Seguir
Zhiqiang Lin
Zhiqiang Lin
Distinguished Professor of Engineering, The Ohio State University
E-mail confirmado em cse.ohio-state.edu - Página inicial
Título
Citado por
Citado por
Ano
Binary Stirring: Self-randomizing Instruction Addresses of Legacy x86 Binary Code
R Wartell, V Mohan, KW Hamlen, Z Lin
19th ACM Conference on Computer and Communications Security, 2012
5032012
Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution
G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 142-157, 2019
4772019
IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
Network and Distributed Security Symposium (NDSS), 2018
4482018
Automatic protocol format reverse engineering through context-aware monitored execution
Z Lin, X Jiang, D Xu, X Zhang
In 15th Symposium on Network and Distributed System Security (NDSS, 2008
3642008
Automatic reverse engineering of data structures from binary execution
Z Lin, X Zhang, D Xu
Proceedings of the 17th Network and Distributed System Security Symposium, 2010, 2010
3212010
IntScope: Automatically detecting integer overflow vulnerability in X86 binary using symbolic execution.
T Wang, T Wei, Z Lin, W Zou
NDSS, 1-14, 2009
2762009
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
Y Fu, Z Lin
IEEE Symposium on Security and Privacy, 586 - 600, 2012
2722012
SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps
D Sounthiraraj, J Sahs, G Greenwood, Z Lin, L Khan
NDSS, 2014
255*2014
Systems and methods for automated detection of application vulnerabilities
L Khan, Z Lin, B Thuraisingham, J Sahs, D Sounthiraraj, G Greenwood
US Patent 9,977,904, 2018
2122018
SGX-Log: Securing system logs with SGX
V Karande, E Bauman, Z Lin, L Khan
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
1612017
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Z Lin, J Rhee, X Zhang, D Xu, X Jiang
Ndss, 2011
1592011
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics
E Bauman, Z Lin, KW Hamlen
Proceedings of the 25th Network and Distributed Systems Security Symposium …, 2018
1492018
Sgxpectre attacks: Leaking enclave secrets via speculative execution
G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai
arXiv preprint arXiv:1802.09085, 2018
1462018
{X-Force}:{Force-Executing} binary programs for security applications
F Peng, Z Deng, X Zhang, D Xu, Z Lin, Z Su
23rd USENIX Security Symposium (USENIX Security 14), 829-844, 2014
1442014
{SAVIOR}: Securing autonomous vehicles with robust physical invariants
R Quinonez, J Giraldo, L Salazar, E Bauman, A Cardenas, Z Lin
29th USENIX security symposium (USENIX Security 20), 895-912, 2020
1432020
Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors
Y Tu, Z Lin, I Lee, X Hei
27th USENIX security symposium (USENIX Security 18), 1545-1562, 2018
1382018
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps
C Zuo, Z Lin, Y Zhang
Proceedings of 2019 IEEE Symposium on Security and Privacy, 2019
1362019
A survey on hypervisor-based monitoring: approaches, applications, and evolutions
E Bauman, G Ayoade, Z Lin
ACM Computing Surveys (CSUR) 48 (1), 1-33, 2015
1252015
{TXSPECTOR}: Uncovering attacks in ethereum from transactions
M Zhang, X Zhang, Y Zhang, Z Lin
29th USENIX Security Symposium (USENIX Security 20), 2775-2792, 2020
1212020
Adaptive encrypted traffic fingerprinting with bi-directional dependence
K Al-Naami, S Chandra, A Mustafa, L Khan, Z Lin, K Hamlen, ...
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
1182016
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20