팔로우
Chao Zhang
제목
인용
인용
연도
Practical control flow integrity and randomization for binary executables
C Zhang, T Wei, Z Chen, L Duan, L Szekeres, S McCamant, D Song, ...
2013 IEEE Symposium on Security and Privacy, 559-573, 2013
7002013
CollAFL: Path Sensitive Fuzzing
S Gan, C Zhang, X Qin, X Tu, K Li, Z Pei, Z Chen
IEEE Security & Privacy 2018, 2018
4532018
Fuzzing: a survey
J Li, B Zhao, C Zhang
Cybersecurity 1 (1), 1-13, 2018
2692018
{MOPT}: Optimized mutation scheduling for fuzzers
C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song, R Beyah
28th USENIX Security Symposium (USENIX Security 19), 1949-1966, 2019
2592019
αdiff: cross-version binary code similarity detection with dnn
B Liu, W Huo, C Zhang, W Li, F Li, A Piao, W Zou
Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018
1942018
{GREYONE}: Data flow sensitive fuzzing
S Gan, C Zhang, P Chen, B Zhao, X Qin, D Wu, Z Chen
29th USENIX security symposium (USENIX Security 20), 2577-2594, 2020
1642020
Controllable synthesis of ZnO nanocrystals via a surfactant-assisted alcohol thermal process at a low temperature
C Wang, E Shen, E Wang, L Gao, Z Kang, C Tian, Y Lan, C Zhang
Materials Letters 59 (23), 2867-2871, 2005
1542005
VTint: Protecting Virtual Function Tables' Integrity.
C Zhang, C Song, KZ Chen, Z Chen, D Song
NDSS, 2015
1062015
VTrust: Regaining Trust on Virtual Calls
C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song
Network and Distributed System Security Symposium, 2016
1002016
Revery: From proof-of-concept to exploitable
Y Wang, C Zhang, X Xiang, Z Zhao, W Li, X Gong, B Liu, K Chen, W Zou
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
892018
Synthesis and evolution of PbS nanocrystals through a surfactant-assisted solvothermal route
C Zhang, Z Kang, E Shen, E Wang, L Gao, F Luo, C Tian, C Wang, Y Lan, ...
The Journal of Physical Chemistry B 110 (1), 184-189, 2006
812006
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time
C Zhang, T Wang, T Wei, Y Chen, W Zou
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
732010
One-step solvothermal synthesis of high ordered BaWO4 and BaMoO4 nanostructures
C Zhang, E Shen, E Wang, Z Kang, L Gao, C Hu, L Xu
Materials chemistry and physics 96 (2-3), 240-243, 2006
652006
Exploiting and Protecting Dynamic Code Generation.
C Song, C Zhang, T Wang, W Lee, D Melski
NDSS, 2015
642015
Synthesis of Ag-coated polystyrene colloids by an improved surface seeding and shell growth technique
C Tian, E Wang, Z Kang, B Mao, C Zhang, Y Lan, C Wang, Y Song
Journal of Solid State Chemistry 179 (11), 3270-3276, 2006
502006
Jtrans: Jump-aware transformer for binary code similarity detection
H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu, J Zhuge, C Zhang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
49*2022
Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange
P Xia, H Wang, B Gao, W Su, Z Yu, X Luo, C Zhang, X Xiao, G Xu
Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (3 …, 2021
482021
{FANS}: Fuzzing android native system services via automated interface analysis
B Liu, C Zhang, G Gong, Y Zeng, H Ruan, J Zhuge
29th USENIX Security Symposium (USENIX Security 20), 307-323, 2020
452020
Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems
L Chen, Y Wang, Q Cai, Y Zhan, H Hu, J Linghu, Q Hou, C Zhang, H Duan, ...
30th USENIX Security Symposium (USENIX Security 21), 303-319, 2021
412021
A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons Learned
B Liu, G Meng, W Zou, Q Gong, F Li, M Lin, D Sun, W Huo, C Zhang
ICSE, 2020
402020
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20