Follow
Junyuan Zeng
Junyuan Zeng
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Obfuscation resilient binary code reuse through trace-oriented programming
J Zeng, Y Fu, KA Miller, Z Lin, X Zhang, D Xu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
792013
HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management.
Y Fu, J Zeng, Z Lin
Proceedings of the 2014 USENIX conference on USENIX Annual Technical …, 2014
492014
Cpu transparent protection of os kernel and hypervisor integrity with programmable dram
Z Liu, JH Lee, J Zeng, Y Wen, Z Lin, W Shi
Proceedings of the 40th Annual International Symposium on Computer …, 2013
492013
Pemu: A pin highly compatible out-of-vm dynamic binary instrumentation framework
J Zeng, Y Fu, Z Lin
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on …, 2015
372015
Improved index compression techniques for versioned document collections
J He, J Zeng, T Suel
Proceedings of the 19th ACM international conference on Information and …, 2010
342010
Android malware development on public malware scanning platforms: A large-scale data-driven study
H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, S Chari, C Zhang
2016 IEEE International Conference on Big Data, 1090-1099, 2016
222016
Towards automatic inference of kernel object semantics from binary code
J Zeng, Z Lin
Proceedings of the 18th International Symposium on Research in Attacks …, 2015
172015
Automatic uncovering of tap points from kernel executions
J Zeng, Y Fu, Z Lin
Proceedings of the 19th International Symposium on Research in Attacks …, 2016
82016
A Large-scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform
H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, I Molloy, S Chari, ...
2018 IEEE Transactions on Big Data, 2018
62018
Binary code reuse: a dynamic analysis based approach
J Zeng
The University of Texas at Dallas, 2015
12015
Method and system for autonomous malware analysis
Z Zhan, J Zeng, J Su
US Patent 11,531,748, 2022
2022
Phantom Attack: Evading System Call Monitoring
X Guo, J Zeng
Defcon 29, 2021
2021
System and method for monitoring file integrity of multiple containers using one agent
J Zeng, Z Zhan, Y Chen, J Su
US Patent 10,949,532, 2021
2021
Screenshot based tui process for in-app purchase authentication
Y Lu, J Zeng, P Peng
US Patent US20200081615A1, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–14