Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zhiqiang Lin
@article{DBLP:journals/corr/abs-2401-15289, author = {Xi Tan and Zheyuan Ma and Sandro Pinto and Le Guan and Ning Zhang and Jun Xu and Zhiqiang Lin and Hongxin Hu and Ziming Zhao}, title = {Where's the "up"?! {A} Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems}, journal = {CoRR}, volume = {abs/2401.15289}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.15289}, doi = {10.48550/ARXIV.2401.15289}, eprinttype = {arXiv}, eprint = {2401.15289}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-15289.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eaai/Lin0WSW23, author = {Zhiqiang Lin and Fan Yang and Xuyang Wu and Jinsong Su and Xiaoyue Wang}, title = {A Feedback-Enhanced Two-Stage Framework for judicial machine reading comprehension}, journal = {Eng. Appl. Artif. Intell.}, volume = {123}, number = {Part {A}}, pages = {106178}, year = {2023}, url = {https://doi.org/10.1016/j.engappai.2023.106178}, doi = {10.1016/J.ENGAPPAI.2023.106178}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eaai/Lin0WSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pomacs/LuZCLL23, author = {Haoran Lu and Qingchuan Zhao and Yongliang Chen and Xiaojing Liao and Zhiqiang Lin}, title = {Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding}, journal = {Proc. {ACM} Meas. Anal. Comput. Syst.}, volume = {7}, number = {1}, pages = {18:1--18:27}, year = {2023}, url = {https://doi.org/10.1145/3579447}, doi = {10.1145/3579447}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pomacs/LuZCLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/SivakumaranZLB23, author = {Pallavi Sivakumaran and Chaoshun Zuo and Zhiqiang Lin and Jorge Blasco}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {1004--1015}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3595806}, doi = {10.1145/3579856.3595806}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/SivakumaranZLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/AhadWKJL023, author = {Ali Ahad and Gang Wang and Chung Hwan Kim and Suman Jana and Zhiqiang Lin and Yonghwi Kwon}, editor = {Tor M. Aamodt and Michael M. Swift and Natalie D. Enright Jerger}, title = {FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation}, booktitle = {Proceedings of the 28th {ACM} International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 4, {ASPLOS} 2023, Vancouver, BC, Canada, March 25-29, 2023}, pages = {169--188}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623278.3624760}, doi = {10.1145/3623278.3624760}, timestamp = {Sat, 30 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asplos/AhadWKJL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Zhang0L23, author = {Yue Zhang and Yuqing Yang and Zhiqiang Lin}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2411--2425}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616591}, doi = {10.1145/3576915.3616591}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Zhang0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangZL23, author = {Chao Wang and Yue Zhang and Zhiqiang Lin}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Uncovering and Exploiting Hidden APIs in Mobile Super Apps}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2471--2485}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616676}, doi = {10.1145/3576915.3616676}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LinL23, author = {Zhiqiang Lin and Xiaojing Liao}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {SaTS'23: The 1st {ACM} Workshop on Secure and Trustworthy Superapps}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3655--3656}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3624023}, doi = {10.1145/3576915.3624023}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LinL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/WangLZL23, author = {Wubing Wang and Mengyuan Li and Yinqian Zhang and Zhiqiang Lin}, editor = {Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati}, title = {PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on {AMD} {SEV}}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, {DIMVA} 2023, Hamburg, Germany, July 12-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13959}, pages = {46--66}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35504-2\_3}, doi = {10.1007/978-3-031-35504-2\_3}, timestamp = {Tue, 20 Jun 2023 14:45:29 +0200}, biburl = {https://dblp.org/rec/conf/dimva/WangLZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ei-iss/FukuokaUPHDLVG23, author = {Shimpei Fukuoka and Masayuki Uchiyama and Geunsook Park and Alan Chih{-}Wei Hsiung and Mourad Daoudi and Zhiqiang Lin and Vincent C. Venezia and Lindsay A. Grant}, title = {A 2.2um three-wafer stacked back side illuminated voltage domain global shutter {CMOS} image sensor}, booktitle = {Imaging Sensors and Systems 2023, San Francisco, CA, USA, January 15-19, 2023}, pages = {1--5}, publisher = {Society for Imaging Science and Technology}, year = {2023}, url = {https://doi.org/10.2352/EI.2023.35.6.ISS-182}, doi = {10.2352/EI.2023.35.6.ISS-182}, timestamp = {Fri, 21 Jul 2023 13:58:07 +0200}, biburl = {https://dblp.org/rec/conf/ei-iss/FukuokaUPHDLVG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ZhangZXL23, author = {Zhuo Zhang and Brian Zhang and Wen Xu and Zhiqiang Lin}, title = {Demystifying Exploitable Bugs in Smart Contracts}, booktitle = {45th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2023, Melbourne, Australia, May 14-20, 2023}, pages = {615--627}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSE48619.2023.00061}, doi = {10.1109/ICSE48619.2023.00061}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/ZhangZXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/WangKZYL23, author = {Chao Wang and Ronny Ko and Yue Zhang and Yuqing Yang and Zhiqiang Lin}, title = {Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis}, booktitle = {45th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2023, Melbourne, Australia, May 14-20, 2023}, pages = {932--944}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSE48619.2023.00086}, doi = {10.1109/ICSE48619.2023.00086}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/WangKZYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Jangid0L23, author = {Mohit Kumar Jangid and Yue Zhang and Zhiqiang Lin}, title = {Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/extrapolating-formal-analysis-to-uncover-attacks-in-bluetooth-passkey-entry-pairing/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Jangid0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WenPYL23, author = {Haohuang Wen and Phillip A. Porras and Vinod Yegneswaran and Zhiqiang Lin}, title = {Thwarting Smartphone {SMS} Attacks at the Radio Interface Layer}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/thwarting-smartphone-sms-attacks-at-the-radio-interface-layer/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/WenPYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AnwarZYL23, author = {Md Sakib Anwar and Chaoshun Zuo and Carter Yagemann and Zhiqiang Lin}, title = {Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {17--31}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607211}, doi = {10.1145/3607199.3607211}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AnwarZYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BaumanDHL23, author = {Erick Bauman and Jun Duan and Kevin W. Hamlen and Zhiqiang Lin}, title = {Renewable Just-In-Time Control-Flow Integrity}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {580--594}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607239}, doi = {10.1145/3607199.3607239}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BaumanDHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/LuZCLL23, author = {Haoran Lu and Qingchuan Zhao and Yongliang Chen and Xiaojing Liao and Zhiqiang Lin}, editor = {Evgenia Smirni and Konstantin Avrachenkov and Phillipa Gill and Bhuvan Urgaonkar}, title = {Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding}, booktitle = {Abstract Proceedings of the 2023 {ACM} {SIGMETRICS} International Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2023, Orlando, FL, USA, June 19-23, 2023}, pages = {45--46}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3578338.3593535}, doi = {10.1145/3578338.3593535}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/LuZCLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0002LM0023, author = {Zhuo Zhang and Zhiqiang Lin and Marcelo Morales and Xiangyu Zhang and Kaiyuan Zhang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {1757--1774}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-zhuo-exploit}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0002LM0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZuoWL23, author = {Chaoshun Zuo and Chao Wang and Zhiqiang Lin}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3925--3942}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/zuo}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZuoWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WenL23, author = {Haohuang Wen and Zhiqiang Lin}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Egg Hunt in Tesla Infotainment: {A} First Look at Reverse Engineering of Qt Binaries}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3997--4014}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/wen}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WenL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0002XCZZL23, author = {Shixuan Zhao and Pinshen Xu and Guoxing Chen and Mengya Zhang and Yinqian Zhang and Zhiqiang Lin}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Reusable Enclaves for Confidential Serverless Computing}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4015--4032}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhao-shixuan}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0002XCZZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenLZ23, author = {Sanchuan Chen and Zhiqiang Lin and Yinqian Zhang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Controlled Data Races in Enclaves: Attacks and Detection}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4069--4086}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/chen-sanchuan}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangZL23, author = {Chao Wang and Yue Zhang and Zhiqiang Lin}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {6629--6646}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/wang-chao}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WangZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sats/2023, editor = {Zhiqiang Lin and Xiaojing Liao}, title = {Proceedings of the 2023 {ACM} Workshop on Secure and Trustworthy Superapps, SaTS 2023, Copenhagen, Denmark, 26 November 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605762}, doi = {10.1145/3605762}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sats/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2022, editor = {Fengjun Li and Kaitai Liang and Zhiqiang Lin and Sokratis K. Katsikas}, title = {Security and Privacy in Communication Networks - 18th {EAI} International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {462}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-25538-0}, doi = {10.1007/978-3-031-25538-0}, isbn = {978-3-031-25537-3}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-07495, author = {Yuqing Yang and Chao Wang and Yue Zhang and Zhiqiang Lin}, title = {SoK: Decoding the Super App Enigma: The Security Mechanisms, Threats, and Trade-offs in OS-alike Apps}, journal = {CoRR}, volume = {abs/2306.07495}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.07495}, doi = {10.48550/ARXIV.2306.07495}, eprinttype = {arXiv}, eprint = {2306.07495}, timestamp = {Sun, 18 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-07495.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-08134, author = {Chao Wang and Yue Zhang and Zhiqiang Lin}, title = {Uncovering and Exploiting Hidden APIs in Mobile Super Apps}, journal = {CoRR}, volume = {abs/2306.08134}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.08134}, doi = {10.48550/ARXIV.2306.08134}, eprinttype = {arXiv}, eprint = {2306.08134}, timestamp = {Sun, 18 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-08134.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-08151, author = {Yue Zhang and Yuqing Yang and Zhiqiang Lin}, title = {Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs}, journal = {CoRR}, volume = {abs/2306.08151}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.08151}, doi = {10.48550/ARXIV.2306.08151}, eprinttype = {arXiv}, eprint = {2306.08151}, timestamp = {Sun, 18 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-08151.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-00097, author = {Ada Barach and Maxwell Taylor and Vincent Beardsley and Jacob Bambeck and Michael D. Bond and Zhiqiang Lin}, title = {Cocoon: Static Information Flow Control in Rust}, journal = {CoRR}, volume = {abs/2311.00097}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.00097}, doi = {10.48550/ARXIV.2311.00097}, eprinttype = {arXiv}, eprint = {2311.00097}, timestamp = {Tue, 07 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-00097.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-09601, author = {Xin Jin and Jonathan Larson and Weiwei Yang and Zhiqiang Lin}, title = {Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models}, journal = {CoRR}, volume = {abs/2312.09601}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.09601}, doi = {10.48550/ARXIV.2312.09601}, eprinttype = {arXiv}, eprint = {2312.09601}, timestamp = {Tue, 09 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-09601.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-12573, author = {Mengya Zhang and Xiaokuan Zhang and Josh Barbee and Yinqian Zhang and Zhiqiang Lin}, title = {SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems}, journal = {CoRR}, volume = {abs/2312.12573}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.12573}, doi = {10.48550/ARXIV.2312.12573}, eprinttype = {arXiv}, eprint = {2312.12573}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-12573.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/EllisWLA22, author = {Christopher Ellis and Haohuang Wen and Zhiqiang Lin and Anish Arora}, title = {Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {4}, pages = {727--745}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0130}, doi = {10.56553/POPETS-2022-0130}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/EllisWLA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiLC22, author = {Weizhou Li and Zhiqiang Lin and Qi Chen}, title = {A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses}, journal = {Secur. Commun. Networks}, volume = {2022}, pages = {1417607:1--1417607:9}, year = {2022}, url = {https://doi.org/10.1155/2022/1417607}, doi = {10.1155/2022/1417607}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/TangQLLYXL22, author = {Yutao Tang and Zhengrui Qin and Zhiqiang Lin and Yue Li and Shanhe Yi and Fengyuan Xu and Qun Li}, title = {vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted {OS}}, journal = {{IEEE} Trans. Computers}, volume = {71}, number = {12}, pages = {3349--3360}, year = {2022}, url = {https://doi.org/10.1109/TC.2022.3152074}, doi = {10.1109/TC.2022.3152074}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/TangQLLYXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ChenTL22, author = {Qi Chen and Chunming Tang and Zhiqiang Lin}, title = {Efficient Explicit Constructions of Multipartite Secret Sharing Schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {68}, number = {1}, pages = {601--631}, year = {2022}, url = {https://doi.org/10.1109/TIT.2021.3123102}, doi = {10.1109/TIT.2021.3123102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/ChenTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/ZhaoZBL22, author = {Qingchuan Zhao and Chaoshun Zuo and Jorge Blasco and Zhiqiang Lin}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {521--533}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517410}, doi = {10.1145/3488932.3517410}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ZhaoZBL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JinMKLN22, author = {Xin Jin and Sunil Manandhar and Kaushal Kafle and Zhiqiang Lin and Adwait Nadkarni}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Understanding IoT Security from a Market-Scale Perspective}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1615--1629}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560640}, doi = {10.1145/3548606.3560640}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JinMKLN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JinPWL22, author = {Xin Jin and Kexin Pei and Jun Yeon Won and Zhiqiang Lin}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1631--1645}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560612}, doi = {10.1145/3548606.3560612}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JinPWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangEZ0SL22, author = {Yuqing Yang and Mohamed Elsabagh and Chaoshun Zuo and Ryan Johnson and Angelos Stavrou and Zhiqiang Lin}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Detecting and Measuring Misconfigured Manifests in Android Apps}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3063--3077}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560607}, doi = {10.1145/3548606.3560607}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YangEZ0SL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Yang0L22, author = {Yuqing Yang and Yue Zhang and Zhiqiang Lin}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3079--3092}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560597}, doi = {10.1145/3548606.3560597}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Yang0L22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0025L22, author = {Yue Zhang and Zhiqiang Lin}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3181--3194}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559372}, doi = {10.1145/3548606.3559372}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0025L22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/LinSABBCCEEIJJKLLLLMMNOPPSSSSTYY22, author = {Sen Lin and Ming Shi and Anish Arora and Raef Bassily and Elisa Bertino and Constantine Caramanis and Kaushik R. Chowdhury and Eylem Ekici and Atilla Eryilmaz and Stratis Ioannidis and Nan Jiang and Gauri Joshi and Jim Kurose and Yingbin Liang and Zhiqiang Lin and Jia Liu and Mingyan Liu and Tommaso Melodia and Aryan Mokhtari and Rob Nowak and Sewoong Oh and Srini Parthasarathy and Chunyi Peng and Hulya Seferoglu and Ness B. Shroff and Sanjay Shakkottai and Kannan Srinivasan and Ameet Talwalkar and Aylin Yener and Lei Ying}, title = {Leveraging Synergies Between {AI} and Networking to Build Next Generation Edge Networks}, booktitle = {8th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2022, Atlanta, GA, USA, December 14-16, 2022}, pages = {16--25}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CIC56439.2022.00013}, doi = {10.1109/CIC56439.2022.00013}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/LinSABBCCEEIJJKLLLLMMNOPPSSSSTYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/WenPYL22, author = {Haohuang Wen and Phillip A. Porras and Vinod Yegneswaran and Zhiqiang Lin}, editor = {Qing Wang and Arash Asadi}, title = {A fine-grained telemetry stream for security services in 5G open radio access networks}, booktitle = {Proceedings of the 1st International Workshop on Emerging Topics in Wireless, EmergingWireless 2022, Rome, Italy, 9 December 2022}, pages = {18--23}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3565474.3569070}, doi = {10.1145/3565474.3569070}, timestamp = {Thu, 22 Dec 2022 12:15:37 +0100}, biburl = {https://dblp.org/rec/conf/conext/WenPYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangCZL22, author = {Huibo Wang and Guoxing Chen and Yinqian Zhang and Zhiqiang Lin}, title = {Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-253/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/WangCZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WonWL22, author = {Jun Yeon Won and Haohuang Wen and Zhiqiang Lin}, title = {What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {200--213}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545957}, doi = {10.1145/3545948.3545957}, timestamp = {Thu, 20 Oct 2022 10:46:43 +0200}, biburl = {https://dblp.org/rec/conf/raid/WonWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhaoLZL22, author = {Shixuan Zhao and Mengyuan Li and Yinqian Zhang and Zhiqiang Lin}, title = {vSGX: Virtualizing {SGX} Enclaves on {AMD} {SEV}}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {321--336}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833694}, doi = {10.1109/SP46214.2022.9833694}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhaoLZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZuoL22, author = {Chaoshun Zuo and Zhiqiang Lin}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3093--3110}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/zuo}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZuoL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-02858, author = {Xingyu Lyu and Mengya Zhang and Xiaokuan Zhang and Jianyu Niu and Yinqian Zhang and Zhiqiang Lin}, title = {An Empirical Study on Ethereum Private Transactions and the Security Implications}, journal = {CoRR}, volume = {abs/2208.02858}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.02858}, doi = {10.48550/ARXIV.2208.02858}, eprinttype = {arXiv}, eprint = {2208.02858}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-02858.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-05327, author = {Ronny Ko and Chuan Xiao and Makoto Onizuka and Yihe Huang and Zhiqiang Lin}, title = {Ultraverse: Efficient Retroactive Operation for Attack Recovery in Database Systems and Web Frameworks}, journal = {CoRR}, volume = {abs/2211.05327}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.05327}, doi = {10.48550/ARXIV.2211.05327}, eprinttype = {arXiv}, eprint = {2211.05327}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-05327.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bspc/LinQLZZM21, author = {Zhiqiang Lin and Taorong Qiu and Ping Liu and Lingyun Zhang and Siwei Zhang and Zhendong Mu}, title = {Fatigue driving recognition based on deep learning and graph neural network}, journal = {Biomed. Signal Process. Control.}, volume = {68}, pages = {102598}, year = {2021}, url = {https://doi.org/10.1016/j.bspc.2021.102598}, doi = {10.1016/J.BSPC.2021.102598}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bspc/LinQLZZM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pomacs/ZhangTYZL21, author = {Yue Zhang and Bayan Turkistani and Allen Yuqing Yang and Chaoshun Zuo and Zhiqiang Lin}, title = {A Measurement Study of Wechat Mini-Apps}, journal = {Proc. {ACM} Meas. Anal. Comput. Syst.}, volume = {5}, number = {2}, pages = {14:1--14:25}, year = {2021}, url = {https://doi.org/10.1145/3460081}, doi = {10.1145/3460081}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pomacs/ZhangTYZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangWL21, author = {Kaiqing Huang and Xueli Wang and Zhiqiang Lin}, title = {Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {8872699:1--8872699:22}, year = {2021}, url = {https://doi.org/10.1155/2021/8872699}, doi = {10.1155/2021/8872699}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiZL21, author = {Mengyuan Li and Yinqian Zhang and Zhiqiang Lin}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {CrossLine: Breaking "Security-by-Crash" based Memory Isolation in {AMD} {SEV}}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2937--2950}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485253}, doi = {10.1145/3460120.3485253}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/WangCCZL21, author = {Wubing Wang and Guoxing Chen and Yueqiang Cheng and Yinqian Zhang and Zhiqiang Lin}, editor = {Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves}, title = {Specularizer : Detecting Speculative Execution Attacks via Performance Tracing}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, {DIMVA} 2021, Virtual Event, July 14-16, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12756}, pages = {151--172}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80825-9\_8}, doi = {10.1007/978-3-030-80825-9\_8}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/WangCCZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/BiPL21, author = {Yechuan Bi and Jianshan Peng and Zhiqiang Lin}, title = {Data flow sensitive driver vulnerability mining method}, booktitle = {{EITCE} 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22 - 24, 2021}, pages = {1263--1268}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3501409.3501631}, doi = {10.1145/3501409.3501631}, timestamp = {Fri, 04 Aug 2023 10:50:51 +0200}, biburl = {https://dblp.org/rec/conf/eitce/BiPL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccse/XuMLXCL21, author = {Ronghua Xu and Hefeng Meng and Zhiqiang Lin and Yonghui Xu and Lizhen Cui and Jun Lin}, title = {Credit Default Prediction via Explainable Ensemble Learning}, booktitle = {{ICCSE} '21: 5th International Conference on Crowd Science and Engineering, Jinan, China, October 16 - 18, 2021}, pages = {81--87}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3503181.3503195}, doi = {10.1145/3503181.3503195}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccse/XuMLXCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccse/ZhangYMLXC21, author = {Jiancheng Zhang and Xiao Yang and Hefeng Meng and Zhiqiang Lin and Yonghui Xu and Lizhen Cui}, title = {A Survey on Knowledge Enhanced {EHR} Data Mining}, booktitle = {{ICCSE} '21: 5th International Conference on Crowd Science and Engineering, Jinan, China, October 16 - 18, 2021}, pages = {124--131}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3503181.3503202}, doi = {10.1145/3503181.3503202}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccse/ZhangYMLXC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccse/MengLYXC21, author = {Hefeng Meng and Zhiqiang Lin and Fan Yang and Yonghui Xu and Lizhen Cui}, title = {Knowledge Distillation In Medical Data Mining: {A} Survey}, booktitle = {{ICCSE} '21: 5th International Conference on Crowd Science and Engineering, Jinan, China, October 16 - 18, 2021}, pages = {175--182}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3503181.3503211}, doi = {10.1145/3503181.3503211}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccse/MengLYXC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icct/LiSZL21, author = {Xiaowei Li and Hui Shu and Yi Zhai and Zhiqiang Lin}, title = {A Method for Resume Information Extraction Using BERT-BiLSTM-CRF}, booktitle = {21st International Conference on Communication Technology, {ICCT} 2021, Tianjin, China, October 13-16, 2021}, pages = {1437--1442}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCT52962.2021.9657937}, doi = {10.1109/ICCT52962.2021.9657937}, timestamp = {Tue, 11 Jan 2022 10:02:53 +0100}, biburl = {https://dblp.org/rec/conf/icct/LiSZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/Lin21, author = {Zhiqiang Lin}, title = {Keynote: Uncovering Vulnerabilities in Bluetooth Devices with Automated Binary Analysis}, booktitle = {19th {IEEE} International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2021, Kassel, Germany, March 22-26, 2021}, pages = {545}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PerComWorkshops51409.2021.9430937}, doi = {10.1109/PERCOMWORKSHOPS51409.2021.9430937}, timestamp = {Wed, 02 Jun 2021 11:59:28 +0200}, biburl = {https://dblp.org/rec/conf/percom/Lin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MunteanVLTG021, author = {Paul Muntean and Richard Viehoever and Zhiqiang Lin and Gang Tan and Jens Grossklags and Claudia Eckert}, editor = {Leyla Bilge and Tudor Dumitras}, title = {iTOP: Automating Counterfeit Object-Oriented Programming Attacks}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {162--176}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471847}, doi = {10.1145/3471621.3471847}, timestamp = {Fri, 08 Oct 2021 09:46:25 +0200}, biburl = {https://dblp.org/rec/conf/raid/MunteanVLTG021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/0025TYZL21, author = {Yue Zhang and Bayan Turkistani and Allen Yuqing Yang and Chaoshun Zuo and Zhiqiang Lin}, editor = {Longbo Huang and Anshul Gandhi and Negar Kiyavash and Jia Wang}, title = {A Measurement Study of Wechat Mini-Apps}, booktitle = {{SIGMETRICS} '21: {ACM} {SIGMETRICS} / International Conference on Measurement and Modeling of Computer Systems, Virtual Event, China, June 14-18, 2021}, pages = {19--20}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3410220.3460106}, doi = {10.1145/3410220.3460106}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/0025TYZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JangidCZL21, author = {Mohit Kumar Jangid and Guoxing Chen and Yinqian Zhang and Zhiqiang Lin}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Towards Formal Verification of State Continuity for Enclave Programs}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {573--590}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/jangid}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/JangidCZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenLZ21, author = {Sanchuan Chen and Zhiqiang Lin and Yinqian Zhang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1665--1682}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-sanchuan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiCLWC21, author = {Xing Li and Yan Chen and Zhiqiang Lin and Xiao Wang and Jim Hao Chen}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Automatic Policy Generation for Inter-Service Access Control of Microservices}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3971--3988}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-xing}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiCLWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiaccs/2021, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210}, doi = {10.1145/3433210}, isbn = {978-1-4503-8287-8}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-11171, author = {Cheng Zhang and Yunze Pan and Yunqi Zhang and Adam C. Champion and Zhaohui Shen and Dong Xuan and Zhiqiang Lin and Ness B. Shroff}, title = {WLAN-Log-Based Superspreader Detection in the {COVID-19} Pandemic}, journal = {CoRR}, volume = {abs/2102.11171}, year = {2021}, url = {https://arxiv.org/abs/2102.11171}, eprinttype = {arXiv}, eprint = {2102.11171}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-11171.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RenZGL20, author = {Yan Ren and Qiuxia Zhao and Haipeng Guan and Zhiqiang Lin}, title = {On Design of Single-Layer and Multilayer Code-Based Linkable Ring Signatures}, journal = {{IEEE} Access}, volume = {8}, pages = {17854--17862}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2967789}, doi = {10.1109/ACCESS.2020.2967789}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/RenZGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiCXLZ20, author = {Qiaoyang Li and Guiming Chen and Lingliang Xu and Zhiqiang Lin and Liyao Zhou}, title = {An Improved Model for Effectiveness Evaluation of Missile Electromagnetic Launch System}, journal = {{IEEE} Access}, volume = {8}, pages = {156615--156633}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3018447}, doi = {10.1109/ACCESS.2020.3018447}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiCXLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/RenZGL20, author = {Yan Ren and Qiuxia Zhao and Haipeng Guan and Zhiqiang Lin}, title = {A novel authentication scheme based on edge computing for blockchain-based distributed energy trading system}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2020}, number = {1}, pages = {152}, year = {2020}, url = {https://doi.org/10.1186/s13638-020-01762-w}, doi = {10.1186/S13638-020-01762-W}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/RenZGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ZhangQLZB20, author = {Lingyun Zhang and Taorong Qiu and Zhiqiang Lin and Shuli Zou and Xiaoming Bai}, title = {Construction and Application of Functional Brain Network Based on Entropy}, journal = {Entropy}, volume = {22}, number = {11}, pages = {1234}, year = {2020}, url = {https://doi.org/10.3390/e22111234}, doi = {10.3390/E22111234}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/ZhangQLZB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ChenCXZLL20, author = {Guoxing Chen and Sanchuan Chen and Yuan Xiao and Yinqian Zhang and Zhiqiang Lin and Ten{-}Hwang Lai}, title = {SgxPectre: Stealing Intel Secrets From {SGX} Enclaves via Speculative Execution}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {3}, pages = {28--37}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2019.2963021}, doi = {10.1109/MSEC.2019.2963021}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ChenCXZLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/ChenTL20, author = {Qi Chen and Chunming Tang and Zhiqiang Lin}, title = {Compartmented Secret Sharing Schemes and Locally Repairable Codes}, journal = {{IEEE} Trans. Commun.}, volume = {68}, number = {10}, pages = {5976--5987}, year = {2020}, url = {https://doi.org/10.1109/TCOMM.2020.3005430}, doi = {10.1109/TCOMM.2020.3005430}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcom/ChenTL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MunteanNLTG020, author = {Paul Muntean and Matthias Neumayer and Zhiqiang Lin and Gang Tan and Jens Grossklags and Claudia Eckert}, title = {{\(\rho\)}FEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {466--479}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427246}, doi = {10.1145/3427228.3427246}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MunteanNLTG020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bsci/RenZGL20, author = {Yan Ren and Qiuxia Zhao and Haipeng Guan and Zhiqiang Lin}, editor = {Keke Gai and Kim{-}Kwang Raymond Choo and Jiamou Liu}, title = {On Design of Blockchain-based Transport Scheme}, booktitle = {{BSCI} '20: Proceedings of the 2nd {ACM} International Symposium on Blockchain and Secure Critical Infrastructure, co-located with AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {214--215}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384943.3409444}, doi = {10.1145/3384943.3409444}, timestamp = {Wed, 21 Oct 2020 12:23:01 +0200}, biburl = {https://dblp.org/rec/conf/bsci/RenZGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WenLZ20, author = {Haohuang Wen and Zhiqiang Lin and Yinqian Zhang}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {167--180}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423344}, doi = {10.1145/3372297.3423344}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WenLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WenZCL20, author = {Haohuang Wen and Qingchuan Zhao and Qi Alfred Chen and Zhiqiang Lin}, title = {Automated Cross-Platform Reverse Engineering of {CAN} Bus Commands From Mobile Apps}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/automated-cross-platform-reverse-engineering-of-can-bus-commands-from-mobile-apps/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WenZCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhaoWLXS20, author = {Qingchuan Zhao and Haohuang Wen and Zhiqiang Lin and Dong Xuan and Ness B. Shroff}, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps}, booktitle = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {335}, pages = {49--60}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63086-7\_4}, doi = {10.1007/978-3-030-63086-7\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZhaoWLXS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/HanLP20, author = {Jaehyun Han and Zhiqiang Lin and Donald E. Porter}, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {On the Effectiveness of Behavior-Based Ransomware Detection}, booktitle = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {336}, pages = {120--140}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63095-9\_7}, doi = {10.1007/978-3-030-63095-9\_7}, timestamp = {Tue, 15 Dec 2020 15:30:59 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/HanLP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WenZLXS20, author = {Haohuang Wen and Qingchuan Zhao and Zhiqiang Lin and Dong Xuan and Ness B. Shroff}, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {A Study of the Privacy of {COVID-19} Contact Tracing Apps}, booktitle = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {335}, pages = {297--317}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63086-7\_17}, doi = {10.1007/978-3-030-63086-7\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/WenZLXS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhaoZDPL20, author = {Qingchuan Zhao and Chaoshun Zuo and Brendan Dolan{-}Gavitt and Giancarlo Pellegrino and Zhiqiang Lin}, title = {Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1106--1120}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00072}, doi = {10.1109/SP40000.2020.00072}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhaoZDPL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/KunduLH20, author = {Ashish Kundu and Zhiqiang Lin and Joshua Hammond}, title = {Energy Attacks on Mobile Devices}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {107--117}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00024}, doi = {10.1109/TPS-ISA50397.2020.00024}, timestamp = {Tue, 26 Jan 2021 14:00:08 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/KunduLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/00250DJLF20, author = {Yue Zhang and Jian Weng and Rajib Dey and Yier Jin and Zhiqiang Lin and Xinwen Fu}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {37--54}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-yue}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/00250DJLF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/QuinonezGSBCL20, author = {Raul Quinonez and Jairo Giraldo and Luis E. Salazar and Erick Bauman and Alvaro A. C{\'{a}}rdenas and Zhiqiang Lin}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{SAVIOR:} Securing Autonomous Vehicles with Robust Physical Invariants}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {895--912}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/quinonez}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/QuinonezGSBCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WenCL20, author = {Haohuang Wen and Qi Alfred Chen and Zhiqiang Lin}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Plug-N-Pwned: Comprehensive Vulnerability Analysis of {OBD-II} Dongles as {A} New Over-the-Air Attack Surface in Automotive IoT}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {949--965}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/wen}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WenCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Elsabagh0SZZL20, author = {Mohamed Elsabagh and Ryan Johnson and Angelos Stavrou and Chaoshun Zuo and Qingchuan Zhao and Zhiqiang Lin}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{FIRMSCOPE:} Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2379--2396}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/elsabagh}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Elsabagh0SZZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangZZL20, author = {Mengya Zhang and Xiaokuan Zhang and Yinqian Zhang and Zhiqiang Lin}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{TXSPECTOR:} Uncovering Attacks in Ethereum from Transactions}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2775--2792}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-mengya}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangZZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-13362, author = {Yuxiang Luo and Cheng Zhang and Yunqi Zhang and Chaoshun Zuo and Dong Xuan and Zhiqiang Lin and Adam C. Champion and Ness B. Shroff}, title = {{ACOUSTIC-TURF:} Acoustic-based Privacy-Preserving {COVID-19} Contact Tracing}, journal = {CoRR}, volume = {abs/2006.13362}, year = {2020}, url = {https://arxiv.org/abs/2006.13362}, eprinttype = {arXiv}, eprint = {2006.13362}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-13362.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-00146, author = {Mengyuan Li and Yinqian Zhang and Zhiqiang Lin}, title = {{CROSSLINE:} Breaking "Security-by-Crash" based Memory Isolation in {AMD} {SEV}}, journal = {CoRR}, volume = {abs/2008.00146}, year = {2020}, url = {https://arxiv.org/abs/2008.00146}, eprinttype = {arXiv}, eprint = {2008.00146}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-00146.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DuLZCX19, author = {Heng Du and Zhiqiang Lin and Yuan Zhang and Hui Chen and Zhimin Xu}, title = {Improved Migration Genetic Algorithm Optimization for Variable-Speed Falling Trajectory of Mobile Crossbeam in Composite Hydraulic Press With Pressure Shock}, journal = {{IEEE} Access}, volume = {7}, pages = {39459--39473}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2905849}, doi = {10.1109/ACCESS.2019.2905849}, timestamp = {Thu, 14 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/DuLZCX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LinLWML19, author = {Zhiqiang Lin and Shimin Lin and Sen Wu and Ge Ma and Zhongwei Liang}, title = {Vibration Control of a Flexible Spacecraft System With Input Backlash}, journal = {{IEEE} Access}, volume = {7}, pages = {87017--87026}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2926516}, doi = {10.1109/ACCESS.2019.2926516}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LinLWML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LinLHZL19, author = {Zhiqiang Lin and Shimin Lin and Meihua Huang and Jianing Zhang and Zhongwei Liang}, title = {Vibration Control for Two Kinds of Flexible Mechanical Systems With Full State Output Constraints}, journal = {{IEEE} Access}, volume = {7}, pages = {120734--120743}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2933914}, doi = {10.1109/ACCESS.2019.2933914}, timestamp = {Sat, 12 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LinLHZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenTL19, author = {Qi Chen and Chunming Tang and Zhiqiang Lin}, title = {Efficient explicit constructions of compartmented secret sharing schemes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2913--2940}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00657-2}, doi = {10.1007/S10623-019-00657-2}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ChenTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuWYL19, author = {Jingang Liu and Yongge Wang and Zongxiang Yi and Zhiqiang Lin}, title = {polarRLCE: {A} New Code-Based Cryptosystem Using Polar Codes}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3086975:1--3086975:10}, year = {2019}, url = {https://doi.org/10.1155/2019/3086975}, doi = {10.1155/2019/3086975}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuWYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MunteanNLTG019, author = {Paul Muntean and Matthias Neumayer and Zhiqiang Lin and Gang Tan and Jens Grossklags and Claudia Eckert}, editor = {David Balenson}, title = {Analyzing control flow integrity with {LLVM-CFI}}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {584--597}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359806}, doi = {10.1145/3359789.3359806}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MunteanNLTG019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChenTL19, author = {Qi Chen and Chunming Tang and Zhiqiang Lin}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Efficient Explicit Constructions of Multipartite Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, pages = {505--536}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8\_18}, doi = {10.1007/978-3-030-34621-8\_18}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChenTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangBKLCZ19, author = {Huibo Wang and Erick Bauman and Vishal Karande and Zhiqiang Lin and Yueqiang Cheng and Yinqian Zhang}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Running Language Interpreters Inside {SGX:} {A} Lightweight, Legacy-Compatible Script Code Hardening Approach}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {114--121}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329848}, doi = {10.1145/3321705.3329848}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangBKLCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZuoWLZ19, author = {Chaoshun Zuo and Haohuang Wen and Zhiqiang Lin and Yinqian Zhang}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Automatic Fingerprinting of Vulnerable {BLE} IoT Devices with Static UUIDs from Mobile Apps}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1469--1483}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354240}, doi = {10.1145/3319535.3354240}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZuoWLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangWDSJDLZWL19, author = {Huibo Wang and Pei Wang and Yu Ding and Mingshen Sun and Yiming Jing and Ran Duan and Long Li and Yulong Zhang and Tao Wei and Zhiqiang Lin}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Towards Memory Safe Enclave Programming with Rust-SGX}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2333--2350}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354241}, doi = {10.1145/3319535.3354241}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangWDSJDLZWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dpta/LiuLLLS19, author = {Yuzhong Liu and Zhiqiang Lin and Li Li and Hualiang Li and Yali Shen}, editor = {Chuanchao Huang and Yu{-}Wei Chan and Neil Y. Yen}, title = {Effects of Extremely Low Frequency Electromagnetic Fields Exposure in an Informationalized Perspective}, booktitle = {Data Processing Techniques and Applications for Cyber-Physical Systems, {DPTA} 2019, Shanghai, China, November 15-16, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {1088}, pages = {1191--1201}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-1468-5\_140}, doi = {10.1007/978-981-15-1468-5\_140}, timestamp = {Tue, 11 Feb 2020 13:32:03 +0100}, biburl = {https://dblp.org/rec/conf/dpta/LiuLLLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ChenZDDZSLZZ19, author = {Jiongyi Chen and Chaoshun Zuo and Wenrui Diao and Shuaike Dong and Qingchuan Zhao and Menghan Sun and Zhiqiang Lin and Yinqian Zhang and Kehuan Zhang}, title = {Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users}, booktitle = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019}, pages = {222--233}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSN.2019.00034}, doi = {10.1109/DSN.2019.00034}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ChenZDDZSLZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ChenCXZLL19, author = {Guoxing Chen and Sanchuan Chen and Yuan Xiao and Yinqian Zhang and Zhiqiang Lin and Ten{-}Hwang Lai}, title = {SgxPectre: Stealing Intel Secrets from {SGX} Enclaves Via Speculative Execution}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {142--157}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00020}, doi = {10.1109/EUROSP.2019.00020}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ChenCXZLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/MillerKSZZL19, author = {Kenneth A. Miller and Yonghwi Kwon and Yi Sun and Zhuo Zhang and Xiangyu Zhang and Zhiqiang Lin}, editor = {Joanne M. Atlee and Tevfik Bultan and Jon Whittle}, title = {Probabilistic disassembly}, booktitle = {Proceedings of the 41st International Conference on Software Engineering, {ICSE} 2019, Montreal, QC, Canada, May 25-31, 2019}, pages = {1187--1198}, publisher = {{IEEE} / {ACM}}, year = {2019}, url = {https://doi.org/10.1109/ICSE.2019.00121}, doi = {10.1109/ICSE.2019.00121}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/MillerKSZZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhaoZPL19, author = {Qingchuan Zhao and Chaoshun Zuo and Giancarlo Pellegrino and Zhiqiang Lin}, title = {Geo-locating Drivers: {A} Study of Sensitive Data Leakage in Ride-Hailing Services}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/geo-locating-drivers-a-study-of-sensitive-data-leakage-in-ride-hailing-services/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhaoZPL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangZL19, author = {Wubing Wang and Yinqian Zhang and Zhiqiang Lin}, title = {Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {443--457}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/wang-wubing}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/WangZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/LiCL19, author = {Xing Li and Yan Chen and Zhiqiang Lin}, title = {Towards Automated Inter-Service Authorization for Microservice Applications}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2019 Conference Posters and Demos, {SIGCOMM} 2019, Beijing, China, August 19-23, 2019}, pages = {3--5}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3342280.3342288}, doi = {10.1145/3342280.3342288}, timestamp = {Thu, 15 Aug 2019 09:02:14 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/LiCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZuoLZ19, author = {Chaoshun Zuo and Zhiqiang Lin and Yinqian Zhang}, title = {Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1296--1310}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00009}, doi = {10.1109/SP.2019.00009}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZuoLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlrawiZDKLS19, author = {Omar Alrawi and Chaoshun Zuo and Ruian Duan and Ranjita Pai Kasturi and Zhiqiang Lin and Brendan Saltaformaggio}, editor = {Nadia Heninger and Patrick Traynor}, title = {The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {551--566}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/alrawi}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/AlrawiZDKLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiZLS19, author = {Mengyuan Li and Yinqian Zhang and Zhiqiang Lin and Yan Solihin}, editor = {Nadia Heninger and Patrick Traynor}, title = {Exploiting Unprotected {I/O} Operations in AMD's Secure Encrypted Virtualization}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1257--1272}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/li-mengyuan}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LiZLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XuGWHL19, author = {Xiaoyang Xu and Masoud Ghaffarinia and Wenhao Wang and Kevin W. Hamlen and Zhiqiang Lin}, editor = {Nadia Heninger and Patrick Traynor}, title = {{CONFIRM:} Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1805--1821}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/xu-xiaoyang}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/XuGWHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2019, editor = {Zhiqiang Lin and Charalampos Papamanthou and Michalis Polychronakis}, title = {Information Security - 22nd International Conference, {ISC} 2019, New York City, NY, USA, September 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11723}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30215-3}, doi = {10.1007/978-3-030-30215-3}, isbn = {978-3-030-30214-6}, timestamp = {Mon, 02 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-10497, author = {Yue Zhang and Jian Weng and Rajib Dey and Yier Jin and Zhiqiang Lin and Xinwen Fu}, title = {On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode}, journal = {CoRR}, volume = {abs/1908.10497}, year = {2019}, url = {http://arxiv.org/abs/1908.10497}, eprinttype = {arXiv}, eprint = {1908.10497}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-10497.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-01485, author = {Paul Muntean and Matthias Neumayer and Zhiqiang Lin and Gang Tan and Jens Grossklags and Claudia Eckert}, title = {Analyzing Control Flow Integrity with {LLVM-CFI}}, journal = {CoRR}, volume = {abs/1910.01485}, year = {2019}, url = {http://arxiv.org/abs/1910.01485}, eprinttype = {arXiv}, eprint = {1910.01485}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-01485.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenTL19, author = {Qi Chen and Chunming Tang and Zhiqiang Lin}, title = {Efficient Explicit Constructions of Multipartite Secret Sharing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1100}, year = {2019}, url = {https://eprint.iacr.org/2019/1100}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShiLHYC18, author = {Haobin Shi and Zhiqiang Lin and Kao{-}Shing Hwang and Shike Yang and Jialin Chen}, title = {An Adaptive Strategy Selection Method With Reinforcement Learning for Robotic Soccer Games}, journal = {{IEEE} Access}, volume = {6}, pages = {8376--8386}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2808266}, doi = {10.1109/ACCESS.2018.2808266}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShiLHYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YiLK18, author = {Zongxiang Yi and Zhiqiang Lin and Lishan Ke}, title = {A generic method to construct zero-difference balanced functions}, journal = {Cryptogr. Commun.}, volume = {10}, number = {4}, pages = {591--609}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0247-4}, doi = {10.1007/S12095-017-0247-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/YiLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LinPLZ18, author = {Zhiqiang Lin and Dingyi Pei and Dongdai Lin and Xiaolei Zhang}, title = {Fast construction of binary ring FCSRs for hardware stream ciphers}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {939--953}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0370-4}, doi = {10.1007/S10623-017-0370-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LinPLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/YangLGCL18, author = {Hang Yang and Peng Li and Xiaobin Guo and Huajun Chen and Zhiqiang Lin}, title = {A review: The effects of imperfect data on incremental decision tree}, journal = {Int. J. Inf. Commun. Technol.}, volume = {12}, number = {1/2}, pages = {162--174}, year = {2018}, url = {https://doi.org/10.1504/IJICT.2018.10008905}, doi = {10.1504/IJICT.2018.10008905}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/YangLGCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShiLZLH18, author = {Haobin Shi and Zhiqiang Lin and Shuge Zhang and Xuesi Li and Kao{-}Shing Hwang}, title = {An adaptive decision-making method with fuzzy Bayesian reinforcement learning for robot soccer}, journal = {Inf. Sci.}, volume = {436-437}, pages = {268--281}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.01.032}, doi = {10.1016/J.INS.2018.01.032}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ShiLZLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/VeneziaHYZZLG18, author = {Vincent C. Venezia and Alan Chih{-}Wei Hsiung and Wu{-}Zang Yang and Yuying Zhang and Cheng Zhao and Zhiqiang Lin and Lindsay A. Grant}, title = {Second Generation Small Pixel Technology Using Hybrid Bond Stacking}, journal = {Sensors}, volume = {18}, number = {2}, pages = {667}, year = {2018}, url = {https://doi.org/10.3390/s18020667}, doi = {10.3390/S18020667}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/VeneziaHYZZLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuZLZL18, author = {Bo Lu and Xiaokuan Zhang and Ziman Ling and Yinqian Zhang and Zhiqiang Lin}, title = {A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {89--100}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274714}, doi = {10.1145/3274694.3274714}, timestamp = {Wed, 05 Dec 2018 09:44:25 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LuZLZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/ZhangYL18, author = {Chao Zhang and Weiliang Yin and Zhiqiang Lin}, editor = {Horst Lichter and Thanwadee Sunetnanta and Toni Anwar and Taratip Suwannasart}, title = {Boost Symbolic Execution Using Dynamic State Merging and Forking}, booktitle = {Proceedings of the 6th International Workshop on Quantitative Approaches to Software Quality co-located with 25th Asia-Pacific Software Engineering Conference {(APSEC} 2018), Nara, Japan, December 4, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2273}, pages = {14--21}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2273/QuASoQ-02.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:12 +0100}, biburl = {https://dblp.org/rec/conf/apsec/ZhangYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarandeCLCKH18, author = {Vishal Karande and Swarup Chandra and Zhiqiang Lin and Juan Caballero and Latifur Khan and Kevin W. Hamlen}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{BCD:} Decomposing Binary Code Into Components Using Graph-Based Clustering}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {393--398}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196504}, doi = {10.1145/3196494.3196504}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KarandeCLCKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiLCZG18, author = {Juanru Li and Zhiqiang Lin and Juan Caballero and Yuanyuan Zhang and Dawu Gu}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {412--425}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243783}, doi = {10.1145/3243734.3243783}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiLCZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgo/BaumanWZL18, author = {Erick Bauman and Huibo Wang and Mingwei Zhang and Zhiqiang Lin}, editor = {Jens Knoop and Markus Schordan and Teresa Johnson and Michael F. P. O'Boyle}, title = {SGXElide: enabling enclave code secrecy via self-modification}, booktitle = {Proceedings of the 2018 International Symposium on Code Generation and Optimization, {CGO} 2018, V{\"{o}}sendorf / Vienna, Austria, February 24-28, 2018}, pages = {75--86}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3168833}, doi = {10.1145/3168833}, timestamp = {Fri, 06 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cgo/BaumanWZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/ChenTL18, author = {Qi Chen and Chunming Tang and Zhiqiang Lin}, title = {Locally Repairable Codes with Heterogeneous Locality Constraints}, booktitle = {{IEEE} Information Theory Workshop, {ITW} 2018, Guangzhou, China, November 25-29, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ITW.2018.8613318}, doi = {10.1109/ITW.2018.8613318}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itw/ChenTL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BaumanLH18, author = {Erick Bauman and Zhiqiang Lin and Kevin W. Hamlen}, title = {Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_05A-4\_Bauman\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BaumanLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChenDZZL0LSYZ18, author = {Jiongyi Chen and Wenrui Diao and Qingchuan Zhao and Chaoshun Zuo and Zhiqiang Lin and XiaoFeng Wang and Wing Cheong Lau and Menghan Sun and Ronghai Yang and Kehuan Zhang}, title = {IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_01A-1\_Chen\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ChenDZZL0LSYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MunteanFTLGE18, author = {Paul Muntean and Matthias Fischer and Gang Tan and Zhiqiang Lin and Jens Grossklags and Claudia Eckert}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {{\(\tau\)}CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {423--444}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_20}, doi = {10.1007/978-3-030-00470-5\_20}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/MunteanFTLGE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/WuLLT18, author = {Jiaxi Wu and Xiaotong Lin and Zhiqiang Lin and Yi Tang}, editor = {Feng Liu and Shouhuai Xu and Moti Yung}, title = {A Security Concern About Deep Learning Models}, booktitle = {Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11287}, pages = {199--206}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03026-1\_15}, doi = {10.1007/978-3-030-03026-1\_15}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/WuLLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/BhattAL18, author = {Manish Bhatt and Irfan Ahmed and Zhiqiang Lin}, editor = {Tiffany Barnes and Daniel D. Garcia and Elizabeth K. Hawthorne and Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones}, title = {Using Virtual Machine Introspection for Operating Systems Security Education}, booktitle = {Proceedings of the 49th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2018, Baltimore, MD, USA, February 21-24, 2018}, pages = {396--401}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3159450.3159606}, doi = {10.1145/3159450.3159606}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/BhattAL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SilvestroLLLL18, author = {Sam Silvestro and Hongyu Liu and Tianyi Liu and Zhiqiang Lin and Tongping Liu}, editor = {William Enck and Adrienne Porter Felt}, title = {Guarder: {A} Tunable Secure Allocator}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {117--133}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/silvestro}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SilvestroLLLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TuLLH18, author = {Yazhou Tu and Zhiqiang Lin and Insup Lee and Xiali Hei}, editor = {William Enck and Adrienne Porter Felt}, title = {Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1545--1562}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/tu}, timestamp = {Wed, 09 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TuLLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-09085, author = {Guoxing Chen and Sanchuan Chen and Yuan Xiao and Yinqian Zhang and Zhiqiang Lin and Ten{-}Hwang Lai}, title = {SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution}, journal = {CoRR}, volume = {abs/1802.09085}, year = {2018}, url = {http://arxiv.org/abs/1802.09085}, eprinttype = {arXiv}, eprint = {1802.09085}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-09085.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-07558, author = {Yazhou Tu and Zhiqiang Lin and Insup Lee and Xiali Hei}, title = {Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors}, journal = {CoRR}, volume = {abs/1806.07558}, year = {2018}, url = {http://arxiv.org/abs/1806.07558}, eprinttype = {arXiv}, eprint = {1806.07558}, timestamp = {Wed, 09 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-07558.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LinLP17, author = {Zhiqiang Lin and Dongdai Lin and Dingyi Pei}, title = {Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications}, journal = {Cryptogr. Commun.}, volume = {9}, number = {4}, pages = {431--443}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0183-8}, doi = {10.1007/S12095-016-0183-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LinLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YuKLW17, author = {Yuyin Yu and Lishan Ke and Zhiqiang Lin and Qiuyan Wang}, title = {Permutation Polynomials over Z\emph{\({}_{\mbox{p\({}^{\mbox{n}}\)}}\)} and Their Randomness}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {3}, pages = {913--915}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.913}, doi = {10.1587/TRANSFUN.E100.A.913}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YuKLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsys/GuHKLP17, author = {Guofei Gu and Hongxin Hu and Eric Keller and Zhiqiang Lin and Donald E. Porter}, title = {Building a Security {OS} With Software Defined Infrastructure}, booktitle = {Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017}, pages = {4:1--4:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3124680.3124720}, doi = {10.1145/3124680.3124720}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsys/GuHKLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarandeBLK17, author = {Vishal Karande and Erick Bauman and Zhiqiang Lin and Latifur Khan}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {SGX-Log: Securing System Logs With {SGX}}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {19--30}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053034}, doi = {10.1145/3052973.3053034}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KarandeBLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZuoZL17, author = {Chaoshun Zuo and Qingchuan Zhao and Zhiqiang Lin}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{AUTHSCOPE:} Towards Automatic Discovery of Vulnerable Authorizations in Online Services}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {799--813}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134089}, doi = {10.1145/3133956.3134089}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZuoZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShaonKLK17, author = {Fahad Shaon and Murat Kantarcioglu and Zhiqiang Lin and Latifur Khan}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {SGX-BigMatrix: {A} Practical Encrypted Data Analytic Framework With Trusted Processors}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1211--1228}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134095}, doi = {10.1145/3133956.3134095}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShaonKLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SilvestroLCLL17, author = {Sam Silvestro and Hongyu Liu and Corey Crosser and Zhiqiang Lin and Tongping Liu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {FreeGuard: {A} Faster Secure Heap Allocator}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2389--2403}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133957}, doi = {10.1145/3133956.3133957}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SilvestroLCLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimLT17, author = {Taesoo Kim and Zhiqiang Lin and Chia{-}che Tsai}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {CCS'17 Tutorial Abstract / {SGX} Security and Privacy}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2613--2614}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3136068}, doi = {10.1145/3133956.3136068}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GuZZL17, author = {Yufei Gu and Qingchuan Zhao and Yinqian Zhang and Zhiqiang Lin}, editor = {Gail{-}Joon Ahn and Alexander Pretschner and Gabriel Ghinita}, title = {{PT-CFI:} Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace}, booktitle = {Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017}, pages = {173--184}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3029806.3029830}, doi = {10.1145/3029806.3029830}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GuZZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChandraKLKKT17, author = {Swarup Chandra and Vishal Karande and Zhiqiang Lin and Latifur Khan and Murat Kantarcioglu and Bhavani Thuraisingham}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Securing Data Analytics on {SGX} with Randomization}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10492}, pages = {352--369}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66402-6\_21}, doi = {10.1007/978-3-319-66402-6\_21}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChandraKLKKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FuBQL17, author = {Yangchun Fu and Erick Bauman and Raul Quinonez and Zhiqiang Lin}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {357--380}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_16}, doi = {10.1007/978-3-319-66332-6\_16}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/FuBQL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ZuoL17, author = {Chaoshun Zuo and Zhiqiang Lin}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {{SMARTGEN:} Exposing Server URLs of Mobile Apps With Selective Symbolic Execution}, booktitle = {Proceedings of the 26th International Conference on World Wide Web, {WWW} 2017, Perth, Australia, April 3-7, 2017}, pages = {867--876}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3038912.3052609}, doi = {10.1145/3038912.3052609}, timestamp = {Tue, 06 Nov 2018 16:57:07 +0100}, biburl = {https://dblp.org/rec/conf/www/ZuoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KunduLH17, author = {Ashish Kundu and Zhiqiang Lin and Joshua Hammond}, title = {Energy Attacks on Mobile Devices}, journal = {CoRR}, volume = {abs/1704.04464}, year = {2017}, url = {http://arxiv.org/abs/1704.04464}, eprinttype = {arXiv}, eprint = {1704.04464}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KunduLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-02746, author = {Sam Silvestro and Hongyu Liu and Corey Crosser and Zhiqiang Lin and Tongping Liu}, title = {FreeGuard: {A} Faster Secure Heap Allocator}, journal = {CoRR}, volume = {abs/1709.02746}, year = {2017}, url = {http://arxiv.org/abs/1709.02746}, eprinttype = {arXiv}, eprint = {1709.02746}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-02746.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/CaballeroL16, author = {Juan Caballero and Zhiqiang Lin}, title = {Type Inference on Executables}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {65:1--65:35}, year = {2016}, url = {https://doi.org/10.1145/2896499}, doi = {10.1145/2896499}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/CaballeroL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Al-NaamiCMKLHT16, author = {Khaled Al{-}Naami and Swarup Chandra and Ahmad M. Mustafa and Latifur Khan and Zhiqiang Lin and Kevin W. Hamlen and Bhavani Thuraisingham}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Adaptive encrypted traffic fingerprinting with bi-directional dependence}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {177--188}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991123}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Al-NaamiCMKLHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GuL16, author = {Yufei Gu and Zhiqiang Lin}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {Derandomizing Kernel Address Space Layout for Memory Introspection and Forensics}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {62--72}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2857705.2857707}, doi = {10.1145/2857705.2857707}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/GuL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icinfa/YangSYL16, author = {Xinyi Yang and Haobin Shi and Shike Yang and Zhiqiang Lin}, title = {Load balancing scheduling algorithm for storage system based on state acquisition and dynamic feedback}, booktitle = {{IEEE} International Conference on Information and Automation, {ICIA} 2016, Ningbo, China, August 1-3, 2016}, pages = {1737--1742}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICInfA.2016.7832098}, doi = {10.1109/ICINFA.2016.7832098}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/icinfa/YangSYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/BaumanL16, author = {Erick Bauman and Zhiqiang Lin}, title = {A Case for Protecting Computer Games With {SGX}}, booktitle = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788.3007792}, doi = {10.1145/3007788.3007792}, timestamp = {Tue, 06 Nov 2018 16:57:13 +0100}, biburl = {https://dblp.org/rec/conf/middleware/BaumanL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZuoWLW16, author = {Chaoshun Zuo and Wubing Wang and Zhiqiang Lin and Rui Wang}, title = {Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/automatic-forgery-cryptographically-consistent-messages-identify-security-vulnerabilities.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ZuoWLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZengFL16, author = {Junyuan Zeng and Yangchun Fu and Zhiqiang Lin}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Automatic Uncovering of Tap Points from Kernel Executions}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {49--70}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_3}, doi = {10.1007/978-3-319-45719-2\_3}, timestamp = {Fri, 27 Dec 2019 21:24:31 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZengFL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FuRLL0J16, author = {Yangchun Fu and Junghwan Rhee and Zhiqiang Lin and Zhichun Li and Hui Zhang and Guofei Jiang}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Detecting Stack Layout Corruptions with Robust Stack Unwinding}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {71--94}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_4}, doi = {10.1007/978-3-319-45719-2\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/FuRLL0J16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BaumanAL15, author = {Erick Bauman and Gbadebo Ayoade and Zhiqiang Lin}, title = {A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {10:1--10:33}, year = {2015}, url = {https://doi.org/10.1145/2775111}, doi = {10.1145/2775111}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/BaumanAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LinKLG15, author = {Zhiqiang Lin and Lishan Ke and Dongdai Lin and Jian Gao}, title = {On the LFSRization of a Class of {FCSR} Automata}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {1}, pages = {434--440}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.434}, doi = {10.1587/TRANSFUN.E98.A.434}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LinKLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/Lin15, author = {Zhiqiang Lin}, title = {On two circuit configurations of non-linear feedback shift registers}, journal = {Int. J. Inf. Commun. Technol.}, volume = {7}, number = {2/3}, pages = {185--201}, year = {2015}, url = {https://doi.org/10.1504/IJICT.2015.068378}, doi = {10.1504/IJICT.2015.068378}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/Lin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/LiuYLX15, author = {Zhusong Liu and Hongyang Yan and Zhiqiang Lin and Lingling Xu}, title = {An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure}, journal = {J. Univers. Comput. Sci.}, volume = {21}, number = {3}, pages = {454--472}, year = {2015}, url = {http://www.jucs.org/jucs\_21\_3/an\_improved\_cloud\_data}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/LiuYLX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PrakashVYL15, author = {Aravind Prakash and Eknath Venkataramani and Heng Yin and Zhiqiang Lin}, title = {On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {557--570}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2366464}, doi = {10.1109/TDSC.2014.2366464}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/PrakashVYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PeiLZ15, author = {Dingyi Pei and Zhiqiang Lin and Xiaolei Zhang}, title = {Construction of Transition Matrices for Ternary Ring Feedback With Carry Shift Registers}, journal = {{IEEE} Trans. Inf. Theory}, volume = {61}, number = {5}, pages = {2942--2951}, year = {2015}, url = {https://doi.org/10.1109/TIT.2015.2416712}, doi = {10.1109/TIT.2015.2416712}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/PeiLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/KimXLLRS15, author = {Seung{-}Hun Kim and Lei Xu and Ziyi Liu and Zhiqiang Lin and Won Woo Ro and Weidong Shi}, title = {Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization}, booktitle = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015}, pages = {251--262}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSN.2015.48}, doi = {10.1109/DSN.2015.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/KimXLLRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChenXLXML15, author = {Ping Chen and Jun Xu and Zhiqiang Lin and Dongyan Xu and Bing Mao and Peng Liu}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {A Practical Approach for Adaptive Data Structure Layout Randomization}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {69--89}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_4}, doi = {10.1007/978-3-319-24174-6\_4}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ChenXLXML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/BaumanLL15, author = {Erick Bauman and Yafeng Lu and Zhiqiang Lin}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Half a Century of Practice: Who Is Still Storing Plaintext Passwords?}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {253--267}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_18}, doi = {10.1007/978-3-319-17533-1\_18}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/ispec/BaumanLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZengL15, author = {Junyuan Zeng and Zhiqiang Lin}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Towards Automatic Inference of Kernel Object Semantics from Binary Code}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {538--561}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_25}, doi = {10.1007/978-3-319-26362-5\_25}, timestamp = {Sun, 25 Oct 2020 22:56:09 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZengL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/FuLB15, author = {Yangchun Fu and Zhiqiang Lin and David Brumley}, editor = {Elisabetta Di Nitto and Mark Harman and Patrick Heymans}, title = {Automatically deriving pointer reference expressions from binary code for memory dump analysis}, booktitle = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September 4, 2015}, pages = {614--624}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786805.2786810}, doi = {10.1145/2786805.2786810}, timestamp = {Tue, 06 Nov 2018 16:59:22 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/FuLB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenCBLZG15, author = {Jin Chen and Haibo Chen and Erick Bauman and Zhiqiang Lin and Binyu Zang and Haibing Guan}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile {IME} Apps}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {657--690}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/chen-jin}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChenCBLZG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vee/ZengFL15, author = {Junyuan Zeng and Yangchun Fu and Zhiqiang Lin}, editor = {Ada Gavrilovska and Angela Demke Brown and Bjarne Steensgaard}, title = {{PEMU:} {A} Pin Highly Compatible Out-of-VM Dynamic Binary Instrumentation Framework}, booktitle = {Proceedings of the 11th {ACM} {SIGPLAN/SIGOPS} International Conference on Virtual Execution Environments, Istanbul, Turkey, March 14-15, 2015}, pages = {147--160}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2731186.2731201}, doi = {10.1145/2731186.2731201}, timestamp = {Wed, 23 Jun 2021 16:58:51 +0200}, biburl = {https://dblp.org/rec/conf/vee/ZengFL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinPL15, author = {Zhiqiang Lin and Dingyi Pei and Dongdai Lin}, title = {Construction of Transition Matrices for Binary FCSRs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1181}, year = {2015}, url = {http://eprint.iacr.org/2015/1181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/Lin14, author = {Zhiqiang Lin}, title = {Clock-controlled generators with large period output sequences}, journal = {Int. J. Grid Util. Comput.}, volume = {5}, number = {4}, pages = {278--285}, year = {2014}, url = {https://doi.org/10.1504/IJGUC.2014.065371}, doi = {10.1504/IJGUC.2014.065371}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/Lin14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/GuFPLY14, author = {Yufei Gu and Yangchun Fu and Aravind Prakash and Zhiqiang Lin and Heng Yin}, title = {Multi-Aspect, Robust, and Memory Exclusive Guest {OS} Fingerprinting}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {2}, number = {4}, pages = {380--394}, year = {2014}, url = {https://doi.org/10.1109/TCC.2014.2338305}, doi = {10.1109/TCC.2014.2338305}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/GuFPLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RheeRLJX14, author = {Junghwan Rhee and Ryan D. Riley and Zhiqiang Lin and Xuxian Jiang and Dongyan Xu}, title = {Data-Centric {OS} Kernel Malware Characterization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {1}, pages = {72--87}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2013.2291964}, doi = {10.1109/TIFS.2013.2291964}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/RheeRLJX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/KeL14, author = {Lishan Ke and Zhiqiang Lin}, title = {Distribution Properties and 2-Adic Complexity of Clock-Controlled {FCSR} Sequences}, booktitle = {2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, China, November 8-10, 2014}, pages = {386--389}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/3PGCIC.2014.134}, doi = {10.1109/3PGCIC.2014.134}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/3pgcic/KeL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FengPYL14, author = {Qian Feng and Aravind Prakash and Heng Yin and Zhiqiang Lin}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {{MACE:} high-coverage and robust memory analysis for commodity operating systems}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {196--205}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664248}, doi = {10.1145/2664243.2664248}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FengPYL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/LiuSXL14, author = {Ziyi Liu and Weidong Shi and Shouhuai Xu and Zhiqiang Lin}, editor = {Gerhard P. Fettweis and Wolfgang Nebel}, title = {Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2014, Dresden, Germany, March 24-28, 2014}, pages = {1--6}, publisher = {European Design and Automation Association}, year = {2014}, url = {https://doi.org/10.7873/DATE.2014.064}, doi = {10.7873/DATE.2014.064}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/LiuSXL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/UrbinaGCL14, author = {David I. Urbina and Yufei Gu and Juan Caballero and Zhiqiang Lin}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {SigPath: {A} Memory Graph Based Approach for Program Data Introspection and Modification}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {237--256}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_14}, doi = {10.1007/978-3-319-11212-1\_14}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/UrbinaGCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SaberiFL14, author = {Alireza Saberi and Yangchun Fu and Zhiqiang Lin}, title = {Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in {VMI} via Decoupled Execution and Training Memoization}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/hybrid-bridge-efficiently-bridging-semantic-gap-virtual-machine-introspection-decoupled}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SaberiFL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SounthirarajSGLK14, author = {David Sounthiraraj and Justin Sahs and Garret Greenwood and Zhiqiang Lin and Latifur Khan}, title = {SMV-Hunter: Large Scale, Automated Detection of {SSL/TLS} Man-in-the-Middle Vulnerabilities in Android Apps}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/smv-hunter-large-scale-automated-detection-ssltls-man-middle-vulnerabilities-android-apps}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SounthirarajSGLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuZGL14, author = {Zhaoyan Xu and Jialong Zhang and Guofei Gu and Zhiqiang Lin}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {22--45}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_2}, doi = {10.1007/978-3-319-11379-1\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/XuZGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ChandraLKK14, author = {Swarup Chandra and Zhiqiang Lin and Ashish Kundu and Latifur Khan}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Towards a Systematic Study of the Covert Channel Attacks in Smartphones}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {427--435}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_29}, doi = {10.1007/978-3-319-23829-6\_29}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ChandraLKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/FuZL14, author = {Yangchun Fu and Junyuan Zeng and Zhiqiang Lin}, editor = {Garth Gibson and Nickolai Zeldovich}, title = {{HYPERSHELL:} {A} Practical Hypervisor Layer Guest {OS} Shell for Automated In-VM Management}, booktitle = {2014 {USENIX} Annual Technical Conference, {USENIX} {ATC} '14, Philadelphia, PA, USA, June 19-20, 2014}, pages = {85--96}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/atc14/technical-sessions/presentation/fu}, timestamp = {Mon, 01 Feb 2021 08:43:38 +0100}, biburl = {https://dblp.org/rec/conf/usenix/FuZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PattukKLU14, author = {Erman Pattuk and Murat Kantarcioglu and Zhiqiang Lin and Huseyin Ulusoy}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Preventing Cryptographic Key Leakage in Cloud Virtual Machines}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {703--718}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/pattuk}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/PattukKLU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PengDZXLS14, author = {Fei Peng and Zhui Deng and Xiangyu Zhang and Dongyan Xu and Zhiqiang Lin and Zhendong Su}, editor = {Kevin Fu and Jaeyeon Jung}, title = {X-Force: Force-Executing Binary Programs for Security Applications}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {829--844}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/peng}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/PengDZXLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FuL13, author = {Yangchun Fu and Zhiqiang Lin}, title = {Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {2}, pages = {7}, year = {2013}, url = {https://doi.org/10.1145/2516951.2505124}, doi = {10.1145/2516951.2505124}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/FuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FuLH13, author = {Yangchun Fu and Zhiqiang Lin and Kevin W. Hamlen}, editor = {Charles N. Payne Jr.}, title = {Subverting system authentication with context-aware, reactive virtual machine introspection}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {229--238}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523664}, doi = {10.1145/2523649.2523664}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FuLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZengFMLZX13, author = {Junyuan Zeng and Yangchun Fu and Kenneth A. Miller and Zhiqiang Lin and Xiangyu Zhang and Dongyan Xu}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Obfuscation resilient binary code reuse through trace-oriented programming}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {487--498}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516664}, doi = {10.1145/2508859.2516664}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZengFMLZX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/PrakashVYL13, author = {Aravind Prakash and Eknath Venkataramani and Heng Yin and Zhiqiang Lin}, title = {Manipulating semantic values in kernel data structures: Attack assessments and implications}, booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSN.2013.6575344}, doi = {10.1109/DSN.2013.6575344}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/PrakashVYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/Lin13, author = {Zhiqiang Lin}, title = {The Transformation from the Galois {NLFSR} to the Fibonacci Configuration}, booktitle = {2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013}, pages = {335--339}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/EIDWT.2013.64}, doi = {10.1109/EIDWT.2013.64}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eidwt/Lin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/XuZGL13, author = {Zhaoyan Xu and Jialong Zhang and Guofei Gu and Zhiqiang Lin}, title = {{AUTOVAC:} Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization}, booktitle = {{IEEE} 33rd International Conference on Distributed Computing Systems, {ICDCS} 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, {USA}}, pages = {112--123}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICDCS.2013.69}, doi = {10.1109/ICDCS.2013.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/XuZGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/CaiL13, author = {Zhipeng Cai and Zhiqiang Lin}, title = {Message from the {IPCCC} 2013 technical program chairs}, booktitle = {{IEEE} 32nd International Performance Computing and Communications Conference, {IPCCC} 2013, San Diego, CA, USA, December 6-8, 2013}, pages = {1}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PCCC.2013.6742749}, doi = {10.1109/PCCC.2013.6742749}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/CaiL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/LiuLZWLS13, author = {Ziyi Liu and Jong{-}Hyuk Lee and Junyuan Zeng and Yuanfeng Wen and Zhiqiang Lin and Weidong Shi}, editor = {Avi Mendelson}, title = {{CPU} transparent protection of {OS} kernel and hypervisor integrity with programmable {DRAM}}, booktitle = {The 40th Annual International Symposium on Computer Architecture, ISCA'13, Tel-Aviv, Israel, June 23-27, 2013}, pages = {392--403}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2485922.2485956}, doi = {10.1145/2485922.2485956}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/LiuLZWLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vee/FuL13, author = {Yangchun Fu and Zhiqiang Lin}, editor = {Steve Muir and Gernot Heiser and Stephen M. Blackburn}, title = {{EXTERIOR:} using a dual-VM based external shell for guest-OS introspection, configuration, and recovery}, booktitle = {{ACM} {SIGPLAN/SIGOPS} International Conference on Virtual Execution Environments (co-located with {ASPLOS} 2013), {VEE} '13, Houston, TX, USA, March 16-17, 2013}, pages = {97--110}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2451512.2451534}, doi = {10.1145/2451512.2451534}, timestamp = {Thu, 24 Jun 2021 16:19:30 +0200}, biburl = {https://dblp.org/rec/conf/vee/FuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HandLGT12, author = {Scott Hand and Zhiqiang Lin and Guofei Gu and Bhavani Thuraisingham}, title = {Bin-Carver: Automatic recovery of binary executable files}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S108--S117}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.014}, doi = {10.1016/J.DIIN.2012.05.014}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HandLGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WartellMHL12, author = {Richard Wartell and Vishwath Mohan and Kevin W. Hamlen and Zhiqiang Lin}, editor = {Robert H'obbes' Zakon}, title = {Securing untrusted code via compiler-agnostic binary rewriting}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {299--308}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420995}, doi = {10.1145/2420950.2420995}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WartellMHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WartellMHL12, author = {Richard Wartell and Vishwath Mohan and Kevin W. Hamlen and Zhiqiang Lin}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Binary stirring: self-randomizing instruction addresses of legacy x86 binary code}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {157--168}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382216}, doi = {10.1145/2382196.2382216}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WartellMHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuZGL12, author = {Zhaoyan Xu and Jialong Zhang and Guofei Gu and Zhiqiang Lin}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Automatic generation of vaccines for malware immunization}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1037--1039}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382317}, doi = {10.1145/2382196.2382317}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuZGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud/GuFPLY12, author = {Yufei Gu and Yangchun Fu and Aravind Prakash and Zhiqiang Lin and Heng Yin}, editor = {Michael J. Carey and Steven Hand}, title = {OS-Sommelier: memory-only operating system fingerprinting in the cloud}, booktitle = {{ACM} Symposium on Cloud Computing, {SOCC} '12, San Jose, CA, USA, October 14-17, 2012}, pages = {5}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2391229.2391234}, doi = {10.1145/2391229.2391234}, timestamp = {Tue, 20 Dec 2022 17:33:10 +0100}, biburl = {https://dblp.org/rec/conf/cloud/GuFPLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LinRWZX12, author = {Zhiqiang Lin and Junghwan Rhee and Chao Wu and Xiangyu Zhang and Dongyan Xu}, title = {Discovering Semantic Data of Interest from Un-mappable Memory with Confidence}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/discovering-semantic-data-interest-un-mappable-memory-confidence}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LinRWZX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FuL12, author = {Yangchun Fu and Zhiqiang Lin}, title = {Space Traveling across {VM:} Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {586--600}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.40}, doi = {10.1109/SP.2012.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FuL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RheeLX11, author = {Junghwan Rhee and Zhiqiang Lin and Dongyan Xu}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Characterizing kernel malware behavior with kernel data access patterns}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {207--216}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966940}, doi = {10.1145/1966913.1966940}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RheeLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LinRZXJ11, author = {Zhiqiang Lin and Junghwan Rhee and Xiangyu Zhang and Dongyan Xu and Xuxian Jiang}, title = {SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/siggraph-brute-force-scanning-of-kernel-data-structure-instances-using-graph-based-signatures}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LinRZXJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinP11, author = {Zhiqiang Lin and Dingyi Pei}, title = {Constructing a Diversified {FCSR} with a Given Connection Integer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2011}, url = {http://eprint.iacr.org/2011/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/LinZX10, author = {Zhiqiang Lin and Xiangyu Zhang and Dongyan Xu}, title = {Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications}, journal = {{IEEE} Trans. Software Eng.}, volume = {36}, number = {5}, pages = {688--703}, year = {2010}, url = {https://doi.org/10.1109/TSE.2009.54}, doi = {10.1109/TSE.2009.54}, timestamp = {Thu, 05 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/LinZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LinZX10, author = {Zhiqiang Lin and Xiangyu Zhang and Dongyan Xu}, title = {Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction}, booktitle = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July 1 2010}, pages = {281--290}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DSN.2010.5544305}, doi = {10.1109/DSN.2010.5544305}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LinZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/BaoZLZX10, author = {Tao Bao and Yunhui Zheng and Zhiqiang Lin and Xiangyu Zhang and Dongyan Xu}, editor = {Paolo Tonella and Alessandro Orso}, title = {Strict control dependence and its effect on dynamic information flow analyses}, booktitle = {Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, {ISSTA} 2010, Trento, Italy, July 12-16, 2010}, pages = {13--24}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1831708.1831711}, doi = {10.1145/1831708.1831711}, timestamp = {Tue, 06 Nov 2018 16:57:30 +0100}, biburl = {https://dblp.org/rec/conf/issta/BaoZLZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LinZX10, author = {Zhiqiang Lin and Xiangyu Zhang and Dongyan Xu}, title = {Automatic Reverse Engineering of Data Structures from Binary Execution}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/automatic-reverse-engineering-data-structures-binary-execution}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LinZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/LinRX09, author = {Zhiqiang Lin and Ryan D. Riley and Dongyan Xu}, editor = {Ulrich Flegel and Danilo Bruschi}, title = {Polymorphing Software by Randomizing Data Structure Layout}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5587}, pages = {107--126}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02918-9\_7}, doi = {10.1007/978-3-642-02918-9\_7}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/LinRX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isnn/DuanLMQ09, author = {Lijuan Duan and Zhiqiang Lin and Jun Miao and Yuanhua Qiao}, editor = {Wen Yu and Haibo He and Nian Zhang}, title = {A Method of Human Skin Region Detection Based on {PCNN}}, booktitle = {Advances in Neural Networks - {ISNN} 2009, 6th International Symposium on Neural Networks, {ISNN} 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {5553}, pages = {486--493}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01513-7\_53}, doi = {10.1007/978-3-642-01513-7\_53}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/isnn/DuanLMQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangWLZ09, author = {Tielei Wang and Tao Wei and Zhiqiang Lin and Wei Zou}, title = {IntScope: Automatically Detecting Integer Overflow Vulnerability in {X86} Binary Using Symbolic Execution}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/intscope-automatically-detecting-integer-overflow-vulnerability-in-x86-binary-using-symbolic-execution/}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangWLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/LinHSLB08, author = {Zhiqiang Lin and Michael W. Hoffman and Nathan Schemm and Walter D. Leon{-}Salas and Sina Balkir}, title = {A {CMOS} Image Sensor for Multi-Level Focal Plane Image Decomposition}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {55-I}, number = {9}, pages = {2561--2572}, year = {2008}, url = {https://doi.org/10.1109/TCSI.2008.920094}, doi = {10.1109/TCSI.2008.920094}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/LinHSLB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LinZX08, author = {Zhiqiang Lin and Xiangyu Zhang and Dongyan Xu}, title = {Convicting exploitable software vulnerabilities: An efficient input provenance based approach}, booktitle = {The 38th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings}, pages = {247--256}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/DSN.2008.4630093}, doi = {10.1109/DSN.2008.4630093}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LinZX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/LinHLSB08, author = {Zhiqiang Lin and Michael W. Hoffman and Walter D. Leon{-}Salas and Nathan Schemm and Sina Balkir}, title = {A {CMOS} image sensor with focal plane {SPIHT} image compression}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, {USA}}, pages = {2134--2137}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISCAS.2008.4541872}, doi = {10.1109/ISCAS.2008.4541872}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/LinHLSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LinJXZ08, author = {Zhiqiang Lin and Xuxian Jiang and Dongyan Xu and Xiangyu Zhang}, title = {Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/automatic-protocol-format-reverse-engineering-through-context-aware-monitored-execution/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LinJXZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/LinZ08, author = {Zhiqiang Lin and Xiangyu Zhang}, editor = {Mary Jean Harrold and Gail C. Murphy}, title = {Deriving input syntactic structure from execution}, booktitle = {Proceedings of the 16th {ACM} {SIGSOFT} International Symposium on Foundations of Software Engineering, 2008, Atlanta, Georgia, USA, November 9-14, 2008}, pages = {83--93}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1453101.1453114}, doi = {10.1145/1453101.1453114}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/LinZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/LinHLSB07, author = {Zhiqiang Lin and Michael W. Hoffman and Walter D. Leon{-}Salas and Nathan Schemm and Sina Balkir}, title = {A {CMOS} Front-End for a Lossy Image Compression Sensor}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20 May 2007, New Orleans, Louisiana, {USA}}, pages = {2838--2841}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISCAS.2007.378763}, doi = {10.1109/ISCAS.2007.378763}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/LinHLSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LinMX06, author = {Zhiqiang Lin and Bing Mao and Li Xie}, title = {A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {348--357}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.11}, doi = {10.1109/ARES.2006.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/LinMX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/LinHLSB06, author = {Zhiqiang Lin and Michael W. Hoffman and Walter D. Leon{-}Salas and Nathan Schemm and Sina Balkir}, title = {Effects of charge-based computation non-idealities on {CMOS} image compression sensors}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24 May 2006, Island of Kos, Greece}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISCAS.2006.1693801}, doi = {10.1109/ISCAS.2006.1693801}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/LinHLSB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LinXLMX06, author = {Zhiqiang Lin and Nai Xia and Guole Li and Bing Mao and Li Xie}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {17--31}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_2}, doi = {10.1007/11836810\_2}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LinXLMX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/WangMX05, author = {Zhiqiang Lin and Chao Wang and Bing Mao and Li Xie}, title = {A policy flexible architecture for secure operating system}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {39}, number = {3}, pages = {24--33}, year = {2005}, url = {https://doi.org/10.1145/1075395.1075397}, doi = {10.1145/1075395.1075397}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/WangMX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/LinHLSB05, author = {Zhiqiang Lin and Michael W. Hoffman and Walter D. Leon{-}Salas and Nathan Schemm and Sina Balkir}, title = {A {CMOS} image sensor for focal plane decomposition}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2005), 23-26 May 2005, Kobe, Japan}, pages = {5322--5325}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISCAS.2005.1465837}, doi = {10.1109/ISCAS.2005.1465837}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/LinHLSB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.