Isolated program execution: an application transparent approach for executing untrusted programs

Zhenkai Liang , V.N. Venkatakrishnan , R. Sekar
annual computer security applications conference 182 -191

104
2003
Automatic generation of buffer overflow attack signatures: an approach based on program behavior models

Zhenkai Liang , R. Sekar
annual computer security applications conference 215 -224

51
2005
AGIS: Towards automatic generation of infection signatures

Zhuowei Li , XiaoFeng Wang , Zhenkai Liang , Michael K. Reiter
dependable systems and networks 237 -246

12
2008
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation

Zhenkai Liang , Juan Caballero , Dawn Song , David Brumley
usenix security symposium 15

97
2007
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis

Mingwei Zhang , Aravind Prakash , Xiaolei Li , Zhenkai Liang
network and distributed system security symposium

22
2012
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.

V. N. Venkatakrishnan , Zhenkai Liang , Weiqing Sun , R. Sekar
network and distributed system security symposium

63
2005
Automatic generation of data-oriented exploits

Zheng Leong Chua , Zhenkai Liang , Prateek Saxena , Hong Hu
usenix security symposium 177 -192

97
2015
Towards Practical Automatic Generation of Multipath Vulnerability Signatures

Zhenkai Liang , Dawn Song , David Brumley , James Newsome

3
2007
BitScope: Automatically Dissecting Malicious Binaries

Pongsin Poosankam , Zhenkai Liang , Dawn Song , Min Gyung Kang

76
2007
Automatic synthesis of filters to discard buffer overflow attacks: a step towards realizing self-healing systems

Daniel C. DuVarney , Zhenkai Liang , R. Sekar
usenix annual technical conference 21 -21

16
2005
Robust Synchronous P2P Primitives Using SGX Enclaves.

Tarik Moataz , Zhenkai Liang , Yaoqi Jia , Prateek Saxena
IACR Cryptology ePrint Archive 2017 180

2017
Neural Nets Can Learn Function Type Signatures From Binaries

Zheng Leong Chua , Zhenkai Liang , Prateek Saxena , Shiqi Shen
usenix security symposium 99 -116

135
2017
Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment.

Zhenkai Liang , Ee-Chien Chang , Ziqi Yang
arXiv: Cryptography and Security

44
2019
Monet: A User-oriented Behavior-based Malware Variants Detection System for Android

John C.S. Lui , Mingshen Sun , Zhenkai Liang , Richard T.B. Ma
arXiv: Cryptography and Security

137
2016
Robust P2P Primitives Using {SGX} Enclaves

Tarik Moataz , Zhenkai Liang , Yaoqi Jia , Prateek Saxena
23rd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2020) 209 -224

2020
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics

Zheng Leong Chua , Zhenkai Liang , Jian Mao , Jun Zeng
network and distributed system security symposium

2021
Enforcing system-wide control flow integrity for exploit detection and diagnosis

Aravind Prakash , Heng Yin , Zhenkai Liang
computer and communications security 311 -322

25
2013
Automatically assessing crashes from heap overflows

Jia Yan , Xiangkun Jia , Dengguo Feng , Liang He
automated software engineering 274 -279

2
2017
I Can See Your Brain: Investigating Home-Use Electroencephalography System Security

Yinhao Xiao , Yizhen Jia , Xiuzhen Cheng , Jiguo Yu
IEEE Internet of Things Journal 6 ( 4) 6681 -6691

10
2019