Qingkai Zeng

Orcid: 0000-0002-0610-1553

Affiliations:
  • Nanjing University, Nanjing, China


According to our database1, Qingkai Zeng authored at least 34 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BULKHEAD: Secure, Scalable, and Efficient Kernel Compartmentalization with PKS.
CoRR, 2024

When eBPF Meets Machine Learning: On-the-fly OS Kernel Compartmentalization.
CoRR, 2024

2023
PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel.
Proceedings of the 32nd USENIX Security Symposium, 2023

AttnCall: Refining Indirect Call Targets in Binaries with Attention.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
The count-min sketch is vulnerable to offline password-guessing attacks.
Int. J. Inf. Comput. Secur., 2022

CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware Feature.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Formal Modeling and Security Analysis for Intra-level Privilege Separation.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures.
Secur. Commun. Networks, 2021

SecPT: Providing Efficient Page Table Protection based on SMAP Feature in an Untrusted Commodity Kernel.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2019
CSPS: catchy short passwords making offline and online attacks impossible.
Int. J. Inf. Comput. Secur., 2019

AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Improved Construction for Inner Product Functional Encryption.
Secur. Commun. Networks, 2018

Simulation-based security of function-hiding inner product encryption.
Sci. China Inf. Sci., 2018

Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attacks.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

2017
Dancing with Wolves: Towards Practical Event-driven VMM Monitoring.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

NodeLeaper: Lower Overhead Oblivious AVL Tree.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing.
Proceedings of the Security and Privacy in Communication Networks, 2017

Efficient Inner Product Encryption with Simulation-Based Security.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Exception-oriented programming: retrofitting code-reuse attacks to construct kernel malware.
IET Inf. Secur., 2016

SeededFuzz: Selecting and Generating Seeds for Directed Fuzzing.
Proceedings of the 10th International Symposium on Theoretical Aspects of Software Engineering, 2016

IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis.
Int. J. Softw. Eng. Knowl. Eng., 2015

Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Evaluating Initial Inputs for Concolic Testing.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

Statically-Guided Fork-based Symbolic Execution for Vulnerability Detection.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Hardware-Assisted Fine-Grained Code-Reuse Attack Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Crashmaker: an improved binary concolic testing tool for vulnerability detection.
Proceedings of the Symposium on Applied Computing, 2014

Using Machine Language Model for Mimimorphic Malware Detection.
Proceedings of the Information Security - 17th International Conference, 2014

2012
A Security Assurance Framework Combining Formal Verification and Security Functional Testing.
Proceedings of the 2012 12th International Conference on Quality Software, 2012

2006
Efficient and Practical Control Flow Monitoring for Program Security.
Proceedings of the Advances in Computer Science, 2006


  Loading...