Zhiqiang Lin

Orcid: 0000-0001-6527-5994

Affiliations:
  • Ohio State University, Columbus, OH, USA


According to our database1, Zhiqiang Lin authored at least 127 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SimLLM: Calculating Semantic Similarity in Code Summaries using a Large Language Model-Based Approach.
Proc. ACM Softw. Eng., 2024

Cocoon: Static Information Flow Control in Rust.
Proc. ACM Program. Lang., 2024

Ditto: Elastic Confidential VMs with Secure and Dynamic CPU Scaling.
CoRR, 2024

Flashback: Enhancing Proposer-Builder Design with Future-Block Auctions in Proof-of-Stake Ethereum.
CoRR, 2024

Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
CoRR, 2024

SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024

From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

6G-XSec: Explainable Edge Security for Emerging OpenRAN Architectures.
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, 2024

SaTS '24: The 2nd ACM Workshop on Secure and Trustworthy Superapps.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

BaseMirror: Automatic Reverse Engineering of Baseband Commands from Android's Radio Interface Layer.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

When Compiler Optimizations Meet Symbolic Execution: An Empirical Study.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding.
Proc. ACM Meas. Anal. Comput. Syst., March, 2023

SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems.
CoRR, 2023

Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models.
CoRR, 2023

Cocoon: Static Information Flow Control in Rust.
CoRR, 2023

SoK: Decoding the Super App Enigma: The Security Mechanisms, Threats, and Trade-offs in OS-alike Apps.
CoRR, 2023

A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games.
Proceedings of the 32nd USENIX Security Symposium, 2023

Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries.
Proceedings of the 32nd USENIX Security Symposium, 2023

One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat.
Proceedings of the 32nd USENIX Security Symposium, 2023

Controlled Data Races in Enclaves: Attacks and Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

Reusable Enclaves for Confidential Serverless Computing.
Proceedings of the 32nd USENIX Security Symposium, 2023

Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract.
Proceedings of the 32nd USENIX Security Symposium, 2023

ADC-Bank: Detecting Acoustic Out-of-Band Signal Injection on Inertial Sensors.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023

Renewable Just-In-Time Control-Flow Integrity.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Thwarting Smartphone SMS Attacks at the Radio Interface Layer.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Demystifying Exploitable Bugs in Smart Contracts.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Uncovering and Exploiting Hidden APIs in Mobile Super Apps.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS.
IEEE Trans. Computers, 2022

Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing.
Proc. Priv. Enhancing Technol., 2022

An Empirical Study on Ethereum Private Transactions and the Security Implications.
CoRR, 2022

Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games.
Proceedings of the 31st USENIX Security Symposium, 2022

vSGX: Virtualizing SGX Enclaves on AMD SEV.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

A fine-grained telemetry stream for security services in 5G open radio access networks.
Proceedings of the 1st International Workshop on Emerging Topics in Wireless, 2022


Detecting and Measuring Misconfigured Manifests in Android Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Understanding IoT Security from a Market-Scale Perspective.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
A Measurement Study of Wechat Mini-Apps.
Proc. ACM Meas. Anal. Comput. Syst., 2021

WLAN-Log-Based Superspreader Detection in the COVID-19 Pandemic.
CoRR, 2021

Towards Formal Verification of State Continuity for Enclave Programs.
Proceedings of the 30th USENIX Security Symposium, 2021

SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting.
Proceedings of the 30th USENIX Security Symposium, 2021

Specularizer : Detecting Speculative Execution Attacks via Performance Tracing.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution.
IEEE Secur. Priv., 2020

ACOUSTIC-TURF: Acoustic-based Privacy-Preserving COVID-19 Contact Tracing.
CoRR, 2020

TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
Proceedings of the 29th USENIX Security Symposium, 2020

Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT.
Proceedings of the 29th USENIX Security Symposium, 2020

FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020

Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps.
Proceedings of the Security and Privacy in Communication Networks, 2020

A Study of the Privacy of COVID-19 Contact Tracing Apps.
Proceedings of the Security and Privacy in Communication Networks, 2020

On the Effectiveness of Behavior-Based Ransomware Detection.
Proceedings of the Security and Privacy in Communication Networks, 2020

Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode.
CoRR, 2019

CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software.
Proceedings of the 28th USENIX Security Symposium, 2019

Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization.
Proceedings of the 28th USENIX Security Symposium, 2019

The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends.
Proceedings of the 28th USENIX Security Symposium, 2019

Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Probabilistic disassembly.
Proceedings of the 41st International Conference on Software Engineering, 2019

Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution.
CoRR, 2018

Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors.
Proceedings of the 27th USENIX Security Symposium, 2018

IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Towards Interface-Driven COTS Binary Hardening.
Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software Transformation, 2018

BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
SMARTGEN: Exposing Server URLs of Mobile Apps With Selective Symbolic Execution.
Proceedings of the 26th International Conference on World Wide Web, 2017

Securing Data Analytics on SGX with Randomization.
Proceedings of the Computer Security - ESORICS 2017, 2017

PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

SGX-Log: Securing System Logs With SGX.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Building a Security OS With Software Defined Infrastructure.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Detecting Stack Layout Corruptions with Robust Stack Unwinding.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Adaptive encrypted traffic fingerprinting with bi-directional dependence.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
A Practical Approach for Adaptive Data Structure Layout Randomization.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Data-Centric OS Kernel Malware Characterization.
IEEE Trans. Inf. Forensics Secur., 2014

X-Force: Force-Executing Binary Programs for Security Applications.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Preventing Cryptographic Key Leakage in Cloud Virtual Machines.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Towards a Systematic Study of the Covert Channel Attacks in Smartphones.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Obfuscation resilient binary code reuse through trace-oriented programming.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Subverting system authentication with context-aware, reactive virtual machine introspection.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Bin-Carver: Automatic recovery of binary executable files.
Digit. Investig., 2012

Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Automatic generation of vaccines for malware immunization.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Binary stirring: self-randomizing instruction addresses of legacy x86 binary code.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Securing untrusted code via compiler-agnostic binary rewriting.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011

Characterizing kernel malware behavior with kernel data access patterns.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications.
IEEE Trans. Software Eng., 2010

Automatic Reverse Engineering of Data Structures from Binary Execution.
Proceedings of the Network and Distributed System Security Symposium, 2010

Strict control dependence and its effect on dynamic information flow analyses.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Polymorphing Software by Randomizing Data Structure Layout.
Proceedings of the Detection of Intrusions and Malware, 2009

2008
Deriving input syntactic structure from execution.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Proceedings of the Network and Distributed System Security Symposium, 2008

Convicting exploitable software vulnerabilities: An efficient input provenance based approach.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2006
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation.
Proceedings of the Information Security, 9th International Conference, 2006

A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities.
Proceedings of the The First International Conference on Availability, 2006

2005
A policy flexible architecture for secure operating system.
ACM SIGOPS Oper. Syst. Rev., 2005


  Loading...