An effective taint‐based software vulnerability miner

Zhi Liu , Xiaosong Zhang , Yue Wu , Ting Chen
Compel-the International Journal for Computation and Mathematics in Electrical and Electronic Engineering 32 ( 2) 467 -484

1
2013
A Novel Model for Critical Services Consolidation Based on FVM

Xiaosong Zhang , Ting Chen , Ding Wang
international conference on e business 1 -5

1
2009
A Hybrid Detection Approach for Zero-Day Polymorphic Shellcodes

Ting Chen , Xiaosong Zhang , Zhi Liu
international conference on e business 1 -5

10
2009
JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code

Fengguo Wei , Xingwei Lin , Xinming Ou , Ting Chen
computer and communications security 1137 -1150

62
2018
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost

Binlin Cheng , Jiang Ming , Jianmin Fu , Guojun Peng
computer and communications security 18 395 -411

21
2018
DBAF : Dynamic Binary Analysis Framework and Its Applications

Ting Chen , Youzheng Feng , Xingwei Lin , Zihao Li
network and system security 361 -375

1
2018
DataEther: Data Exploration Framework For Ethereum

Ting Chen , Teng Hu , Jiachi Chen , Xiaosong Zhang
international conference on distributed computing systems 1369 -1380

35
2019
Characterizing the Impacts of Application Layer DDoS Attacks

Muhui Jiang , Chenxu Wang , Xiapu Luo , MiuTung Miu
international conference on web services 500 -507

10
2017
Smart Applications in Edge Computing: Overview on Authentication and Data Security

Xinghua Li , Ting Chen , Qingfeng Cheng , Siqi Ma
IEEE Internet of Things Journal 8 ( 6) 4063 -4080

25
2021
Transaction-based classification and detection approach for Ethereum smart contract

Teng Hu , Xiaolei Liu , Ting Chen , Xiaosong Zhang
Information Processing and Management 58 ( 2) 102462

92
2021
Research and Application of the Transparent Data Encpryption in Intranet Data Leakage Prevention

Xiaosong Zhang , Fei Liu , Ting Chen , Hua Li
computational intelligence and security 2 376 -379

31
2009
An empirical investigation into path divergences for concolic execution using CREST

Ting Chen , Xiaodong Lin , Jin Huang , Abel Bacchus
Security and Communication Networks 8 ( 18) 3667 -3681

4
2015
SODA: A Generic Online Detection Framework for Smart Contracts

Ting Chen , Rong Cao , Ting Li , Xiapu Luo
Proceedings 2020 Network and Distributed System Security Symposium

64
2020
Conpy: Concolic Execution Engine for Python Applications

Ting Chen , Xiao-song Zhang , Rui-dong Chen , Bo Yang
Algorithms and Architectures for Parallel Processing 150 -163

1
2014
Complex Network Modeling with Constant Capacity Restriction Based on BA Model

Xiaosong Zhang , Ting Chen , Ruidong Chen , Hua Li
international symposium on computer network and multimedia technology 1 -4

3
2009
Under-optimized smart contracts devour your money

Ting Chen , Xiaoqi Li , Xiapu Luo , Xiaosong Zhang
ieee international conference on software analysis evolution and reengineering 442 -446

356
2017
Loop Transparency for Scalable Dynamic Symbolic Execution

Xiao Li Ji , Xiao Song Zhang , Ting Chen , Xiao Shan Li
Applied Mechanics and Materials 201-202 242 -245

2012
System-level attacks against android by exploiting asynchronous programming

Ting Chen , Xiaoqi Li , Xiapu Luo , Xiaosong Zhang
Software Quality Journal 26 ( 3) 1037 -1062

3
2018
Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats.

Teng Hu , Bangzhou Xin , Xiaolei Liu , Ting Chen
Sensors 20 ( 18) 5297

2020
State of the art: Dynamic symbolic execution for automated test generation

Ting Chen , Xiao-song Zhang , Shi-ze Guo , Hong-yuan Li
Future Generation Computer Systems 29 ( 7) 1758 -1773

100
2013