Follow
Zhen Huang
Zhen Huang
Assistant Professor, School of Computing, DePaul University
Verified email at depaul.edu - Homepage
Title
Cited by
Cited by
Year
Pscout: analyzing the android permission specification
KWY Au, YF Zhou, Z Huang, D Lie
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
10392012
Short paper: a look at smartphone permission models
KWY Au, YF Zhou, Z Huang, P Gill, D Lie
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
1072011
Using Safety Properties to Generate Vulnerability Patches
Z Huang, D Lie, G Tan, T Jaeger
Proceedings of the 40th IEEE Symposium on Security and Privacy (SP), 2019
762019
Talos: Neutralizing vulnerabilities with security workarounds for rapid response
Z Huang, M DAngelo, D Miyani, D Lie
Proceedings of the 37th IEEE Symposium on Security and Privacy (SP), 618-635, 2016
602016
Binpro: A tool for binary source code provenance
D Miyani, Z Huang, D Lie
arXiv preprint arXiv:1711.00830, 2017
172017
LMP: light-weighted memory protection with hardware assistance
W Huang, Z Huang, D Miyani, D Lie
Proceedings of the 32nd Annual Computer Security Applications Conference …, 2016
162016
Ocasta: Clustering configuration settings for error recovery
Z Huang, D Lie
Proceedings of the 44th Annual IEEE/IFIP International Conference on …, 2014
102014
Automatically identifying configuration files
Z Huang
University of Toronto, 2009
10*2009
Integer Overflow Detection with Delayed Runtime Test
Z Huang, X Yu
Proceedings of the 16th International Conference on Availability …, 2021
82021
Rapid Vulnerability Mitigation with Security Workarounds
Z Huang, G Tan
Proceedings of the 2nd NDSS Workshop on Binary Analysis Research, 2019
82019
Fine-grained Program Partitioning for Security
Z Huang, T Jaeger, G Tan
Proceedings of the 14th European Workshop on Systems Security, 21-26, 2021
72021
Detecting Software Vulnerabilities Using Neural Networks
A Aumpansub, Z Huang
Proceedings of the 13th International Conference on Machine Learning and …, 2021
72021
Learning-based Vulnerability Detection in Binary Code
A Aumpansub, Z Huang
Proceedings of the 14th International Conference on Machine Learning and …, 2022
42022
Semantic-Aware Vulnerability Detection
Z Huang, M White
Proceedings of 2022 IEEE International Conference on Cyber Security and …, 2022
32022
Pearl-TEE: supporting untrusted applications in trustzone
W Huang, V Rudchenko, H Shuang, Z Huang, D Lie
Proceedings of the 3rd Workshop on System Software for Trusted Execution, 8-13, 2018
32018
Multiclass Classification of Software Vulnerabilities with Deep Learning
C Contreras, H Dokic, Z Huang, D Stan Raicu, J Furst, T Roselyne
Proceedings of the 15th International Conference on Machine Learning and …, 2023
12023
Runtime Recovery for Integer Overflows
Z Huang
Proceedings of the 6th International Conference on System Reliability and …, 2022
12022
Fixing Software Vulnerabilities and Configuration Errors
Z Huang
University of Toronto, 2018
12018
Path-wise Vulnerability Mitigation
H Dokic, Z Huang
18th Workshop on Programming Languages and Analysis for Security, 2023
2023
Targeted Symbolic Execution for UAF Vulnerabilities
Z Huang
Proceedings of the 7th International Conference on System Reliability and Safety, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20