Follow
Zhenkai Liang
Zhenkai Liang
Verified email at comp.nus.edu.sg - Homepage
Title
Cited by
Cited by
Year
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
International conference on information systems security, 1-25, 2008
10192008
Jump-oriented programming: a new class of code-reuse attack
T Bletsch, X Jiang, VW Freeh, Z Liang
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
7282011
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
J Caballero, H Yin, Z Liang, D Song
Proceedings of the 14th ACM conference on Computer and communications …, 2007
5492007
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
2016 IEEE Symposium on Security and Privacy (SP), 969-986, 2016
3862016
Automatically identifying trigger-based behavior in malware
D Brumley, C Hartwig, Z Liang, J Newsome, D Song, H Yin
Botnet Detection, 65-88, 2008
3092008
Fast and automated generation of attack signatures: A basis for building self-protecting servers
Z Liang, R Sekar
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2582005
Automatic Generation of {Data-Oriented} Exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th USENIX Security Symposium (USENIX Security 15), 177-192, 2015
2102015
HookFinder: Identifying and understanding malware hooking behaviors
H Yin, Z Liang, D Song
NDSS 2008, 2008
1982008
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
D Brumley, J Caballero, Z Liang, J Newsome, D Song
USENIX Security Symposium 15 (10.5555), 1362903.1362918, 2007
1632007
Isolated program execution: An application transparent approach for executing untrusted programs
Z Liang, VN Venkatakrishnan, R Sekar
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
1502003
Monet: a user-oriented behavior-based malware variants detection system for android
M Sun, X Li, JCS Lui, RTB Ma, Z Liang
IEEE Transactions on Information Forensics and Security 12 (5), 1103-1112, 2016
1352016
Darwin: An approach to debugging evolving programs
D Qi, A Roychoudhury, Z Liang, K Vaswani
ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (3), 1-29, 2012
1342012
Neural nets can learn function type signatures from binaries
ZL Chua, S Shen, P Saxena, Z Liang
26th USENIX Security Symposium (USENIX Security 17), 99-116, 2017
1252017
BitScope: Automatically dissecting malicious binaries
D Brumley, C Hartwig, MG Kang, Z Liang, J Newsome, P Poosankam, ...
Technical Report CS-07-133, School of Computer Science, Carnegie Mellon …, 2007
1142007
Airbag: Boosting smartphone resistance to malware infection.
C Wu, Y Zhou, K Patel, Z Liang, X Jiang
NDSS, 2014
1122014
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
W Sun, Z Liang, VN Venkatakrishnan, R Sekar
NDSS, 2005
1032005
Neural network inversion in adversarial setting via background knowledge alignment
Z Yang, J Zhang, EC Chang, Z Liang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
922019
Phishing-alarm: Robust and efficient phishing detection via page component similarity
J Mao, W Tian, P Li, T Wei, Z Liang
IEEE Access 5, 17020-17030, 2017
852017
Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
Z Liang, R Sekar
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-224, 2005
842005
Test generation to expose changes in evolving programs
D Qi, A Roychoudhury, Z Liang
Proceedings of the IEEE/ACM international conference on Automated software …, 2010
722010
The system can't perform the operation now. Try again later.
Articles 1–20