Electroencephalography System Security. IEEE Internet Things J. 6(4): 6681-6691 (2019) - [c67]Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, Zhenkai Liang:
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment. CCS 2019: 225-240 - [c66]Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong, Haoyu Wang:
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking. ISC 2019: 299-318 - [c65]Zheng Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, Purui Su:
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics. NDSS 2019 - [c64]Qixiao Lin, Jian Mao, Futian Shi, Shishi Zhu, Zhenkai Liang:
Detecting Android Side Channel Probing Attacks Based on System States. WASA 2019: 201-212 - [c63]Yanhao Wang, Zheng Leong Chua, Yuwei Liu, Purui Su, Zhenkai Liang:
Fuzzing Program Logic Deeply Hidden in Binary Program Stages. SANER 2019: 105-116 - [e3]Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3 [contents] - [i4]Xiaoxuan Lou, Fan Zhang, Zheng Leong Chua, Zhenkai Liang, Yueqiang Cheng, Yajin Zhou:
Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework. CoRR abs/1901.03538 (2019) - [i3]Ziqi Yang, Ee-Chien Chang, Zhenkai Liang:
Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment. CoRR abs/1902.08552 (2019) - 2018
- [j15]Jian Mao, Jingdong Bian, Guangdong Bai, Ruilong Wang, Yue Chen, Yinhao Xiao, Zhenkai Liang:
Detecting Malicious Behaviors in JavaScript Applications. IEEE Access 6: 12284-12294 (2018) - [j14]Ziqi Yang, Zhenkai Liang:
Automated identification of sensitive data from implicit user specification. Cybersecur. 1(1): 13 (2018) - [j13]Yutao Liu, Dong Du, Yubin Xia, Haibo Chen, Binyu Zang, Zhenkai Liang:
SplitPass: A Mutually Distrusting Two-Party Password Manager. J. Comput. Sci. Technol. 33(1): 98-115 (2018) - [c62]Kai Cheng, Qiang Li, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, Zhenkai Liang:
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. DSN 2018: 430-441 - [c61]Jian Mao, Jingdong Bian, Hanjun Ma, Yaoqi Jia, Zhenkai Liang, Xuxian Jiang:
Robust Detection of Android UI Similarity. ICC 2018: 1-6 - [c60]Kulani Tharaka Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Jin Song Dong, Zhenkai Liang:
HOMESCAN: Scrutinizing Implementations of Smart Home Integrations. ICECCS 2018: 21-30 - [c59]Yizhen Jia, Yinhao Xiao, Jiguo Yu, Xiuzhen Cheng, Zhenkai Liang, Zhiguo Wan:
A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT. INFOCOM 2018: 1493-1501 - [c58]Ziqi Yang, Zhenkai Liang:
Automated Identification of Sensitive Data via Flexible User Requirements. SecureComm (1) 2018: 151-171 - 2017
- [j12]Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang:
Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity. IEEE Access 5: 17020-17030 (2017) - [j11]Ting Dai, Xiaolei Li, Behnaz Hassanshahi, Roland H. C. Yap, Zhenkai Liang:
RoppDroid: Robust permission re-delegation prevention in Android inter-component communication. Comput. Secur. 68: 98-111 (2017) - [j10]Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Zhenkai Liang:
Toward Exposing Timing-Based Probing Attacks in Web Applications. Sensors 17(3): 464 (2017) - [j9]Mingshen Sun, Xiaolei Li, John C. S. Lui, Richard T. B. Ma, Zhenkai Liang:
Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android. IEEE Trans. Inf. Forensics Secur. 12(5): 1103-1112 (2017) - [c57]Jian Mao, Zheng Leong Chua, Zhenkai Liang:
Enabling practical experimentation in cyber-security training. DSC 2017: 516-517 - [c56]Jian Mao, Jingdong Bian, Wenqian Tian, Shishi Zhu, Tao Wei, Aili Li, Zhenkai Liang:
Detecting Phishing Websites via Aggregation Analysis of Page Layouts. IIKI 2017: 224-230 - [c55]Liang He, Yan Cai, Hong Hu, Purui Su, Zhenkai Liang, Yi Yang, Huafeng Huang, Jia Yan, Xiangkun Jia, Dengguo Feng:
Automatically assessing crashes from heap overflows. ASE 2017: 274-279 - [c54]Yinhao Xiao, Guangdong Bai, Jian Mao, Zhenkai Liang, Wei Cheng:
Privilege Leakage and Information Stealing through the Android Task Mechanism. PAC 2017: 152-163 - [c53]Zheng Leong Chua, Shiqi Shen, Prateek Saxena, Zhenkai Liang:
Neural Nets Can Learn Function Type Signatures From Binaries. USENIX Security Symposium 2017: 99-116 - [c52]Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang:
Phishing Website Detection Based on Effective CSS Features of Web Pages. WASA 2017: 804-815 - [i2]Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust Synchronous P2P Primitives Using SGX Enclaves. IACR Cryptol. ePrint Arch. 2017: 180 (2017) - 2016
- [j8]Jian Mao, Hanjun Ma, Yue Chen, Yaoqi Jia, Zhenkai Liang:
Automatic permission inference for hybrid mobile apps. J. High Speed Networks 22(1): 55-64 (2016) - [j7]Yaoqi Jia, Guangdong Bai, Prateek Saxena, Zhenkai Liang:
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation. Proc. Priv. Enhancing Technol. 2016(4): 294-314 (2016) - [j6]Gang Chen, Hai Jin, Deqing Zou, Zhenkai Liang, Bing Bing Zhou, Hao Wang:
A Framework for Practical Dynamic Software Updating. IEEE Trans. Parallel Distributed Syst. 27(4): 941-950 (2016) - [c51]Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, Zhenkai Liang:
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing. CCS 2016: 791-804 - [c50]Jian Mao, Ruilong Wang, Yue Chen, Yinhao Xiao, Yaoqi Jia, Zhenkai Liang:
A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications. IIKI 2016: 497-505 - [c49]Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, Zhenkai Liang:
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. IEEE Symposium on Security and Privacy 2016: 969-986 - [c48]Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Zhenkai Liang:
Toward Exposing Timing-Based Probing Attacks in Web Applications. WASA 2016: 499-510 - [e2]Xiuzhen Cheng, Zhenkai Liang:
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, Paderborn, Germany, July, 2016. ACM 2016, ISBN 978-1-4503-4346-6 [contents] - [i1]Mingshen Sun, Xiaolei Li, John C. S. Lui, Richard T. B. Ma, Zhenkai Liang:
Monet: A User-oriented Behavior-based Malware Variants Detection System for Android. CoRR abs/1612.03312 (2016) - 2015
- [j5]Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena, Jian Mao, Zhenkai Liang:
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning. Comput. Secur. 55: 62-80 (2015) - [j4]Yaoqi Jia, Xinshu Dong, Zhenkai Liang, Prateek Saxena:
I Know Where You've Been: Geo-Inference Attacks via the Browser Cache. IEEE Internet Comput. 19(1): 44-53 (2015) - [c47]Hong Hu, Zheng Leong Chua, Zhenkai Liang, Prateek Saxena:
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software. ESORICS (2) 2015: 312-331 - [c46]Behnaz Hassanshahi, Yaoqi Jia, Roland H. C. Yap, Prateek Saxena, Zhenkai Liang:
Web-to-Application Injection Attacks on Android: Characterization and Detection. ESORICS (2) 2015: 577-598 - [c45]Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, Zhenkai Liang:
Automatic Generation of Data-Oriented Exploits. USENIX Security Symposium 2015: 177-192 - 2014
- [c44]Kapil Singh, Zhenkai Liang:
CCS'14 Co-Located Workshop Summary for SPSM 2014. CCS 2014: 1558-1559 - [c43]Guangdong Bai, Jianan Hao, Jianliang Wu, Yang Liu, Zhenkai Liang, Andrew P. Martin:
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms. FM 2014: 110-126 - [c42]Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, Prateek Saxena:
DroidVault: A Trusted Data Vault for Android Devices. ICECCS 2014: 29-38 - [c41]Ting Dai, Mingwei Zhang, Roland H. C. Yap, Zhenkai Liang:
Understanding Complex Binary Loading Behaviors. ICECCS 2014: 49-58 - [c40]Sai Sathyanarayan, Dawei Qi, Zhenkai Liang, Abhik Roychoudary:
SQLR: Grammar-Guided Validation of SQL Injection Sanitizers. ICECCS 2014: 154-157 - [c39]Xiaolei Li, Xinshu Dong, Zhenkai Liang:
A Usage-Pattern Perspective for Privacy Ranking of Android Apps. ICISS 2014: 245-256 - [c38]Chiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang, Xuxian Jiang:
AirBag: Boosting Smartphone Resistance to Malware Infection. NDSS 2014 - [c37]Enrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang:
You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers. RAID 2014: 150-171 - [c36]Xiaolei Li, Guangdong Bai, Benjamin Thian, Zhenkai Liang, Heng Yin:
A Light-Weight Software Environment for Confining Android Malware. SERE (Companion) 2014: 158-167 - [e1]Cliff Wang, Dijiang Huang, Kapil Singh, Zhenkai Liang:
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014. ACM 2014, ISBN 978-1-4503-3155-5 [contents] - 2013
- [j3]Gang Chen, Hai Jin, Deqing Zou, Bing Bing Zhou, Zhenkai Liang, Weide Zheng, Xuanhua Shi:
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 10(6): 368-379 (2013) - [c35]Aravind Prakash, Heng Yin, Zhenkai Liang:
Enforcing system-wide control flow integrity for exploit detection and diagnosis. AsiaCCS 2013: 311-322 - [c34]Xinshu Dong, Zhaofeng Chen, Hossein Siadati, Shruti Tople, Prateek Saxena, Zhenkai Liang:
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS. CCS 2013: 1311-1324 - [c33]Zhaofeng Chen, Xinshu Dong, Prateek Saxena, Zhenkai Liang:
CRYPTSERVER: strong data protection in commodity LAMP servers. CCS 2013: 1457-1460 - [c32]Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang:
A Quantitative Evaluation of Privilege Separation in Web Browser Designs. ESORICS 2013: 75-93 - [c31]Xinshu Dong, Kailas Patil, Jian Mao, Zhenkai Liang:
A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications. ICECCS 2013: 177-187 - [c30]Xiaolei Li, Guangdong Bai, Zhenkai Liang, Heng Yin:
A Software Environment for Confining Malicious Android Applications via Resource Virtualization. ICECCS 2013: 208-211 - [c29]Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang:
Rating Web Pages Using Page-Transition Evidence. ICICS 2013: 49-58 - [c28]Jian Mao, Pei Li, Kun Li, Tao Wei, Zhenkai Liang:
BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features. INCoS 2013: 790-795 - 2012
- [j2]Dawei Qi, Abhik Roychoudhury, Zhenkai Liang, Kapil Vaswani:
DARWIN: An approach to debugging evolving programs. ACM Trans. Softw. Eng. Methodol. 21(3): 19:1-19:29 (2012) - [c27]Minh Tran, Xinshu Dong, Zhenkai Liang, Xuxian Jiang:
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations. ACNS 2012: 418-435 - [c26]Yongzheng Wu, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang:
Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions. ESORICS 2012: 859-876 - [c25]Ting Dai, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang:
Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer. ICICS 2012: 373-380 - [c24]Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang, Zhiyong Feng:
An Empirical Study of Dangerous Behaviors in Firefox Extensions. ISC 2012: 188-203 - [c23]Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang, Heng Yin:
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis. NDSS 2012 - [c22]Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Zhenkai Liang, Wei Zou:
A Framework to Eliminate Backdoors from Response-Computable Authentication. IEEE Symposium on Security and Privacy 2012: 3-17 - 2011
- [c21]Xinshu Dong, Minh Tran, Zhenkai Liang, Xuxian Jiang:
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements. ACSAC 2011: 297-306 - [c20]Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Zhenkai Liang:
Jump-oriented programming: a new class of code-reuse attack. AsiaCCS 2011: 30-40 - [c19]Kailas Patil, Xinshu Dong, Xiaolei Li, Zhenkai Liang, Xuxian Jiang:
Towards Fine-Grained Access Control in JavaScript Contexts. ICDCS 2011: 720-729 - 2010
- [c18]Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei Zou:
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks. ACSAC 2010: 327-336 - [c17]Dawei Qi, Abhik Roychoudhury, Zhenkai Liang:
Test generation to expose changes in evolving programs. ASE 2010: 397-406 - [c16]Michael C. Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh:
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. SecureComm 2010: 162-180 - [c15]Ansuman Banerjee, Abhik Roychoudhury, Johannes A. Harlie, Zhenkai Liang:
Golden implementation driven software debugging. SIGSOFT FSE 2010: 177-186
2000 – 2009
- 2009
- [j1]Zhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar:
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ACM Trans. Inf. Syst. Secur. 12(3): 14:1-14:37 (2009) - [c14]Juan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song:
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. RAID 2009: 161-181 - [c13]Dawei Qi, Abhik Roychoudhury, Zhenkai Liang, Kapil Vaswani:
Darwin: an approach for debugging evolving programs. ESEC/SIGSOFT FSE 2009: 33-42 - 2008
- [c12]Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkatakrishnan:
Expanding Malware Defense by Securing Software Installations. DIMVA 2008: 164-185 - [c11]Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael K. Reiter:
AGIS: Towards automatic generation of infection signatures. DSN 2008: 237-246 - [c10]Dawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena:
BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25 - [c9]Heng Yin, Zhenkai Liang, Dawn Song:
HookFinder: Identifying and Understanding Malware Hooking Behaviors. NDSS 2008 - [p1]David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin:
Automatically Identifying Trigger-based Behavior in Malware. Botnet Detection 2008: 65-88 - 2007
- [c8]Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiaodong Song:
Polyglot: automatic extraction of protocol message format using dynamic binary analysis. CCS 2007: 317-329 - [c7]David Brumley, Juan Caballero, Zhenkai Liang, James Newsome:
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation. USENIX Security Symposium 2007 - 2005
- [c6]Zhenkai Liang, R. Sekar:
Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. ACSAC 2005: 215-224 - [c5]