Mu Zhang
Orcid: 0000-0001-5905-9515Affiliations:
- University of Utah, Salt Lake City, UT, USA
According to our database1,
Mu Zhang
authored at least 31 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.utah.edu
On csauthors.net:
Bibliography
2024
Towards Cross-Physical-Domain Threat Inference for Industrial Control System Defense Adaptation.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
RICSS'24: 2nd International Workshop on Re-design Industrial Control Systems with Security.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
WRTester: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation.
CoRR, 2023
An NSF REU Site Based on Trust and Reproducibility of Intelligent Computation: Experience Report.
Proceedings of the SC '23 Workshops of The International Conference on High Performance Computing, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
From Tactics to Techniques: A Systematic Attack Modeling for Advanced Persistent Threats in Industrial Control Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2020
Proceedings of the 4th IEEE/ACM International Workshop on Software Correctness for HPC Applications, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
2019
Duet: an expressive higher-order language and linear type system for statically enforcing differential privacy.
Proc. ACM Program. Lang., 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-47812-8, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Proceedings of the 7th USENIX Workshop on Hot Topics in Cloud Computing, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Efficient, context-aware privacy leakage confinement for android applications without firmware modding.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
2012
V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012
Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012