Bing Mao

Orcid: 0000-0002-7066-2144

Affiliations:
  • Nanjing University, State Key Laboratory for Novel Software Technology, Nanjing, China (PhD 1997)


According to our database1, Bing Mao authored at least 68 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Inferring State Machine from the Protocol Implementation via Large Langeuage Model.
CoRR, 2024

A Survey of Protocol Fuzzing.
CoRR, 2024

Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations.
Proceedings of the ACM on Web Conference 2024, 2024

2023
EVaDe: Efficient and Lightweight Mirai Variants Detection via Approximate Largest Submatrix Search.
Int. J. Softw. Eng. Knowl. Eng., October, 2023

Nimbus++: Revisiting Efficient Function Signature Recovery with Depth Data Analysis.
Int. J. Softw. Eng. Knowl. Eng., October, 2023

Generation-based fuzzing? Don't build a new generator, reuse!
Comput. Secur., June, 2023

Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs.
Proceedings of the 32nd USENIX Security Symposium, 2023

WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

OCFI: Make Function Entry Identification Hard Again.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Ground Truth for Binary Disassembly is Not Easy.
Proceedings of the 31st USENIX Security Symposium, 2022

AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method.
Proceedings of the IEEE International Conference on Trust, 2022

Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing and Multi-Task Learning.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Windranger: A Directed Greybox Fuzzer driven by Deviation Basic Blocks.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis.
IEEE Trans. Software Eng., 2021

RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability.
Proceedings of the 20th IEEE International Conference on Trust, 2021

SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
An Empirical Study on Benchmarks of Artificial Software Vulnerabilities.
CoRR, 2020

HART: Hardware-Assisted Kernel Module Tracing on Arm.
Proceedings of the Computer Security - ESORICS 2020, 2020

CATI: Context-Assisted Type Inference from Stripped Binaries.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
Automatic Detection and Repair Recommendation for Missing Checks.
J. Comput. Sci. Technol., 2019

RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

Vanguard: Detecting Missing Checks for Prognosing Potential Vulnerabilities.
Proceedings of the Tenth Asia-Pacific Symposium on Internetware, 2018

Detecting missing checks for identifying insufficient attack protections.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

DCQCN+: Taming Large-Scale Incast Congestion in RDMA over Ethernet Networks.
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018

To Detect Stack Buffer Overflow with Polymorphic Canaries.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Mapping to Bits: Efficiently Detecting Type Confusion Errors.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Impeding behavior-based malware analysis via replacement attacks to malware specifications.
J. Comput. Virol. Hacking Tech., 2017

Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks.
EAI Endorsed Trans. Security Safety, 2017

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Proceedings of the 26th USENIX Security Symposium, 2017

DiffGuard: Obscuring Sensitive Information in Canary Based Protections.
Proceedings of the Security and Privacy in Communication Networks, 2017

ROPOB: Obfuscating Binary Code via Return Oriented Programming.
Proceedings of the Security and Privacy in Communication Networks, 2017

NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling.
Proceedings of the Security and Privacy in Communication Networks, 2016

2015
TextLogger: inferring longer inputs on touch screen using motion sensors.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Detection, Classification and Characterization of Android Malware Using API Data Dependency.
Proceedings of the Security and Privacy in Communication Networks, 2015

A Practical Approach for Adaptive Data Structure Layout Randomization.
Proceedings of the Computer Security - ESORICS 2015, 2015

Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Detect Android Malware Variants Using Component Based Topology Graph.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Defensor: Lightweight and Efficient Security-Enhanced Framework for Android.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Automatic construction of printable return-oriented programming payload.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
JITSafe: a framework against Just-in-time spraying attacks.
IET Inf. Secur., 2013

DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Replacement attacks: automatically evading behavior-based software birthmark.
Int. J. Inf. Sec., 2012

RandHyp: Preventing Attacks via Xen Hypercall Interface.
Proceedings of the Information Security and Privacy Research, 2012

CloudER: a framework for automatic software vulnerability location and patching in the cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

RIM: A Method to Defend from JIT Spraying Attack.
Proceedings of the Seventh International Conference on Availability, 2012

2011
JITDefender: A Defense against JIT Spraying Attacks.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Replacement Attacks on Behavior Based Software Birthmark.
Proceedings of the Information Security, 14th International Conference, 2011

Automatic construction of jump-oriented programming shellcode (on the x86).
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation.
Proceedings of the Information Security - 13th International Conference, 2010

Efficient Detection of the Return-Oriented Programming Malicious Code.
Proceedings of the Information Systems Security - 6th International Conference, 2010

Return-Oriented Rootkit without Returns (on the x86).
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
DROP: Detecting Return-Oriented Programming Malicious Code.
Proceedings of the Information Systems Security, 5th International Conference, 2009

IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Traffic Controller: A Practical Approach to Block Network Covert Timing Channel.
Proceedings of the The Forth International Conference on Availability, 2009

BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability.
Proceedings of the The Forth International Conference on Availability, 2009

2006
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation.
Proceedings of the Information Security, 9th International Conference, 2006

Efficient and Practical Control Flow Monitoring for Program Security.
Proceedings of the Advances in Computer Science, 2006

A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities.
Proceedings of the The First International Conference on Availability, 2006

2005
A policy flexible architecture for secure operating system.
ACM SIGOPS Oper. Syst. Rev., 2005

2004
The design and implementation of a runtime system for graph-oriented parallel and distributed programming.
J. Syst. Softw., 2004

1999
Object Mapping for Layered Cooperative Systems.
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999


  Loading...