Zhuo Zhang

Orcid: 0000-0002-6515-0021

Affiliations:
  • Purdue University, West Lafayette, IN, USA


According to our database1, Zhuo Zhang authored at least 36 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking.
Proc. ACM Softw. Eng., 2024

Consolidating Smart Contracts with Behavioral Contracts.
Proc. ACM Program. Lang., 2024

ASPIRER: Bypassing System Prompts With Permutation-based Backdoors in LLMs.
CoRR, 2024

Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia.
CoRR, 2024

Opening A Pandora's Box: Things You Should Know in the Era of Custom GPTs.
CoRR, 2024

Cost-effective Attack Forensics by Recording and Correlating File System Changes.
Proceedings of the 33rd USENIX Security Symposium, 2024

Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

On Large Language Models' Resilience to Coercive Interrogation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

OdScan: Backdoor Scanning for Object Detection Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Define-Use Guided Path Exploration for Better Forced Execution.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

FuzzInMem: Fuzzing Programs via In-memory Structures.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Threat Behavior Textual Search by Attention Graph Isomorphism.
Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics, 2024

2023
Revamping Binary Analysis with Sampling and Probabilistic Inference
PhD thesis, 2023

Make Them Spill the Beans! Coercive Knowledge Extraction from (Production) LLMs.
CoRR, 2023

LmPa: Improving Decompilation by Synergy of Large Language Model and Program Analysis.
CoRR, 2023

PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023

Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract.
Proceedings of the 32nd USENIX Security Symposium, 2023

D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Demystifying Exploitable Bugs in Smart Contracts.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
Backdoor Vulnerabilities in Normally Trained Deep Learning Models.
CoRR, 2022

DECK: Model Hardening for Defending Pervasive Backdoors.
CoRR, 2022

Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense.
CoRR, 2022

Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

TensileFuzz: facilitating seed input generation in fuzzing via string constraint solving.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense.
Proceedings of the International Conference on Machine Learning, 2022

Poirot: Probabilistically Recommending Protections for the Android Framework.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation.
Proc. ACM Program. Lang., 2019

Probabilistic disassembly.
Proceedings of the 41st International Conference on Software Engineering, 2019


  Loading...