关注
Debin Gao
Debin Gao
在 smu.edu.sg 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Binhunt: Automatically finding semantic differences in binary programs
D Gao, MK Reiter, D Song
Information and Communications Security: 10th International Conference …, 2008
3532008
Gray-box extraction of execution graphs for anomaly detection
D Gao, MK Reiter, D Song
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2162004
On gray-box program tracking for anomaly detection
D Gao, MK Reiter, D Song
Carnegie Mellon University, 2004
1522004
On challenges in evaluating malware clustering
P Li, L Liu, D Gao, MK Reiter
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
1482010
iBinHunt: Binary hunting with inter-procedural control flow
J Ming, M Pan, D Gao
International Conference on Information Security and Cryptology, 92-109, 2012
1382012
Behavioral distance measurement using hidden markov models
D Gao, MK Reiter, D Song
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
1382006
Behavioral distance for intrusion detection
D Gao, MK Reiter, D Song
Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006
1362006
I can be you: Questioning the use of keystroke dynamics as biometrics
CM Tey, P Gupta, D Gao
1042013
Linear obfuscation to combat symbolic execution
Z Wang, J Ming, C Jia, D Gao
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
972011
Mitigating access-driven timing channels in clouds using StopWatch
P Li, D Gao, MK Reiter
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
752013
Comparing mobile privacy protection through cross-platform applications
J Han, Q Yan, D Gao, J Zhou, RH Deng
Internet Society, 2013
682013
Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance
D Gao, MK Reiter, D Song
IEEE Transactions on Dependable and Secure Computing 6 (2), 96-110, 2008
592008
Stopwatch: a cloud architecture for timing channel mitigation
P Li, D Gao, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 17 (2), 1-28, 2014
562014
Ropsteg: program steganography with return oriented programming
K Lu, S Xiong, D Gao
Proceedings of the 4th ACM conference on Data and application security and …, 2014
502014
Launching return-oriented programming attacks against randomized relocatable executables
L Liu, J Han, D Gao, J Jing, D Zha
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
472011
Mobipot: Understanding mobile telephony threats with honeycards
M Balduzzi, P Gupta, L Gu, D Gao, M Ahamad
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
422016
Launching generic attacks on ios with approved third-party applications
J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou
Applied Cryptography and Network Security: 11th International Conference …, 2013
352013
On the effectiveness of software diversity: A systematic study on real-world vulnerabilities
J Han, D Gao, RH Deng
International Conference on Detection of Intrusions and Malware, and …, 2009
352009
Software watermarking using return-oriented programming
H Ma, K Lu, X Ma, H Zhang, C Jia, D Gao
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
342015
Your love is public now: Questioning the use of personal information in authentication
P Gupta, S Gottipati, J Jiang, D Gao
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
312013
系统目前无法执行此操作,请稍后再试。
文章 1–20