{X-Force}:{Force-Executing} binary programs for security applications F Peng, Z Deng, X Zhang, D Xu, Z Lin, Z Su 23rd USENIX Security Symposium (USENIX Security 14), 829-844, 2014 | 144 | 2014 |
Spider: Stealthy binary program instrumentation and debugging via hardware virtualization Z Deng, X Zhang, D Xu Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 138 | 2013 |
Process implanting: A new active introspection framework for virtualization Z Gu, Z Deng, D Xu, X Jiang 2011 IEEE 30th International Symposium on Reliable Distributed Systems, 147-156, 2011 | 100 | 2011 |
iris: Vetting private api abuse in ios applications Z Deng, B Saltaformaggio, X Zhang, D Xu Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 75 | 2015 |
Bistro: Binary component extraction and embedding for software security applications Z Deng, X Zhang, D Xu Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 54 | 2013 |
Introlib: Efficient and transparent library call introspection for malware forensics Z Deng, D Xu, X Zhang, X Jiang Digital Investigation 9, S13-S23, 2012 | 36 | 2012 |
Drip: A framework for purifying trojaned kernel drivers Z Gu, WN Sumner, Z Deng, X Zhang, D Xu 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 11 | 2013 |
Determining the similarity of binary executables A Agarwal, F Peng, Z Deng US Patent 10,685,113, 2020 | 10 | 2020 |
Guest-transparent instruction authentication for self-patching kernels DM Stanley, Z Deng, D Xu, R Porter, S Snyder MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012 | 5 | 2012 |
Binary program instrumentation and debugging X Zhang, Z Deng, D Xu US Patent 9,817,745, 2017 | | 2017 |
Binary component extraction and embedding X Zhang, Z Deng, D Xu US Patent App. 14/595,922, 2016 | | 2016 |
vMocity: Traveling VMs across Heterogeneous Clouds C Cheng, Z Deng, Z Gu, D Xu 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), 101-110, 2016 | | 2016 |
Binary instrumentation and transformation for software security applications Z Deng Purdue University, 2015 | | 2015 |