Chengyu Song

Orcid: 0000-0001-6617-3068

According to our database1, Chengyu Song authored at least 85 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Spectre Returns! Speculation Attacks Using the Return Stack Buffer.
IEEE Des. Test, 2024

Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection.
CoRR, 2024

Cross-Modal Safety Alignment: Is textual unlearning all you need?
CoRR, 2024

Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks.
Proceedings of the 33rd USENIX Security Symposium, 2024

K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024

Insider Threat Defense Strategies: Survey and Knowledge Integration.
Proceedings of the Knowledge Science, Engineering and Management, 2024

DNS Exfiltration Guided by Generative Adversarial Networks.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

Can Textual Unlearning Solve Cross-Modality Safety Alignment?
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

2023
Establishment and validation of an AI-aid method in the diagnosis of myocardial perfusion imaging.
BMC Medical Imaging, December, 2023

DCNAS-Net: deformation convolution and neural architecture search detection network for bone marrow oedema.
BMC Medical Imaging, December, 2023

MsPrompt: Multi-step prompt learning for debiasing few-shot event detection.
Inf. Process. Manag., November, 2023

TaxonPrompt: Taxonomy-aware curriculum prompt learning for few-shot event classification.
Knowl. Based Syst., March, 2023

Self-supervised graph learning with target-adaptive masking for session-based recommendation.
Frontiers Inf. Technol. Electron. Eng., January, 2023

AugPrompt: Knowledgeable augmented-trigger prompt for few-shot event classification.
Inf. Process. Manag., 2023

Exploring Internal and External Interactions for Semi-Structured Multivariate Attributes in Job-Resume Matching.
Int. J. Intell. Syst., 2023

MsPrompt: Multi-step Prompt Learning for Debiasing Few-shot Event Detection.
CoRR, 2023

Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

R-Fuzz at SBFT'2023.
Proceedings of the IEEE/ACM International Workshop on Search-Based and Fuzz Testing, 2023

2022
Exploring latent connections in graph neural networks for session-based recommendation.
Inf. Retr. J., 2022

Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks.
CoRR, 2022

Blackbox Attacks via Surrogate Ensemble Search.
CoRR, 2022

ADC: Adversarial attacks against object Detection that evade Context consistency checks.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution.
Proceedings of the 31st USENIX Security Symposium, 2022

SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis.
Proceedings of the 31st USENIX Security Symposium, 2022

JIGSAW: Efficient and Scalable Path Constraints Fuzzing.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Blackbox Attacks via Surrogate Ensemble Search.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

GAMA: Generative Adversarial Multi-Object Scene Attacks.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Zero-Query Transfer Attacks on Context-Aware Object Detectors.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Context-Aware Transfer Attacks for Object Detection.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Stopping Memory Disclosures via Diversification and Replicated Execution.
IEEE Trans. Dependable Secur. Comput., 2021

ARMPatch: A Binary Patching Framework for ARM-based IoT Devices.
J. Web Eng., 2021

Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Metric Sentiment Learning for Label Representation.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Measurement-driven Security Analysis of Imperceptible Impersonation Attacks.
CoRR, 2020

SpecCFI: Mitigating Spectre Attacks using CFI Informed Speculation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

CrFuzz: fuzzing multi-purpose programs through input validation.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

SpecROP: Speculative Exploitation of ROP Chains.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency.
Proceedings of the Computer Vision - ECCV 2020, 2020

Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

2019
SynFuzz: Efficient Concolic Execution via Branch Condition Synthesis.
CoRR, 2019

FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation.
Proceedings of the 28th USENIX Security Symposium, 2019

Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Figment: Fine-grained Permission Management for Mobile Apps.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

Principled Unearthing of TCP Side Channel Vulnerabilities.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
SPX: Preserving End-to-End Security for Edge Computing.
CoRR, 2018

Adversarial Perturbations Against Real-Time Video Classification Systems.
CoRR, 2018

Learning Tensor-Based Representations from Brain-Computer Interface Data for Cybersecurity.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

IotSan: fortifying the safety of IoT systems.
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018

Droid M+: Developer Support for Imbibing Android's New Permission Model.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

IAC: On the Feasibility of Utilizing Neural Signals for Access Control.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Detecting Android Root Exploits by Learning from Root Providers.
Proceedings of the 26th USENIX Security Symposium, 2017

Efficient Protection of Path-Sensitive Control Security.
Proceedings of the 26th USENIX Security Symposium, 2017

Your state is not mine: a closer look at evading stateful internet censorship.
Proceedings of the 2017 Internet Measurement Conference, 2017

2016
Preventing exploits against memory corruption vulnerabilities.
PhD thesis, 2016

Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques.
ACM Comput. Surv., 2016

HDFI: Hardware-Assisted Data-Flow Isolation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

VTrust: Regaining Trust on Virtual Calls.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Enforcing Kernel Security Invariants with Data Flow Integrity.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Type Casting Verification: Stopping an Emerging Attack Vector.
Proceedings of the 24th USENIX Security Symposium, 2015

Cross-checking semantic correctness: the case of finding file system bugs.
Proceedings of the 25th Symposium on Operating Systems Principles, 2015

VTint: Protecting Virtual Function Tables' Integrity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Exploiting and Protecting Dynamic Code Generation.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Preventing Use-after-free with Dangling Pointers Nullification.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

JITScope: Protecting web users from control-flow hijacking attacks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Diagnosis and Emergency Patch Generation for Integer Overflow Exploits.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

A11y Attacks: Exploiting Accessibility in Operating Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2012
Impeding Automated Malware Analysis with Environment-sensitive Malware.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

2011
PEASOUP: preventing exploits against software of uncertain provenance (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

2010
Preventing drive-by download via inter-module communication monitoring.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Studying Malicious Websites and the Underground Economy on the Chinese Web.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
Studying Malicious Websites and the Underground Economy on the Chinese Web.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

2007
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.
Proceedings of the Information and Communications Security, 9th International Conference, 2007


  Loading...