Chao Zhang
Orcid: 0000-0001-7894-8828Affiliations:
- Tsinghua University, Institute for Network Science and Cyberspace, Beijing, China
- University of California, Berkeley, CA, USA (2013 - 2016)
- Peking University, Institute of Computer Science, Beijing, China (PhD 2013)
According to our database1,
Chao Zhang
authored at least 125 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
PromeTrans: Bootstrap binary functionality classification with knowledge transferred from pre-trained models.
Empir. Softw. Eng., February, 2025
2024
IEEE Trans. Computers, December, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph Features.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Laser Shield: a Physical Defense with Polarizer against Laser Attacks on Autonomous Driving Systems.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
2023
Mechanism Study of Symmetric Mechanism-Rolling Bearing Dynamic System Considering the Influence of Temperature Factor.
Symmetry, December, 2023
ACM Trans. Softw. Eng. Methodol., November, 2023
ACM Trans. Softw. Eng. Methodol., November, 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference.
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
CoRR, 2023
Towards Automated Security Analysis of Smart Contracts based on Execution Property Graph.
CoRR, 2023
Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration.
Comput. Secur., 2023
DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023
KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
One Simple API Can Cause Hundreds of Bugs An Analysis of Refcounting Bugs in All Modern Linux Kernels.
Proceedings of the 29th Symposium on Operating Systems Principles, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Unmasking Role-Play Attack Strategies in Exploiting Decentralized Finance (DeFi) Systems.
Proceedings of the 2023 Workshop on Decentralized Finance and Security, 2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Int. J. Softw. Informatics, 2022
AL-iGAN: An Active Learning Framework for Tunnel Geological Reconstruction Based on TBM Operational Data.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2022
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange.
Proc. ACM Meas. Anal. Comput. Syst., 2021
ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities.
Cybersecur., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
RAProducer: efficiently diagnose and reproduce data race bugs for binaries via trace analysis.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software Bugs.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the Image and Graphics - 11th International Conference, 2021
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
ZKCPlus: Optimized Fair-exchange Protocol Supporting Practical and Flexible Data Exchange.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
DRAMD: Detect Advanced DRAM-based Stealthy Communication Channels with Neural Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
A large-scale empirical study on vulnerability distribution within projects and the lessons learned.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Fractional Sparse Representation Based Classification and Multi-view Extension for Face Recognition.
Aust. J. Intell. Inf. Process. Syst., 2019
IEEE Access, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019
SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Sci. China Inf. Sci., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017
2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Comput. Commun., 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
2011
Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat.
J. Comput. Secur., 2011
2010
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
Proceedings of the Computer Security, 2010
2007
Proceedings of the Advances in Grid and Pervasive Computing, 2007
2005
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005
Design and Deployment of Locality-Aware Overlay Multicast Protocol for Live Streaming Services.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005
2004
Proceedings of the Parallel and Distributed Processing and Applications, 2004