default search action
Zhenkai Liang
Person information
- affiliation: National University of Singapore
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c85]Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland H. C. Yap, Zhenkai Liang, Manuel Rigger:
Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation. ICSE 2024: 46:1-46:12 - [c84]Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang:
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities. RAID 2024: 384-402 - [c83]Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, Zhenkai Liang:
CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning. RAID 2024: 579-593 - [c82]Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, Zhenkai Liang:
UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation. USENIX Security Symposium 2024 - [i10]Jiahao Liu, Jun Zeng, Fabio Pierazzi, Lorenzo Cavallaro, Zhenkai Liang:
Unraveling the Key of Machine Learning Solutions for Android Malware Detection. CoRR abs/2402.02953 (2024) - [i9]Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang:
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities. CoRR abs/2404.11107 (2024) - [i8]Bonan Ruan, Jiahao Liu, Weibo Zhao, Zhenkai Liang:
VulZoo: A Comprehensive Vulnerability Intelligence Dataset. CoRR abs/2406.16347 (2024) - [i7]Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Hai Jin, Zhenkai Liang:
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches. CoRR abs/2409.04484 (2024) - [i6]Jingnan Zheng, Jiaohao Liu, An Zhang, Jun Zeng, Ziqi Yang, Zhenkai Liang, Tat-Seng Chua:
MASKDROID: Robust Android Malware Detection with Masked Graph Representations. CoRR abs/2409.19594 (2024) - 2023
- [j21]Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Shengling Wang, Jian Mao, Zhenkai Liang:
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association. IEEE Trans. Dependable Secur. Comput. 20(2): 1017-1030 (2023) - [c81]Jiahao Liu, Jun Zeng, Xiang Wang, Zhenkai Liang:
Learning Graph-based Code Representations for Source-level Functional Similarity Detection. ICSE 2023: 345-357 - 2022
- [j20]Jian Mao, Ziwen Liu, Qixiao Lin, Zhenkai Liang:
Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages. IEEE Internet Things J. 9(12): 9151-9166 (2022) - [c80]Yuancheng Jiang, Roland H. C. Yap, Zhenkai Liang, Hubert Rosier:
RecIPE: Revisiting the Evaluation of Memory Error Defenses. AsiaCCS 2022: 574-588 - [c79]Tu Yu, Zhenkai Liang, Hanyang Zhang, Haiyu Zhang, Wei Gao, Wentao Han:
Non-uniform Deformation Behavior of Magneto-Sensitive Elastomer Containing Uniform Sphere Particles with V-ShapedArrangement. BIC-TA 2022: 520-530 - [c78]Jun Zeng, Chuqi Zhang, Zhenkai Liang:
PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability. CCS 2022: 3135-3149 - [c77]Zhenyuan Li, Jun Zeng, Yan Chen, Zhenkai Liang:
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports. ESORICS (1) 2022: 589-609 - [c76]Yuancheng Jiang, Gregory J. Duck, Roland H. C. Yap, Zhenkai Liang, Pinghai Yuan:
Extensible Virtual Call Integrity. ESORICS (3) 2022: 723-739 - [c75]Jiahao Liu, Jun Zeng, Xiang Wang, Kaihang Ji, Zhenkai Liang:
TeLL: log level suggestions via modeling multi-level code block information. ISSTA 2022: 27-38 - [c74]Jun Zeng, Xiang Wang, Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, Zheng Leong Chua:
SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records. SP 2022: 489-506 - [c73]Liang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang:
FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries. USENIX Security Symposium 2022: 2497-2512 - [c72]Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, Abhik Roychoudhury:
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation. USENIX Security Symposium 2022: 2567-2584 - 2021
- [j19]Kulani Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Yan Liu, Jin Song Dong, Zhenkai Liang:
Scrutinizing Implementations of Smart Home Integrations. IEEE Trans. Software Eng. 47(12): 2667-2683 (2021) - [c71]Kulani Mahadewa, Yanjun Zhang, Guangdong Bai, Lei Bu, Zhiqiang Zuo, Dileepa Fernando, Zhenkai Liang, Jin Song Dong:
Identifying privacy weaknesses from multi-party trigger-action integration platforms. ISSTA 2021: 2-15 - [c70]Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao:
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics. NDSS 2021 - [i5]Zhenyuan Li, Jun Zeng, Yan Chen, Zhenkai Liang:
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports. CoRR abs/2111.07093 (2021) - 2020
- [j18]Sang Kil Cha, Zhenkai Liang:
Asia's surging interest in binary analysis. Commun. ACM 63(4): 86-88 (2020) - [c69]Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust P2P Primitives Using SGX Enclaves. ICDCS 2020: 1185-1186 - [c68]Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust P2P Primitives Using SGX Enclaves. RAID 2020: 209-224
2010 – 2019
- 2019
- [j17]Jian Mao, Jingdong Bian, Wenqian Tian, Shishi Zhu, Tao Wei, Aili Li, Zhenkai Liang:
Phishing page detection via learning classifiers from page layout feature. EURASIP J. Wirel. Commun. Netw. 2019: 43 (2019) - [j16]Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Jiguo Yu, Zhenkai Liang, Zhi Tian:
I Can See Your Brain: Investigating Home-Use Electroencephalography System Security. IEEE Internet Things J. 6(4): 6681-6691 (2019) - [c67]Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, Zhenkai Liang:
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment. CCS 2019: 225-240 - [c66]Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong, Haoyu Wang:
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking. ISC 2019: 299-318 - [c65]Zheng Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, Purui Su:
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics. NDSS 2019 - [c64]Qixiao Lin, Jian Mao, Futian Shi, Shishi Zhu, Zhenkai Liang:
Detecting Android Side Channel Probing Attacks Based on System States. WASA 2019: 201-212 - [c63]Yanhao Wang, Zheng Leong Chua, Yuwei Liu, Purui Su, Zhenkai Liang:
Fuzzing Program Logic Deeply Hidden in Binary Program Stages. SANER 2019: 105-116 - [e3]Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3 [contents] - [i4]Xiaoxuan Lou, Fan Zhang, Zheng Leong Chua, Zhenkai Liang, Yueqiang Cheng, Yajin Zhou:
Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework. CoRR abs/1901.03538 (2019) - [i3]Ziqi Yang, Ee-Chien Chang, Zhenkai Liang:
Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment. CoRR abs/1902.08552 (2019) - 2018
- [j15]Jian Mao, Jingdong Bian, Guangdong Bai, Ruilong Wang, Yue Chen, Yinhao Xiao, Zhenkai Liang:
Detecting Malicious Behaviors in JavaScript Applications. IEEE Access 6: 12284-12294 (2018) - [j14]Ziqi Yang, Zhenkai Liang:
Automated identification of sensitive data from implicit user specification. Cybersecur. 1(1): 13 (2018) - [j13]Yutao Liu, Dong Du, Yubin Xia, Haibo Chen, Binyu Zang, Zhenkai Liang:
SplitPass: A Mutually Distrusting Two-Party Password Manager. J. Comput. Sci. Technol. 33(1): 98-115 (2018) - [c62]Kai Cheng, Qiang Li, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, Zhenkai Liang:
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. DSN 2018: 430-441 - [c61]Jian Mao, Jingdong Bian, Hanjun Ma, Yaoqi Jia, Zhenkai Liang, Xuxian Jiang:
Robust Detection of Android UI Similarity. ICC 2018: 1-6 - [c60]Kulani Tharaka Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Jin Song Dong, Zhenkai Liang:
HOMESCAN: Scrutinizing Implementations of Smart Home Integrations. ICECCS 2018: 21-30 - [c59]Yizhen Jia, Yinhao Xiao, Jiguo Yu, Xiuzhen Cheng, Zhenkai Liang, Zhiguo Wan:
A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT. INFOCOM 2018: 1493-1501 - [c58]Ziqi Yang, Zhenkai Liang:
Automated Identification of Sensitive Data via Flexible User Requirements. SecureComm (1) 2018: 151-171 - 2017
- [j12]Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang:
Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity. IEEE Access 5: 17020-17030 (2017) - [j11]Ting Dai, Xiaolei Li, Behnaz Hassanshahi, Roland H. C. Yap, Zhenkai Liang:
RoppDroid: Robust permission re-delegation prevention in Android inter-component communication. Comput. Secur. 68: 98-111 (2017) - [j10]Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Zhenkai Liang:
Toward Exposing Timing-Based Probing Attacks in Web Applications. Sensors 17(3): 464 (2017) - [j9]Mingshen Sun, Xiaolei Li, John C. S. Lui, Richard T. B. Ma, Zhenkai Liang:
Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android. IEEE Trans. Inf. Forensics Secur. 12(5): 1103-1112 (2017) - [c57]Jian Mao, Zheng Leong Chua, Zhenkai Liang:
Enabling practical experimentation in cyber-security training. DSC 2017: 516-517 - [c56]Jian Mao, Jingdong Bian, Wenqian Tian, Shishi Zhu, Tao Wei, Aili Li, Zhenkai Liang:
Detecting Phishing Websites via Aggregation Analysis of Page Layouts. IIKI 2017: 224-230 - [c55]Liang He, Yan Cai, Hong Hu, Purui Su, Zhenkai Liang, Yi Yang, Huafeng Huang, Jia Yan, Xiangkun Jia, Dengguo Feng:
Automatically assessing crashes from heap overflows. ASE 2017: 274-279 - [c54]Yinhao Xiao, Guangdong Bai, Jian Mao, Zhenkai Liang, Wei Cheng:
Privilege Leakage and Information Stealing through the Android Task Mechanism. PAC 2017: 152-163 - [c53]Zheng Leong Chua, Shiqi Shen, Prateek Saxena, Zhenkai Liang:
Neural Nets Can Learn Function Type Signatures From Binaries. USENIX Security Symposium 2017: 99-116 - [c52]Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang:
Phishing Website Detection Based on Effective CSS Features of Web Pages. WASA 2017: 804-815 - [i2]Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust Synchronous P2P Primitives Using SGX Enclaves. IACR Cryptol. ePrint Arch. 2017: 180 (2017) - 2016
- [j8]Jian Mao, Hanjun Ma, Yue Chen, Yaoqi Jia, Zhenkai Liang:
Automatic permission inference for hybrid mobile apps. J. High Speed Networks 22(1): 55-64 (2016) - [j7]Yaoqi Jia, Guangdong Bai, Prateek Saxena, Zhenkai Liang:
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation. Proc. Priv. Enhancing Technol. 2016(4): 294-314 (2016) - [j6]Gang Chen, Hai Jin, Deqing Zou, Zhenkai Liang, Bing Bing Zhou, Hao Wang:
A Framework for Practical Dynamic Software Updating. IEEE Trans. Parallel Distributed Syst. 27(4): 941-950 (2016) - [c51]Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, Zhenkai Liang:
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing. CCS 2016: 791-804 - [c50]Jian Mao, Ruilong Wang, Yue Chen, Yinhao Xiao, Yaoqi Jia, Zhenkai Liang:
A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications. IIKI 2016: 497-505 - [c49]Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, Zhenkai Liang:
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. IEEE Symposium on Security and Privacy 2016: 969-986 - [c48]Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Zhenkai Liang:
Toward Exposing Timing-Based Probing Attacks in Web Applications. WASA 2016: 499-510 - [e2]Xiuzhen Cheng, Zhenkai Liang:
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, Paderborn, Germany, July, 2016. ACM 2016, ISBN 978-1-4503-4346-6 [contents] - [i1]Mingshen Sun, Xiaolei Li, John C. S. Lui, Richard T. B. Ma, Zhenkai Liang:
Monet: A User-oriented Behavior-based Malware Variants Detection System for Android. CoRR abs/1612.03312 (2016) - 2015
- [j5]Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena, Jian Mao, Zhenkai Liang:
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning. Comput. Secur. 55: 62-80 (2015) - [j4]Yaoqi Jia, Xinshu Dong, Zhenkai Liang, Prateek Saxena:
I Know Where You've Been: Geo-Inference Attacks via the Browser Cache. IEEE Internet Comput. 19(1): 44-53 (2015) - [c47]Hong Hu, Zheng Leong Chua, Zhenkai Liang, Prateek Saxena:
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software. ESORICS (2) 2015: 312-331 - [c46]Behnaz Hassanshahi, Yaoqi Jia, Roland H. C. Yap, Prateek Saxena, Zhenkai Liang:
Web-to-Application Injection Attacks on Android: Characterization and Detection. ESORICS (2) 2015: 577-598 - [c45]Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, Zhenkai Liang:
Automatic Generation of Data-Oriented Exploits. USENIX Security Symposium 2015: 177-192 - 2014
- [c44]Kapil Singh, Zhenkai Liang:
CCS'14 Co-Located Workshop Summary for SPSM 2014. CCS 2014: 1558-1559 - [c43]Guangdong Bai, Jianan Hao, Jianliang Wu, Yang Liu, Zhenkai Liang, Andrew P. Martin:
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms. FM 2014: 110-126 - [c42]Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, Prateek Saxena:
DroidVault: A Trusted Data Vault for Android Devices. ICECCS 2014: 29-38 - [c41]Ting Dai, Mingwei Zhang, Roland H. C. Yap, Zhenkai Liang:
Understanding Complex Binary Loading Behaviors. ICECCS 2014: 49-58 - [c40]Sai Sathyanarayan, Dawei Qi, Zhenkai Liang, Abhik Roychoudary:
SQLR: Grammar-Guided Validation of SQL Injection Sanitizers. ICECCS 2014: 154-157 - [c39]Xiaolei Li, Xinshu Dong, Zhenkai Liang:
A Usage-Pattern Perspective for Privacy Ranking of Android Apps. ICISS 2014: 245-256 - [c38]Chiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang, Xuxian Jiang:
AirBag: Boosting Smartphone Resistance to Malware Infection. NDSS 2014 - [c37]Enrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang:
You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers. RAID 2014: 150-171 - [c36]Xiaolei Li, Guangdong Bai, Benjamin Thian, Zhenkai Liang, Heng Yin:
A Light-Weight Software Environment for Confining Android Malware. SERE (Companion) 2014: 158-167 - [e1]Cliff Wang, Dijiang Huang, Kapil Singh, Zhenkai Liang:
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014. ACM 2014, ISBN 978-1-4503-3155-5 [contents] - 2013
- [j3]Gang Chen, Hai Jin, Deqing Zou, Bing Bing Zhou, Zhenkai Liang, Weide Zheng, Xuanhua Shi:
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 10(6): 368-379 (2013) - [c35]Aravind Prakash, Heng Yin, Zhenkai Liang:
Enforcing system-wide control flow integrity for exploit detection and diagnosis. AsiaCCS 2013: 311-322 - [c34]Xinshu Dong, Zhaofeng Chen, Hossein Siadati, Shruti Tople, Prateek Saxena, Zhenkai Liang:
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS. CCS 2013: 1311-1324 - [c33]Zhaofeng Chen, Xinshu Dong, Prateek Saxena, Zhenkai Liang:
CRYPTSERVER: strong data protection in commodity LAMP servers. CCS 2013: 1457-1460 - [c32]Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang:
A Quantitative Evaluation of Privilege Separation in Web Browser Designs. ESORICS 2013: 75-93 - [c31]Xinshu Dong, Kailas Patil, Jian Mao, Zhenkai Liang:
A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications. ICECCS 2013: 177-187 - [c30]Xiaolei Li, Guangdong Bai, Zhenkai Liang, Heng Yin:
A Software Environment for Confining Malicious Android Applications via Resource Virtualization. ICECCS 2013: 208-211 - [c29]Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang:
Rating Web Pages Using Page-Transition Evidence. ICICS 2013: 49-58 - [c28]Jian Mao, Pei Li, Kun Li, Tao Wei, Zhenkai Liang:
BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features. INCoS 2013: 790-795 - 2012
- [j2]Dawei Qi, Abhik Roychoudhury, Zhenkai Liang, Kapil Vaswani:
DARWIN: An approach to debugging evolving programs. ACM Trans. Softw. Eng. Methodol. 21(3): 19:1-19:29 (2012) - [c27]Minh Tran, Xinshu Dong, Zhenkai Liang, Xuxian Jiang:
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations. ACNS 2012: 418-435 - [c26]Yongzheng Wu, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang:
Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions. ESORICS 2012: 859-876 - [c25]Ting Dai, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang:
Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer. ICICS 2012: 373-380 - [c24]Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang, Zhiyong Feng:
An Empirical Study of Dangerous Behaviors in Firefox Extensions. ISC 2012: 188-203 - [c23]Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang, Heng Yin:
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis. NDSS 2012 - [c22]Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Zhenkai Liang, Wei Zou:
A Framework to Eliminate Backdoors from Response-Computable Authentication. IEEE Symposium on Security and Privacy 2012: 3-17 - 2011
- [c21]Xinshu Dong, Minh Tran, Zhenkai Liang, Xuxian Jiang:
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements. ACSAC 2011: 297-306 - [c20]Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Zhenkai Liang:
Jump-oriented programming: a new class of code-reuse attack. AsiaCCS 2011: 30-40 - [c19]Kailas Patil, Xinshu Dong, Xiaolei Li, Zhenkai Liang, Xuxian Jiang:
Towards Fine-Grained Access Control in JavaScript Contexts. ICDCS 2011: 720-729 - 2010
- [c18]Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei Zou:
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks. ACSAC 2010: 327-336 - [c17]Dawei Qi, Abhik Roychoudhury, Zhenkai Liang:
Test generation to expose changes in evolving programs. ASE 2010: 397-406 - [c16]Michael C. Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh:
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. SecureComm 2010: 162-180 - [c15]Ansuman Banerjee, Abhik Roychoudhury, Johannes A. Harlie, Zhenkai Liang:
Golden implementation driven software debugging. SIGSOFT FSE 2010: 177-186
2000 – 2009
- 2009
- [j1]Zhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar:
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ACM Trans. Inf. Syst. Secur. 12(3): 14:1-14:37 (2009) - [c14]Juan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song:
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. RAID 2009: 161-181 - [c13]Dawei Qi, Abhik Roychoudhury, Zhenkai Liang, Kapil Vaswani:
Darwin: an approach for debugging evolving programs. ESEC/SIGSOFT FSE 2009: 33-42 - 2008
- [c12]Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkatakrishnan:
Expanding Malware Defense by Securing Software Installations. DIMVA 2008: 164-185 - [c11]Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael K. Reiter:
AGIS: Towards automatic generation of infection signatures. DSN 2008: 237-246 - [c10]Dawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena:
BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25 - [c9]Heng Yin, Zhenkai Liang, Dawn Song:
HookFinder: Identifying and Understanding Malware Hooking Behaviors. NDSS 2008 - [p1]David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin:
Automatically Identifying Trigger-based Behavior in Malware. Botnet Detection 2008: 65-88 - 2007
- [c8]Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiaodong Song:
Polyglot: automatic extraction of protocol message format using dynamic binary analysis. CCS 2007: 317-329 - [c7]David Brumley, Juan Caballero, Zhenkai Liang, James Newsome:
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation. USENIX Security Symposium 2007 - 2005
- [c6]Zhenkai Liang, R. Sekar:
Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. ACSAC 2005: 215-224 - [c5]Zhenkai Liang, R. Sekar:
Fast and automated generation of attack signatures: a basis for building self-protecting servers. CCS 2005: 213-222 - [c4]Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar:
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. NDSS 2005 - [c3]Zhenkai Liang, R. Sekar, Daniel C. DuVarney:
Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems. USENIX ATC, General Track 2005: 375-378 - 2003
- [c2]Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar:
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. ACSAC 2003: 182-191 - 2002
- [c1]V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang:
An Approach for Secure Software Installation. LISA 2002: 219-226
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint