Jump-oriented programming: a new class of code-reuse attack

Tyler Bletsch , Xuxian Jiang , Vince W Freeh , Zhenkai Liang
30 -40

860
2011
Fast and automated generation of attack signatures: A basis for building self-protecting servers

Zhenkai Liang , R Sekar
Proceedings of the 12th ACM conference on Computer and communications security 213 -222

265
2005
HookFinder: Identifying and understanding malware hooking behaviors

Heng Yin , Zhenkai Liang , Dawn Song
NDSS 2008

208
2008
Darwin: An approach to debugging evolving programs

Dawei Qi , Abhik Roychoudhury , Zhenkai Liang , Kapil Vaswani
ACM Transactions on Software Engineering and Methodology (TOSEM) 21 ( 3) 1 -29

145
2012
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning

Yaoqi Jia , Yue Chen , Xinshu Dong , Prateek Saxena
computers & security 55 62 -80

56
2015
I know where you've been: Geo-inference attacks via the browser cache

Yaoqi Jia , Xinshu Dong , Zhenkai Liang , Prateek Saxena
IEEE Internet Computing 19 ( 1) 44 -53

55
2014
Alcatraz: An isolated environment for experimenting with untrusted software

Zhenkai Liang , Weiqing Sun , VN Venkatakrishnan , R Sekar
ACM Transactions on Information and System Security (TISSEC) 12 ( 3) 1 -37

42
2009
An empirical study of dangerous behaviors in firefox extensions

Jiangang Wang , Xiaohong Li , Xuhui Liu , Xinshu Dong
Information Security: 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings 15 188 -203

40
2012
Transparent protection of commodity os kernels using hardware virtualization

Michael Grace , Zhi Wang , Deepa Srinivasan , Jinku Li
Security and Privacy in Communication Networks: 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings 6 162 -180

36
2010
An Approach for Secure Software Installation.

VN Venkatakrishnan , R Sekar , Tapan Kamat , Sofia Tsipa
LISA 219 -226

22
2002
Poster: UserCSP-user specified content security policies

Kailas Patil , Tanvi Vyas , Frederik Braun , Mark Goodwin
Proceedings of Symposium on Usable Privacy and Security 1 -2

18
2013
You can’t be me: Enabling trusted paths and user sub-origins in web browsers

Enrico Budianto , Yaoqi Jia , Xinshu Dong , Prateek Saxena
Research in Attacks, Intrusions and Defenses: 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings 17 150 -171

14
2014
Understanding Rowhammer attacks through the lens of a unified reference framework

Xiaoxuan Lou , Fan Zhang , Zheng Leong Chua , Zhenkai Liang
arXiv preprint arXiv:1901.03538

10
2019
Scrutinizing implementations of smart home integrations

Kulani Mahadewa , Kailong Wang , Guangdong Bai , Ling Shi
IEEE Transactions on Software Engineering 47 ( 12) 2667 -2683

9
2019
{FreeWill}: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries

Liang He , Hong Hu , Purui Su , Yan Cai
31st USENIX Security Symposium (USENIX Security 22) 2497 -2512

8
2022
Learning graph-based code representations for source-level functional similarity detection

Jiahao Liu , Jun Zeng , Xiang Wang , Zhenkai Liang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) 345 -357

5
2023
5
2022
Automated Identification of Sensitive Data via Flexible User Requirements

Ziqi Yang , Zhenkai Liang
Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I 151 -171

5
2018
Bitscope: Automatically dissecting malicious binaries. School of Computer Science

David Brumley , Cody Hartwig , Min Gyung Kang , Zhenkai Liang
Carnegie Mellon University, Tech. Rep. CMU-CS-07-133

5
2007
{FlowMatrix}:{GPU-Assisted}{Information-Flow} Analysis through {Matrix-Based} Representation

Kaihang Ji , Jun Zeng , Yuancheng Jiang , Zhenkai Liang
31st USENIX Security Symposium (USENIX Security 22) 2567 -2584

4
2022