Probabilistic disassembly K Miller, Y Kwon, Y Sun, Z Zhang, X Zhang, Z Lin 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 55 | 2019 |
Model orthogonalization: Class distance hardening in neural networks for better security G Tao, Y Liu, G Shen, Q Xu, S An, Z Zhang, X Zhang 2022 IEEE Symposium on Security and Privacy (SP), 1372-1389, 2022 | 45 | 2022 |
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces. Y Ye, Z Zhang, F Wang, X Zhang, D Xu NDSS, 2021 | 38 | 2021 |
Stochfuzz: Sound and cost-effective fuzzing of stripped binaries by incremental and stochastic rewriting Z Zhang, W You, G Tao, Y Aafer, X Liu, X Zhang 2021 IEEE Symposium on Security and Privacy (SP), 659-676, 2021 | 37 | 2021 |
Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary Z Zhang, Y Ye, W You, G Tao, W Lee, Y Kwon, Y Aafer, X Zhang 2021 IEEE Symposium on Security and Privacy (SP), 813-832, 2021 | 37 | 2021 |
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation L Yu, S Ma, Z Zhang, G Tao, X Zhang, D Xu, VE Urias, HW Lin, ... NDSS, 2021 | 34 | 2021 |
Demystifying Exploitable Bugs in Smart Contracts Z Zhang, B Zhang, W Xu, Z Lin 2023 IEEE/ACM 45st International Conference on Software Engineering (ICSE …, 2023 | 31 | 2023 |
Constrained optimization with dynamic bound-scaling for effective nlp backdoor defense G Shen, Y Liu, G Tao, Q Xu, Z Zhang, S An, S Ma, X Zhang International Conference on Machine Learning, 19879-19892, 2022 | 28 | 2022 |
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation Z Zhang, W You, G Tao, G Wei, Y Kwon, X Zhang Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-31, 2019 | 27 | 2019 |
Pmp: Cost-effective forced execution with probabilistic memory pre-planning W You, Z Zhang, Y Kwon, Y Aafer, F Peng, Y Shi, C Harmon, X Zhang 2020 IEEE Symposium on Security and Privacy (SP), 1121-1138, 2020 | 21 | 2020 |
Backdoor vulnerabilities in normally trained deep learning models G Tao, Z Wang, S Cheng, S Ma, S An, Y Liu, G Shen, Z Zhang, Y Mao, ... arXiv preprint arXiv:2211.15929, 2022 | 12 | 2022 |
On large language models’ resilience to coercive interrogation Z Zhang, G Shen, G Tao, S Cheng, X Zhang 2024 IEEE Symposium on Security and Privacy (SP), 252-252, 2024 | 9* | 2024 |
Your exploit is mine: Instantly synthesizing counterattack smart contract Z Zhang, Z Lin, M Morales, X Zhang, K Zhang 32nd USENIX Security Symposium (USENIX Security 23), 1757-1774, 2023 | 6 | 2023 |
Opening A Pandora's Box: Things You Should Know in the Era of Custom GPTs G Tao, S Cheng, Z Zhang, J Zhu, G Shen, X Zhang arXiv preprint arXiv:2401.00905, 2023 | 5 | 2023 |
D-arm: Disassembling arm binaries by lightweight superset instruction interpretation and graph modeling Y Ye, Z Zhang, Q Shi, Y Aafer, X Zhang 2023 IEEE Symposium on Security and Privacy (SP), 2391-2408, 2023 | 5 | 2023 |
Tensilefuzz: facilitating seed input generation in fuzzing via string constraint solving X Liu, W You, Z Zhang, X Zhang Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 5 | 2022 |
Parafuzz: An interpretability-driven technique for detecting poisoned samples in nlp L Yan, Z Zhang, G Tao, K Zhang, X Chen, G Shen, X Zhang Advances in Neural Information Processing Systems 36, 2024 | 4 | 2024 |
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis X Xu, S Feng, Y Ye, G Shen, Z Su, S Cheng, G Tao, Q Shi, Z Zhang, ... Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 4 | 2023 |
LmPa: Improving Decompilation by Synergy of Large Language Model and Program Analysis X Xu, Z Zhang, S Feng, Y Ye, Z Su, N Jiang, S Cheng, L Tan, X Zhang arXiv preprint arXiv:2306.02546, 2023 | 4 | 2023 |
Deck: Model hardening for defending pervasive backdoors G Tao, Y Liu, S Cheng, S An, Z Zhang, Q Xu, G Shen, X Zhang arXiv preprint arXiv:2206.09272, 2022 | 4 | 2022 |