Data-oriented programming: On the expressiveness of non-control data attacks H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang 2016 IEEE Symposium on Security and Privacy (SP), 969-986, 2016 | 513 | 2016 |
Preventing page faults from telling your secrets S Shinde, ZL Chua, V Narayanan, P Saxena Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 305 | 2016 |
Automatic Generation of {Data-Oriented} Exploits H Hu, ZL Chua, S Adrian, P Saxena, Z Liang 24th USENIX Security Symposium (USENIX Security 15), 177-192, 2015 | 251 | 2015 |
Neural nets can learn function type signatures from binaries ZL Chua, S Shen, P Saxena, Z Liang 26th USENIX Security Symposium (USENIX Security 17), 99-116, 2017 | 187 | 2017 |
A look at targeted attacks through the lense of an {NGO} S Le Blond, A Uritesc, C Gilbert, ZL Chua, P Saxena, E Kirda 23rd USENIX Security Symposium (USENIX Security 14), 543-558, 2014 | 105 | 2014 |
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics. J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao NDSS, 2021 | 72 | 2021 |
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records J Zengy, X Wang, J Liu, Y Chen, Z Liang, TS Chua, ZL Chua 2022 IEEE Symposium on Security and Privacy (SP), 489-506, 2022 | 60 | 2022 |
Scalable quantitative verification for deep neural networks T Baluta, ZL Chua, KS Meel, P Saxena 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 55 | 2021 |
One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics. ZL Chua, Y Wang, T Baluta, P Saxena, Z Liang, P Su NDSS, 2019 | 42 | 2019 |
" The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 35 | 2016 |
Identifying arbitrary memory access vulnerabilities in privilege-separated software H Hu, ZL Chua, Z Liang, P Saxena Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 13 | 2015 |
Understanding Rowhammer attacks through the lens of a unified reference framework X Lou, F Zhang, ZL Chua, Z Liang, Y Cheng, Y Zhou arXiv preprint arXiv:1901.03538, 2019 | 11 | 2019 |
{FlowMatrix}:{GPU-Assisted}{Information-Flow} Analysis through {Matrix-Based} Representation K Ji, J Zeng, Y Jiang, Z Liang, ZL Chua, P Saxena, A Roychoudhury 31st USENIX Security Symposium (USENIX Security 22), 2567-2584, 2022 | 4 | 2022 |
Smartphone volatile memory acquisition for security analysis and forensics investigation VLL Thing, ZL Chua Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013 | 4 | 2013 |
Enabling practical experimentation in cyber-security training J Mao, ZL Chua, Z Liang 2017 IEEE Conference on Dependable and Secure Computing, 516-517, 2017 | 2 | 2017 |
Data-Oriented Programming H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang On the Expressiveness of Non-Control Data Attacks, 2016 | 2 | 2016 |
Fuzzing program logic deeply hidden in binary program stages Y Wang, ZL Chua, Y Liu, P Su, Z Liang 2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019 | 1 | 2019 |
Preventing your faults from telling your secrets: Defenses against pigeonhole attacks S Shinde, ZL Chua, V Narayanan, P Saxena arXiv preprint arXiv:1506.04832, 2015 | | 2015 |
2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)| 978-1-6654-1219-3/20/$31.00© 2021 IEEE| DOI: 10.1109/ICSE … Z Abedjan, P Abrahamsson, S Abualhaija, I Abughararh, B Adams, ... | | |
Poster: WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao | | |