Follow
Zhenkai Liang
Zhenkai Liang
Verified email at comp.nus.edu.sg - Homepage
Title
Cited by
Cited by
Year
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
10822008
Jump-oriented programming: a new class of code-reuse attack
T Bletsch, X Jiang, VW Freeh, Z Liang
Proceedings of the 6th ACM symposium on information, computer and …, 2011
9052011
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
J Caballero, H Yin, Z Liang, D Song
Proceedings of the 14th ACM conference on Computer and communications …, 2007
5992007
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
2016 IEEE Symposium on Security and Privacy (SP), 969-986, 2016
5412016
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection: Countering the Largest Security Threat, 65-88, 2008
3362008
Fast and automated generation of attack signatures: A basis for building self-protecting servers
Z Liang, R Sekar
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2652005
Automatic Generation of {Data-Oriented} Exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th USENIX Security Symposium (USENIX Security 15), 177-192, 2015
2552015
Neural network inversion in adversarial setting via background knowledge alignment
Z Yang, J Zhang, EC Chang, Z Liang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2262019
HookFinder: Identifying and understanding malware hooking behaviors
H Yin, Z Liang, D Song
NDSS 2008, 2008
2082008
Neural nets can learn function type signatures from binaries
ZL Chua, S Shen, P Saxena, Z Liang
26th USENIX Security Symposium (USENIX Security 17), 99-116, 2017
1932017
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
D Brumley, J Caballero, Z Liang, J Newsome, D Song
USENIX Security Symposium 15, 2007
1652007
Monet: a user-oriented behavior-based malware variants detection system for android
M Sun, X Li, JCS Lui, RTB Ma, Z Liang
IEEE Transactions on Information Forensics and Security 12 (5), 1103-1112, 2016
1582016
Isolated program execution: An application transparent approach for executing untrusted programs
Z Liang, VN Venkatakrishnan, R Sekar
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
1532003
Darwin: An approach to debugging evolving programs
D Qi, A Roychoudhury, Z Liang, K Vaswani
ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (3), 1-29, 2012
1462012
AirBag: Boosting Smartphone Resistance to Malware Infection.
C Wu, Y Zhou, K Patel, Z Liang, X Jiang
NDSS, 2014
1222014
BitScope: Automatically dissecting malicious binaries
D Brumley, C Hartwig, MG Kang, Z Liang, J Newsome, P Poosankam, ...
Technical Report CS-07-133, School of Computer Science, Carnegie Mellon …, 2007
1192007
Phishing-alarm: Robust and efficient phishing detection via page component similarity
J Mao, W Tian, P Li, T Wei, Z Liang
IEEE Access 5, 17020-17030, 2017
1172017
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
W Sun, Z Liang, VN Venkatakrishnan, R Sekar
NDSS, 2005
1072005
DTaint: detecting the taint-style vulnerability in embedded device firmware
K Cheng, Q Li, L Wang, Q Chen, Y Zheng, L Sun, Z Liang
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
1042018
AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports
Z Li, J Zeng, Y Chen, Z Liang
European Symposium on Research in Computer Security, 589-609, 2022
962022
The system can't perform the operation now. Try again later.
Articles 1–20