Zhenkai Liang
Orcid: 0000-0001-7138-5030Affiliations:
- National University of Singapore
According to our database1,
Zhenkai Liang
authored at least 113 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
CoRR, 2024
UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association.
IEEE Trans. Dependable Secur. Comput., 2023
Learning Graph-based Code Representations for Source-level Functional Similarity Detection.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
2022
Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages.
IEEE Internet Things J., 2022
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation.
Proceedings of the 31st USENIX Security Symposium, 2022
FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries.
Proceedings of the 31st USENIX Security Symposium, 2022
SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Non-uniform Deformation Behavior of Magneto-Sensitive Elastomer Containing Uniform Sphere Particles with V-ShapedArrangement.
Proceedings of the Bio-Inspired Computing: Theories and Applications, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Software Eng., 2021
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Identifying privacy weaknesses from multi-party trigger-action integration platforms.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
2019
IEEE Internet Things J., 2019
EURASIP J. Wirel. Commun. Netw., 2019
CoRR, 2019
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
J. Comput. Sci. Technol., 2018
Cybersecur., 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
IACR Cryptol. ePrint Arch., 2017
RoppDroid: Robust permission re-delegation prevention in Android inter-component communication.
Comput. Secur., 2017
Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity.
IEEE Access, 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017
Proceedings of the 2017 International Conference on Identification, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
2016
IEEE Trans. Parallel Distributed Syst., 2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications.
Proceedings of the International Conference on Identification, 2016
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IEEE Internet Comput., 2015
Comput. Secur., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms.
Proceedings of the FM 2014: Formal Methods, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEEE Trans. Dependable Secur. Comput., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
A Software Environment for Confining Malicious Android Applications via Resource Virtualization.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013
A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
ACM Trans. Softw. Eng. Methodol., 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions.
Proceedings of the Computer Security - ESORICS 2012, 2012
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the ASE 2010, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
ACM Trans. Inf. Syst. Secur., 2009
Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2009
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
2008
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
2007
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2005
Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems.
Proceedings of the 2005 USENIX Annual Technical Conference, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Fast and automated generation of attack signatures: a basis for building self-protecting servers.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2003
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Proceedings of the 16th Conference on Systems Administration (LISA 2002), 2002