Chao Zhang
Chao Zhang
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
Practical control flow integrity and randomization for binary executables
C Zhang, T Wei, Z Chen, L Duan, L Szekeres, S McCamant, D Song, ...
2013 IEEE Symposium on Security and Privacy, 559-573, 2013
CollAFL: Path Sensitive Fuzzing
S Gan, C Zhang, X Qin, X Tu, K Li, Z Pei, Z Chen
IEEE Security & Privacy 2018, 2018
VTrust: Regaining Trust on Virtual Calls
C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song
Network and Distributed System Security Symposium, 2016
VTint: Protecting Virtual Function Tables' Integrity.
C Zhang, C Song, KZ Chen, Z Chen, D Song
NDSS, 2015
αdiff: cross-version binary code similarity detection with dnn
B Liu, W Huo, C Zhang, W Li, F Li, A Piao, W Zou
Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018
Exploiting and Protecting Dynamic Code Generation.
C Song, C Zhang, T Wang, W Lee, D Melski
NDSS, 2015
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time
C Zhang, T Wang, T Wei, Y Chen, W Zou
European Symposium on Research in Computer Security, 71-86, 2010
{MOPT}: Optimized mutation scheduling for fuzzers
C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song, R Beyah
28th {USENIX} Security Symposium ({USENIX} Security 19), 1949-1966, 2019
Revery: From proof-of-concept to exploitable
Y Wang, C Zhang, X Xiang, Z Zhao, W Li, X Gong, B Liu, K Chen, W Zou
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Towards efficient heap overflow discovery
X Jia, C Zhang, P Su, Y Yang, H Huang, D Feng
26th {USENIX} Security Symposium ({USENIX} Security 17), 989-1006, 2017
{GREYONE}: Data Flow Sensitive Fuzzing
S Gan, C Zhang, P Chen, B Zhao, X Qin, D Wu, Z Chen
29th {USENIX} Security Symposium ({USENIX} Security 20), 2577-2594, 2020
Protecting function pointers in binary
C Zhang, T Wei, Z Chen, L Duan, S McCamant, L Szekeres
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Android low entropy demystified
Y Ding, Z Peng, Y Zhou, C Zhang
2014 IEEE International Conference on Communications (ICC), 659-664, 2014
A framework to eliminate backdoors from response-computable authentication
S Dai, T Wei, C Zhang, T Wang, Y Ding, Z Liang, W Zou
2012 IEEE Symposium on Security and Privacy, 3-17, 2012
Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat
C Zhang, W Zou, T Wang, Y Chen, T Wei
Journal of Computer Security 19 (6), 1083-1107, 2011
SecGOT: Secure global offset tables in ELF executables
C Zhang, L Duan, T Wei, W Zou
Proceedings of the 2nd International Conference on Computer Science and …, 2013
Abusing CDNs for Fun and Profit: Security Issues in CDNs’ Origin Validation
R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ...
SF-DRDoS: The store-and-flood distributed reflective denial of service attack
B Liu, J Li, T Wei, S Berg, J Ye, C Li, C Zhang, J Zhang, X Han
Computer communications 69, 107-115, 2015
JITScope: Protecting web users from control-flow hijacking attacks
C Zhang, M Niknami, KZ Chen, C Song, Z Chen, D Song
2015 IEEE Conference on Computer Communications (INFOCOM), 567-575, 2015
Detect use-after-free vulnerabilities in binaries
HAN Xinhui, WEI Shuang, YE Jiayi, Z Chao, YE Zhiyuan
Journal of Tsinghua University (Science and Technology) 57 (10), 1022-1029, 2017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20