Seguir
Chao Zhang
Título
Citado por
Citado por
Año
Practical control flow integrity and randomization for binary executables
C Zhang, T Wei, Z Chen, L Duan, L Szekeres, S McCamant, D Song, ...
2013 IEEE symposium on security and privacy, 559-573, 2013
7052013
CollAFL: Path Sensitive Fuzzing
S Gan, C Zhang, X Qin, X Tu, K Li, Z Pei, Z Chen
IEEE Security & Privacy 2018, 2018
4632018
Fuzzing: a survey
J Li, B Zhao, C Zhang
Cybersecurity 1, 1-13, 2018
2802018
{MOPT}: Optimized mutation scheduling for fuzzers
C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song, R Beyah
28th USENIX Security Symposium (USENIX Security 19), 1949-1966, 2019
2742019
αdiff: cross-version binary code similarity detection with dnn
B Liu, W Huo, C Zhang, W Li, F Li, A Piao, W Zou
Proceedings of the 33rd ACM/IEEE international conference on automated …, 2018
2052018
{GREYONE}: Data flow sensitive fuzzing
S Gan, C Zhang, P Chen, B Zhao, X Qin, D Wu, Z Chen
29th USENIX security symposium (USENIX Security 20), 2577-2594, 2020
1692020
Controllable synthesis of ZnO nanocrystals via a surfactant-assisted alcohol thermal process at a low temperature
C Wang, E Shen, E Wang, L Gao, Z Kang, C Tian, Y Lan, C Zhang
Materials Letters 59 (23), 2867-2871, 2005
1542005
VTint: Protecting Virtual Function Tables' Integrity.
C Zhang, C Song, KZ Chen, Z Chen, D Song
NDSS, 2015
1072015
VTrust: Regaining Trust on Virtual Calls
C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song
Network and Distributed System Security Symposium, 2016
1012016
Revery: From proof-of-concept to exploitable
Y Wang, C Zhang, X Xiang, Z Zhao, W Li, X Gong, B Liu, K Chen, W Zou
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
922018
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time
C Zhang, T Wang, T Wei, Y Chen, W Zou
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
722010
Exploiting and Protecting Dynamic Code Generation.
C Song, C Zhang, T Wang, W Lee, D Melski
NDSS, 2015
642015
Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange
P Xia, H Wang, B Gao, W Su, Z Yu, X Luo, C Zhang, X Xiao, G Xu
Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (3 …, 2021
592021
Jtrans: Jump-aware transformer for binary code similarity detection
H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu, J Zhuge, C Zhang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
56*2022
Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems
L Chen, Y Wang, Q Cai, Y Zhan, H Hu, J Linghu, Q Hou, C Zhang, H Duan, ...
30th USENIX Security Symposium (USENIX Security 21), 303-319, 2021
472021
{FANS}: Fuzzing android native system services via automated interface analysis
B Liu, C Zhang, G Gong, Y Zeng, H Ruan, J Zhuge
29th USENIX Security Symposium (USENIX Security 20), 307-323, 2020
472020
A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons Learned
B Liu, G Meng, W Zou, Q Gong, F Li, M Lin, D Sun, W Huo, C Zhang
ICSE, 2020
442020
Towards efficient heap overflow discovery
X Jia, C Zhang, P Su, Y Yang, H Huang, D Feng
26th USENIX Security Symposium (USENIX Security 17), 989-1006, 2017
402017
{MAZE}: Towards automated heap feng shui
Y Wang, C Zhang, Z Zhao, B Zhang, X Gong, W Zou
30th USENIX Security Symposium (USENIX Security 21), 1647-1664, 2021
382021
Finding cracks in shields: On the security of control flow integrity mechanisms
Y Li, M Wang, C Zhang, X Chen, S Yang, Y Liu
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
362020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20