IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.

Tielei Wang , Zhiqiang Lin , Tao Wei , Wei Zou
network and distributed system security symposium

248
2009
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.

Xuxian Jiang , Dongyan Xu , Zhiqiang Lin , Xiangyu Zhang
network and distributed system security symposium

335
2008
X-force: force-executing binary programs for security applications

Zhendong Su , Dongyan Xu , Zhiqiang Lin , Zhui Deng
usenix security symposium 829 -844

112
2014
AutoPaG: towards automated software patch generation with source code root cause identification and repair

Xuxian Jiang , Li Xie , Bing Mao , Dongyan Xu
computer and communications security 329 -340

36
2007
Programmable decoder and shadow threads: tolerate remote code injection exploits with diversified redundancy

Zhiqiang Lin , Ziyi Liu , Shouhuai Xu , Weidong Shi
design, automation, and test in europe 1 -6

3
2014
HYPERSHELL: a practical hypervisor layer guest OS shell for automated in-VM management

Yangchun Fu , Zhiqiang Lin , Junyuan Zeng
usenix annual technical conference 85 -96

49
2014
You shouldn't collect my secrets: thwarting sensitive keystroke leakage in mobile IME apps

Binyu Zang , Haibo Chen , Zhiqiang Lin , Haibing Guan
usenix security symposium 675 -690

13
2015
Preventing cryptographic key leakage in cloud virtual machines

Erman Pattuk , Murat Kantarcioglu , Huseyin Ulusoy , Zhiqiang Lin
usenix security symposium 703 -718

21
2014
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.

Xuxian Jiang , Dongyan Xu , Zhiqiang Lin , Junghwan Rhee
network and distributed system security symposium

90
2011
Automatic Reverse Engineering of Data Structures from Binary Execution.

Dongyan Xu , Zhiqiang Lin , Xiangyu Zhang
network and distributed system security symposium

284
2010
Graph-based signatures for kernel data structures

Zhiqiang Lin , Junghwan Rhee , Xiangyu Zhang , Dongyan Xu
annual information security symposium 21

2011
Guarder: a tunable secure allocator

Zhiqiang Lin , Tongping Liu , Sam Silvestro , Hongyu Liu
usenix security symposium 117 -133

24
2018
Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization

Yan Solihin , Zhiqiang Lin , Yinqian Zhang , Mengyuan Li
usenix security symposium 1257 -1272

51
2019
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors

Xiali Hei , Zhiqiang Lin , Insup Lee , Yazhou Tu
usenix security symposium 1545 -1562

18
2018
CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software.

Kevin W. Hamlen , Zhiqiang Lin , Xiaoyang Xu , Wenhao Wang
usenix security symposium 1805 -1821

12
2019
The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends.

Brendan Saltaformaggio , Zhiqiang Lin , Ruian Duan , Omar Alrawi
usenix security symposium 551 -566

6
2019
{FIRMSCOPE}: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware

Zhiqiang Lin , Angelos Stavrou , Mohamed Elsabagh , Ryan Johnson
usenix security symposium 2379 -2396

4
2020
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV.

Zhiqiang Lin , Yinqian Zhang , Mengyuan Li
arXiv: Cryptography and Security

19
2020
{TXSPECTOR}: Uncovering Attacks in Ethereum from Transactions

Zhiqiang Lin , Yinqian Zhang , Xiaokuan Zhang , Mengya Zhang
usenix security symposium 2775 -2792

47
2020
SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants.

Raul Quinonez , Jairo Giraldo , Luis Salazar , Erick Bauman
usenix security symposium 895 -912

12
2020