Practical control flow integrity and randomization for binary executables C Zhang, T Wei, Z Chen, L Duan, L Szekeres, S McCamant, D Song, ... 2013 IEEE symposium on security and privacy, 559-573, 2013 | 714 | 2013 |
CollAFL: Path Sensitive Fuzzing S Gan, C Zhang, X Qin, X Tu, K Li, Z Pei, Z Chen IEEE Security & Privacy 2018, 2018 | 478 | 2018 |
{MOPT}: Optimized mutation scheduling for fuzzers C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song, R Beyah 28th USENIX Security Symposium (USENIX Security 19), 1949-1966, 2019 | 297 | 2019 |
Fuzzing: a survey J Li, B Zhao, C Zhang Cybersecurity 1, 1-13, 2018 | 297 | 2018 |
αdiff: cross-version binary code similarity detection with dnn B Liu, W Huo, C Zhang, W Li, F Li, A Piao, W Zou Proceedings of the 33rd ACM/IEEE international conference on automated …, 2018 | 216 | 2018 |
{GREYONE}: Data flow sensitive fuzzing S Gan, C Zhang, P Chen, B Zhao, X Qin, D Wu, Z Chen 29th USENIX security symposium (USENIX Security 20), 2577-2594, 2020 | 180 | 2020 |
VTint: Protecting Virtual Function Tables' Integrity. C Zhang, C Song, KZ Chen, Z Chen, D Song NDSS, 2015 | 108 | 2015 |
VTrust: Regaining Trust on Virtual Calls C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song Network and Distributed System Security Symposium, 2016 | 101 | 2016 |
Revery: From proof-of-concept to exploitable Y Wang, C Zhang, X Xiang, Z Zhao, W Li, X Gong, B Liu, K Chen, W Zou Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 95 | 2018 |
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time C Zhang, T Wang, T Wei, Y Chen, W Zou Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 72 | 2010 |
Jtrans: Jump-aware transformer for binary code similarity detection H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu, J Zhuge, C Zhang Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 70* | 2022 |
Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange P Xia, H Wang, B Gao, W Su, Z Yu, X Luo, C Zhang, X Xiao, G Xu Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (3 …, 2021 | 69 | 2021 |
Exploiting and Protecting Dynamic Code Generation. C Song, C Zhang, T Wang, W Lee, D Melski NDSS, 2015 | 67 | 2015 |
Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems L Chen, Y Wang, Q Cai, Y Zhan, H Hu, J Linghu, Q Hou, C Zhang, H Duan, ... 30th USENIX Security Symposium (USENIX Security 21), 303-319, 2021 | 50 | 2021 |
{FANS}: Fuzzing android native system services via automated interface analysis B Liu, C Zhang, G Gong, Y Zeng, H Ruan, J Zhuge 29th USENIX Security Symposium (USENIX Security 20), 307-323, 2020 | 49 | 2020 |
A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons Learned B Liu, G Meng, W Zou, Q Gong, F Li, M Lin, D Sun, W Huo, C Zhang ICSE, 2020 | 46 | 2020 |
SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities Y Zhang, W Huo, K Jian, J Shi, H Lu, L Liu, C Wang, D Sun, C Zhang, ... Proceedings of the 35th annual computer security applications conference …, 2019 | 41 | 2019 |
Towards efficient heap overflow discovery X Jia, C Zhang, P Su, Y Yang, H Huang, D Feng 26th USENIX Security Symposium (USENIX Security 17), 989-1006, 2017 | 41 | 2017 |
{MAZE}: Towards automated heap feng shui Y Wang, C Zhang, Z Zhao, B Zhang, X Gong, W Zou 30th USENIX Security Symposium (USENIX Security 21), 1647-1664, 2021 | 40 | 2021 |
Finding cracks in shields: On the security of control flow integrity mechanisms Y Li, M Wang, C Zhang, X Chen, S Yang, Y Liu Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 38 | 2020 |