Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation

Vrizlynn L. L. Thing , Zheng-Leong Chua
Security and Privacy Protection in Information Processing Systems 217 -230

2013
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation

Vrizlynn LL Thing , Zheng-Leong Chua
IFIP International Information Security Conference 217 -230

4
2013
A look at targeted attacks through the lense of an NGO

Engin Kirda , Adina Uritesc , Zheng Leong Chua , Cédric Gilbert
usenix security symposium 543 -558

43
2014
Automatic generation of data-oriented exploits

Zheng Leong Chua , Zhenkai Liang , Prateek Saxena , Hong Hu
usenix security symposium 177 -192

97
2015
Neural Nets Can Learn Function Type Signatures From Binaries

Zheng Leong Chua , Zhenkai Liang , Prateek Saxena , Shiqi Shen
usenix security symposium 99 -116

135
2017
Scalable Quantitative Verification For Deep Neural Networks

Zheng Leong Chua , Kuldeep S. Meel , Prateek Saxena , Teodora Baluta
arXiv: Learning

30
2020
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics

Zheng Leong Chua , Zhenkai Liang , Jian Mao , Jun Zeng
network and distributed system security symposium

2021
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing

Prateek Saxena , Zhenkai Liang , Yaoqi Jia , Zheng Leong Chua
computer and communications security 791 -804

14
2016
Preventing Page Faults from Telling Your Secrets

Shweta Shinde , Zheng Leong Chua , Viswesh Narayanan , Prateek Saxena
computer and communications security 317 -328

130
2016
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.

Zheng Leong Chua , Yanhao Wang , Teodora Baluta , Prateek Saxena
network and distributed system security symposium

8
2019
Fuzzing Program Logic Deeply Hidden in Binary Program Stages

Yanhao Wang , Zheng Leong Chua , Yuwei Liu , Purui Su
2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER) 105 -116

1
2019
Enabling practical experimentation in cyber-security training

Jian Mao , Zheng Leong Chua , Zhenkai Liang
2017 IEEE Conference on Dependable and Secure Computing 516 -517

2017
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software

Hong Hu , Zheng Leong Chua , Zhenkai Liang , Prateek Saxena
Computer Security -- ESORICS 2015 312 -331

5
2015
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks

Hong Hu , Shweta Shinde , Sendroiu Adrian , Zheng Leong Chua
2016 IEEE Symposium on Security and Privacy (SP) 969 -986

411
2016
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records

Jun Zengy , Xiang Wang , Jiahao Liu , Yinfang Chen
Smpte Journal 489 -506

14
2022
Understanding Rowhammer attacks through the lens of a unified reference framework

Xiaoxuan Lou , Fan Zhang , Zheng Leong Chua , Zhenkai Liang
arXiv preprint arXiv:1901.03538

10
2019
{FlowMatrix}:{GPU-Assisted}{Information-Flow} Analysis through {Matrix-Based} Representation

Kaihang Ji , Jun Zeng , Yuancheng Jiang , Zhenkai Liang
31st USENIX Security Symposium (USENIX Security 22) 2567 -2584

4
2022
Data-Oriented Programming

Hong Hu , Shweta Shinde , Sendroiu Adrian , Zheng Leong Chua
On the Expressiveness of Non-Control Data Attacks

2
2016