SyzParam: Introducing Runtime Parameters into Kernel Driver Fuzzing.
,
,
,
,
,
,
,
,
,
,
CoRR, January, 2025
HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 33rd USENIX Security Symposium, 2024
OptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT Compilers.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 33rd USENIX Security Symposium, 2024
A Tale of Two Paths: Toward a Hybrid Data Plane for Efficient Far-Memory Applications.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 18th USENIX Symposium on Operating Systems Design and Implementation, 2024
CodeExtract: Enhancing Binary Code Similarity Detection with Code Extraction Techniques.
Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, 2024
Enhancing Learning-Based Binary Code Similarity Detection Model through Adversarial Training with Multiple Function Variants.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware.
IEEE Trans. Dependable Secur. Comput., 2023
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks.
IEEE Trans. Dependable Secur. Comput., 2023
Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques.
Proceedings of the 21st ACM/IEEE International Symposium on Code Generation and Optimization, 2023
PANIC: PAN-assisted Intra-process Memory Isolation on ARM.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Making Information Hiding Effective Again.
IEEE Trans. Dependable Secur. Comput., 2022
FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods.
CoRR, 2022
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths.
Proceedings of the 31st USENIX Security Symposium, 2022
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization.
Proceedings of the 28th USENIX Security Symposium, 2019
Using Local Clocks to Reproduce Concurrency Bugs.
,
,
,
,
,
,
,
,
,
,
,
IEEE Trans. Software Eng., 2018
ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017
HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015
Weight in Competitive K-Means Algorithm.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011