Zheng Leong Chua

According to our database1, Zheng Leong Chua authored at least 17 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation.
Proceedings of the 31st USENIX Security Symposium, 2022

SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Scalable Quantitative Verification For Deep Neural Networks.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2019
Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework.
CoRR, 2019

Fuzzing Program Logic Deeply Hidden in Binary Program Stages.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2017
Neural Nets Can Learn Function Type Signatures From Binaries.
Proceedings of the 26th USENIX Security Symposium, 2017

Enabling practical experimentation in cyber-security training.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Preventing Page Faults from Telling Your Secrets.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks.
CoRR, 2015

Automatic Generation of Data-Oriented Exploits.
Proceedings of the 24th USENIX Security Symposium, 2015

Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
A Look at Targeted Attacks Through the Lense of an NGO.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013


  Loading...