Chengyu Song
Chengyu Song
Verified email at cs.ucr.edu - Homepage
Title
Cited by
Cited by
Year
Studying malicious websites and the underground economy on the Chinese web
J Zhuge, T Holz, C Song, J Guo, X Han, W Zou
Managing information risk and the economics of security, 225-244, 2009
1542009
Spectre Returns! Speculation Attacks using the Return Stack Buffer
EM Koruyeh, KN Khasawneh, C Song, N Abu-Ghazaleh
USENIX Workshop on Offensive Technologies (WOOT), 2018
1272018
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks
K Lu, C Song, B Lee, SP Chung, T Kim, W Lee
2015 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2015
1212015
VTint: Defending virtual function tables' integrity
C Zhang, C Song, KZ Chen, Z Chen, D Song
Symposium on Network and Distributed System Security (NDSS), 2015
113*2015
Preventing Use-after-free with Dangling Pointers Nullification
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
Symposium on Network and Distributed System Security (NDSS), 2015
1082015
Enforcing Kernel Security Invariants with Data Flow Integrity
C Song, B Lee, K Lu, W Harris, T Kim, W Lee
Symposium on Network and Distributed System Security (NDSS), 2016
852016
Collecting autonomous spreading malware using high-interaction honeypots
J Zhuge, T Holz, X Han, C Song, W Zou
International Conference on Information and Communications Security, 438-451, 2007
832007
VTrust: Regaining Trust on Virtual Calls
C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song
Symposium on Network and Distributed System Security (NDSS), 2016
732016
HDFI: Hardware-Assisted Data-flow Isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 2016
712016
Mimesis Aegis: A Mimicry Privacy Shield–A System’s Approach to Data Privacy on Public Cloud
B Lau, S Chung, C Song, Y Jang, W Lee, A Boldyreva
23rd USENIX conference on Security Symposium, 33-48, 2014
702014
Toward engineering a secure android ecosystem: A survey of existing techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016
642016
A11y attacks: Exploiting accessibility in operating systems
Y Jang, C Song, SP Chung, T Wang, W Lee
2014 ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2014
622014
Type Casting Verification: Stopping an Emerging Attack Vector
B Lee, C Song, T Kim, W Lee
24th USENIX Security Symposium (USENIX Security 15), 2015
612015
Cross-checking semantic correctness: The case of finding file system bugs
C Min, S Kashyap, B Lee, C Song, T Kim
25th Symposium on Operating Systems Principles (SOSP), 361-377, 2015
602015
HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle
J Zhuge, X Han, Y Zhou, C Song, J Guo, W Zou
JOURNAL-CHINA INSTITUTE OF COMMUNICATIONS 28 (12), 8, 2007
59*2007
Efficient Protection of Path-Sensitive Control Security
R Ding, C Qian, C Song, B Harris, T Kim, W Lee
26th USENIX Security Symposium (USENIX Security 17), 2017
562017
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages
K Lu, C Song, T Kim, W Lee
2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2016
542016
Exploiting and Protecting Dynamic Code Generation
C Song, C Zhang, T Wang, W Lee, D Melski
Symposium on Network and Distributed System Security (NDSS), 2015
532015
Mactans: Injecting Malware Into iOS Devices via Malicious Chargers
B Lau, Y Jang, C Song, T Wang, PH Chung, P Royal
BlackHat USA 2013, 2013
462013
Safespec: Banishing the spectre of a meltdown with leakage-free speculation
KN Khasawneh, EM Koruyeh, C Song, D Evtyushkin, D Ponomarev, ...
2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019
422019
The system can't perform the operation now. Try again later.
Articles 1–20