Mu Zhang

Orcid: 0000-0001-5905-9515

Affiliations:
  • University of Utah, Salt Lake City, UT, USA


According to our database1, Mu Zhang authored at least 31 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards Cross-Physical-Domain Threat Inference for Industrial Control System Defense Adaptation.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024

Context-Aware Intrusion Detection in Industrial Control Systems.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024

VETEOS: Statically Vetting EOSIO Contracts for the "Groundhog Day" Vulnerabilities.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

RICSS'24: 2nd International Workshop on Re-design Industrial Control Systems with Security.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
WRTester: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation.
CoRR, 2023

An NSF REU Site Based on Trust and Reproducibility of Intelligent Computation: Experience Report.
Proceedings of the SC '23 Workshops of The International Conference on High Performance Computing, 2023

Automated Generation of Security-Centric Descriptions for Smart Contract Bytecode.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

From Tactics to Techniques: A Systematic Attack Modeling for Advanced Persistent Threats in Industrial Control Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Poster: EOSDFA: Data Flow Analysis of EOSIO Smart Contracts.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2020
Correctness-preserving Compression of Datasets and Neural Network Models.
Proceedings of the 4th IEEE/ACM International Workshop on Software Correctness for HPC Applications, 2020

APTrace: A Responsive System for Agile Enterprise Level Causality Analysis.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

2019
Duet: an expressive higher-order language and linear type system for statically enforcing differential privacy.
Proc. ACM Program. Lang., 2019

Towards Automated Safety Vetting of PLC Code in Real-World Plants.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Towards a Timely Causality Analysis for Enterprise Security.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Extracting Conditional Formulas for Cross-Platform Bug Search.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Android Application Security - A Semantics and Context-Aware Approach
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-47812-8, 2016

Extract Me If You Can: Abusing PDF Parsers in Malware Detectors.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Privacy-Preserving Offloading of Mobile App to the Public Cloud.
Proceedings of the 7th USENIX Workshop on Hot Topics in Cloud Computing, 2015

Towards Automatic Generation of Security-Centric Descriptions for Android Apps.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Efficient, context-aware privacy leakage confinement for android applications without firmware modding.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
TransBlocker: Transforming and Taming Privacy-Breaching Android Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012


  Loading...