Binary Stirring: Self-randomizing Instruction Addresses of Legacy x86 Binary Code R Wartell, V Mohan, KW Hamlen, Z Lin 19th ACM Conference on Computer and Communications Security, 2012 | 496 | 2012 |
Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 142-157, 2019 | 446 | 2019 |
IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ... Network and Distributed Security Symposium (NDSS), 2018 | 397 | 2018 |
Automatic protocol format reverse engineering through context-aware monitored execution Z Lin, X Jiang, D Xu, X Zhang In 15th Symposium on Network and Distributed System Security (NDSS, 2008 | 355 | 2008 |
Automatic reverse engineering of data structures from binary execution Z Lin, X Zhang, D Xu Proceedings of the 17th Network and Distributed System Security Symposium, 2010, 2010 | 306 | 2010 |
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection Y Fu, Z Lin IEEE Symposium on Security and Privacy, 586 - 600, 2012 | 271 | 2012 |
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. T Wang, T Wei, Z Lin, W Zou NDSS, 1-14, 2009 | 271 | 2009 |
SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps D Sounthiraraj, J Sahs, G Greenwood, Z Lin, L Khan NDSS, 2014 | 247* | 2014 |
Systems and methods for automated detection of application vulnerabilities L Khan, Z Lin, B Thuraisingham, J Sahs, D Sounthiraraj, G Greenwood US Patent 9,977,904, 2018 | 203 | 2018 |
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures. Z Lin, J Rhee, X Zhang, D Xu, X Jiang Ndss, 2011 | 159 | 2011 |
SGX-Log: Securing system logs with SGX V Karande, E Bauman, Z Lin, L Khan Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 153 | 2017 |
Sgxpectre attacks: Leaking enclave secrets via speculative execution G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai arXiv preprint arXiv:1802.09085, 2018 | 142 | 2018 |
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics E Bauman, Z Lin, KW Hamlen Proceedings of the 25th Network and Distributed Systems Security Symposium …, 2018 | 136 | 2018 |
{X-Force}:{Force-Executing} binary programs for security applications F Peng, Z Deng, X Zhang, D Xu, Z Lin, Z Su 23rd USENIX Security Symposium (USENIX Security 14), 829-844, 2014 | 136 | 2014 |
Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors Y Tu, Z Lin, I Lee, X Hei 27th USENIX security symposium (USENIX Security 18), 1545-1562, 2018 | 123 | 2018 |
A survey on hypervisor-based monitoring: approaches, applications, and evolutions E Bauman, G Ayoade, Z Lin ACM Computing Surveys (CSUR) 48 (1), 1-33, 2015 | 120 | 2015 |
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps C Zuo, Z Lin, Y Zhang Proceedings of 2019 IEEE Symposium on Security and Privacy, 2019 | 119 | 2019 |
{SAVIOR}: Securing autonomous vehicles with robust physical invariants R Quinonez, J Giraldo, L Salazar, E Bauman, A Cardenas, Z Lin 29th USENIX security symposium (USENIX Security 20), 895-912, 2020 | 118 | 2020 |
Securing Untrusted Code via Compiler-Agnostic Binary Rewriting R Wartell, V Mohan, KW Hamlen, Z Lin 28th Annual Computer Security and Applications Conference, 2012 | 115 | 2012 |
{TXSPECTOR}: Uncovering attacks in ethereum from transactions M Zhang, X Zhang, Y Zhang, Z Lin 29th USENIX Security Symposium (USENIX Security 20), 2775-2792, 2020 | 97 | 2020 |