Seguir
Zhiqiang Lin
Zhiqiang Lin
Distinguished Professor of Engineering, The Ohio State University
Dirección de correo verificada de cse.ohio-state.edu - Página principal
Título
Citado por
Citado por
Año
Binary Stirring: Self-randomizing Instruction Addresses of Legacy x86 Binary Code
R Wartell, V Mohan, KW Hamlen, Z Lin
19th ACM Conference on Computer and Communications Security, 2012
4922012
Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution
G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 142-157, 2019
4212019
IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
Network and Distributed Security Symposium (NDSS), 2018
3842018
Automatic protocol format reverse engineering through context-aware monitored execution
Z Lin, X Jiang, D Xu, X Zhang
In 15th Symposium on Network and Distributed System Security (NDSS, 2008
3522008
Automatic reverse engineering of data structures from binary execution
Z Lin, X Zhang, D Xu
Proceedings of the 17th Network and Distributed System Security Symposium, 2010, 2010
2992010
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
Y Fu, Z Lin
IEEE Symposium on Security and Privacy, 586 - 600, 2012
2692012
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
T Wang, T Wei, Z Lin, W Zou
NDSS, 1-14, 2009
2672009
SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps
D Sounthiraraj, J Sahs, G Greenwood, Z Lin, L Khan
NDSS, 2014
245*2014
Systems and methods for automated detection of application vulnerabilities
L Khan, Z Lin, B Thuraisingham, J Sahs, D Sounthiraraj, G Greenwood
US Patent 9,977,904, 2018
2002018
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Z Lin, J Rhee, X Zhang, D Xu, X Jiang
Ndss, 2011
1572011
SGX-Log: Securing system logs with SGX
V Karande, E Bauman, Z Lin, L Khan
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
1502017
Sgxpectre attacks: Leaking enclave secrets via speculative execution
G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai
arXiv preprint arXiv:1802.09085, 2018
1392018
{X-Force}:{Force-Executing} binary programs for security applications
F Peng, Z Deng, X Zhang, D Xu, Z Lin, Z Su
23rd USENIX Security Symposium (USENIX Security 14), 829-844, 2014
1332014
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics
E Bauman, Z Lin, KW Hamlen
Proceedings of the 25th Network and Distributed Systems Security Symposium …, 2018
1322018
Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors
Y Tu, Z Lin, I Lee, X Hei
27th USENIX security symposium (USENIX Security 18), 1545-1562, 2018
1212018
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps
C Zuo, Z Lin, Y Zhang
Proceedings of 2019 IEEE Symposium on Security and Privacy, 2019
1172019
{SAVIOR}: Securing autonomous vehicles with robust physical invariants
R Quinonez, J Giraldo, L Salazar, E Bauman, A Cardenas, Z Lin
29th USENIX security symposium (USENIX Security 20), 895-912, 2020
1162020
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
E Bauman, G Ayoade, Z Lin
ACM Computing Surveys (CSUR) 48 (1), 1-33, 2015
1162015
Securing Untrusted Code via Compiler-Agnostic Binary Rewriting
R Wartell, V Mohan, KW Hamlen, Z Lin
28th Annual Computer Security and Applications Conference, 2012
1142012
PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace
Y Gu, Q Zhao, Y Zhang, Z Lin
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
942017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20