Zhiyun Qian
Orcid: 0000-0003-1506-2522Affiliations:
- University of California Riverside, USA
According to our database1,
Zhiyun Qian
authored at least 120 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.ucr.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proc. ACM Program. Lang., 2024
IEEE Secur. Priv., 2024
Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks.
Proceedings of the 33rd USENIX Security Symposium, 2024
OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
2023
CoRR, 2023
CoRR, 2023
A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel.
Proceedings of the 32nd USENIX Security Symposium, 2023
SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 21st USENIX Conference on File and Storage Technologies, 2023
2022
Who Moves My App Promotion Investment? A Systematic Study About App Distribution Fraud.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel.
Proceedings of the 31st USENIX Security Symposium, 2022
LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems.
Proceedings of the 30th USENIX Security Symposium, 2021
A nationwide census on wifi security threats: prevalence, riskiness, and the economics.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison.
Proceedings of the MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
CoRR, 2020
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Proceedings of the 29th USENIX Security Symposium, 2020
KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
IEEE/ACM Trans. Netw., 2019
App in the Middle: Demystify Application Virtualization in Android and its Security Threats.
Proc. ACM Meas. Anal. Comput. Syst., 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEEE/ACM Trans. Netw., 2018
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Proc. ACM Meas. Anal. Comput. Syst., 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 2017 Internet Measurement Conference, 2017
Proceedings of the 2017 Internet Measurement Conference, 2017
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proc. VLDB Endow., 2015
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
2013
AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
PhD thesis, 2012
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Collaborative TCP sequence number inference attack: how to crack sequence number under a second.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks.
Proceedings of the Security and Privacy in Communication Networks, 2011
2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Accurate online power estimation and automatic battery behavior based power model generation for smartphones.
Proceedings of the 8th International Conference on Hardware/Software Codesign and System Synthesis, 2010
2009
Proceedings of the Security and Privacy in Communication Networks, 2009