ÆÈ·Î¿ì
Chao Zhang
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Practical control flow integrity and randomization for binary executables
C Zhang, T Wei, Z Chen, L Duan, L Szekeres, S McCamant, D Song, ...
2013 IEEE Symposium on Security and Privacy, 559-573, 2013
6562013
CollAFL: Path Sensitive Fuzzing
S Gan, C Zhang, X Qin, X Tu, K Li, Z Pei, Z Chen
IEEE Security & Privacy 2018, 2018
3512018
Fuzzing: a survey
J Li, B Zhao, C Zhang
Cybersecurity 1 (1), 1-13, 2018
1882018
MOPT: Optimized Mutation Scheduling for Fuzzers.
C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song, R Beyah
USENIX Security Symposium, 1949-1966, 2019
1722019
¥ádiff: cross-version binary code similarity detection with dnn
B Liu, W Huo, C Zhang, W Li, F Li, A Piao, W Zou
Proceedings of the 33rd ACM/IEEE International Conference on Automated ¡¦, 2018
1402018
GREYONE: Data Flow Sensitive Fuzzing.
S Gan, C Zhang, P Chen, B Zhao, X Qin, D Wu, Z Chen
USENIX Security Symposium, 2577-2594, 2020
1022020
VTint: Protecting Virtual Function Tables' Integrity.
C Zhang, C Song, KZ Chen, Z Chen, D Song
NDSS, 2015
992015
VTrust: Regaining Trust on Virtual Calls
C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song
Network and Distributed System Security Symposium, 2016
942016
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time
C Zhang, T Wang, T Wei, Y Chen, W Zou
Computer Security–ESORICS 2010: 15th European Symposium on Research in ¡¦, 2010
682010
Exploiting and Protecting Dynamic Code Generation.
C Song, C Zhang, T Wang, W Lee, D Melski
NDSS, 2015
632015
Revery: From proof-of-concept to exploitable
Y Wang, C Zhang, X Xiang, Z Zhao, W Li, X Gong, B Liu, K Chen, W Zou
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications ¡¦, 2018
602018
FANS: Fuzzing Android Native System Services via Automated Interface Analysis.
B Liu, C Zhang, G Gong, Y Zeng, H Ruan, J Zhuge
USENIX Security Symposium, 307-323, 2020
332020
Towards Efficient Heap Overflow Discovery.
X Jia, C Zhang, P Su, Y Yang, H Huang, D Feng
USENIX Security Symposium, 989-1006, 2017
332017
Finding cracks in shields: On the security of control flow integrity mechanisms
Y Li, M Wang, C Zhang, X Chen, S Yang, Y Liu
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications ¡¦, 2020
242020
A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons Learned
B Liu, G Meng, W Zou, Q Gong, F Li, M Lin, D Sun, W Huo, C Zhang
ICSE, 2020
232020
MAZE: Towards Automated Heap Feng Shui.
Y Wang, C Zhang, Z Zhao, B Zhang, X Gong, W Zou
USENIX Security Symposium, 1647-1664, 2021
212021
SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities
Y Zhang, W Huo, K Jian, J Shi, H Lu, L Liu, C Wang, D Sun, C Zhang, ...
Proceedings of the 35th annual computer security applications conference ¡¦, 2019
192019
Abusing CDNs for Fun and Profit: Security Issues in CDNs¡¯ Origin Validation
R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ...
192018
Protecting function pointers in binary
C Zhang, T Wei, Z Chen, L Duan, S McCamant, L Szekeres
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and ¡¦, 2013
192013
Android low entropy demystified
Y Ding, Z Peng, Y Zhou, C Zhang
2014 IEEE international conference on communications (ICC), 659-664, 2014
182014
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20