BibTeX records: Zhiqiang Lin

download as .bib file

@article{DBLP:journals/corr/abs-2401-15289,
  author       = {Xi Tan and
                  Zheyuan Ma and
                  Sandro Pinto and
                  Le Guan and
                  Ning Zhang and
                  Jun Xu and
                  Zhiqiang Lin and
                  Hongxin Hu and
                  Ziming Zhao},
  title        = {Where's the "up"?! {A} Comprehensive (bottom-up) Study on
                  the Security of Arm Cortex-M Systems},
  journal      = {CoRR},
  volume       = {abs/2401.15289},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.15289},
  doi          = {10.48550/ARXIV.2401.15289},
  eprinttype    = {arXiv},
  eprint       = {2401.15289},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-15289.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eaai/Lin0WSW23,
  author       = {Zhiqiang Lin and
                  Fan Yang and
                  Xuyang Wu and
                  Jinsong Su and
                  Xiaoyue Wang},
  title        = {A Feedback-Enhanced Two-Stage Framework for judicial machine reading
                  comprehension},
  journal      = {Eng. Appl. Artif. Intell.},
  volume       = {123},
  number       = {Part {A}},
  pages        = {106178},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.engappai.2023.106178},
  doi          = {10.1016/J.ENGAPPAI.2023.106178},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eaai/Lin0WSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pomacs/LuZCLL23,
  author       = {Haoran Lu and
                  Qingchuan Zhao and
                  Yongliang Chen and
                  Xiaojing Liao and
                  Zhiqiang Lin},
  title        = {Detecting and Measuring Aggressive Location Harvesting in Mobile Apps
                  via Data-flow Path Embedding},
  journal      = {Proc. {ACM} Meas. Anal. Comput. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {18:1--18:27},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579447},
  doi          = {10.1145/3579447},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pomacs/LuZCLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/SivakumaranZLB23,
  author       = {Pallavi Sivakumaran and
                  Chaoshun Zuo and
                  Zhiqiang Lin and
                  Jorge Blasco},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion
                  Mobile Apps with Ble-Guuide},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {1004--1015},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3595806},
  doi          = {10.1145/3579856.3595806},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/SivakumaranZLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/AhadWKJL023,
  author       = {Ali Ahad and
                  Gang Wang and
                  Chung Hwan Kim and
                  Suman Jana and
                  Zhiqiang Lin and
                  Yonghwi Kwon},
  editor       = {Tor M. Aamodt and
                  Michael M. Swift and
                  Natalie D. Enright Jerger},
  title        = {FreePart: Hardening Data Processing Software via Framework-based Partitioning
                  and Isolation},
  booktitle    = {Proceedings of the 28th {ACM} International Conference on Architectural
                  Support for Programming Languages and Operating Systems, Volume 4,
                  {ASPLOS} 2023, Vancouver, BC, Canada, March 25-29, 2023},
  pages        = {169--188},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623278.3624760},
  doi          = {10.1145/3623278.3624760},
  timestamp    = {Sat, 30 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asplos/AhadWKJL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Zhang0L23,
  author       = {Yue Zhang and
                  Yuqing Yang and
                  Zhiqiang Lin},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Don't Leak Your Keys: Understanding, Measuring, and Exploiting the
                  AppSecret Leaks in Mini-Programs},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2411--2425},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616591},
  doi          = {10.1145/3576915.3616591},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Zhang0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangZL23,
  author       = {Chao Wang and
                  Yue Zhang and
                  Zhiqiang Lin},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Uncovering and Exploiting Hidden APIs in Mobile Super Apps},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2471--2485},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616676},
  doi          = {10.1145/3576915.3616676},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LinL23,
  author       = {Zhiqiang Lin and
                  Xiaojing Liao},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {SaTS'23: The 1st {ACM} Workshop on Secure and Trustworthy Superapps},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3655--3656},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3624023},
  doi          = {10.1145/3576915.3624023},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LinL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/WangLZL23,
  author       = {Wubing Wang and
                  Mengyuan Li and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Daniel Gruss and
                  Federico Maggi and
                  Mathias Fischer and
                  Michele Carminati},
  title        = {PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks
                  on {AMD} {SEV}},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 20th International Conference, {DIMVA} 2023, Hamburg, Germany, July
                  12-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13959},
  pages        = {46--66},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35504-2\_3},
  doi          = {10.1007/978-3-031-35504-2\_3},
  timestamp    = {Tue, 20 Jun 2023 14:45:29 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/WangLZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ei-iss/FukuokaUPHDLVG23,
  author       = {Shimpei Fukuoka and
                  Masayuki Uchiyama and
                  Geunsook Park and
                  Alan Chih{-}Wei Hsiung and
                  Mourad Daoudi and
                  Zhiqiang Lin and
                  Vincent C. Venezia and
                  Lindsay A. Grant},
  title        = {A 2.2um three-wafer stacked back side illuminated voltage domain global
                  shutter {CMOS} image sensor},
  booktitle    = {Imaging Sensors and Systems 2023, San Francisco, CA, USA, January
                  15-19, 2023},
  pages        = {1--5},
  publisher    = {Society for Imaging Science and Technology},
  year         = {2023},
  url          = {https://doi.org/10.2352/EI.2023.35.6.ISS-182},
  doi          = {10.2352/EI.2023.35.6.ISS-182},
  timestamp    = {Fri, 21 Jul 2023 13:58:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ei-iss/FukuokaUPHDLVG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ZhangZXL23,
  author       = {Zhuo Zhang and
                  Brian Zhang and
                  Wen Xu and
                  Zhiqiang Lin},
  title        = {Demystifying Exploitable Bugs in Smart Contracts},
  booktitle    = {45th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2023, Melbourne, Australia, May 14-20, 2023},
  pages        = {615--627},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICSE48619.2023.00061},
  doi          = {10.1109/ICSE48619.2023.00061},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/ZhangZXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/WangKZYL23,
  author       = {Chao Wang and
                  Ronny Ko and
                  Yue Zhang and
                  Yuqing Yang and
                  Zhiqiang Lin},
  title        = {Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with
                  Static Taint Analysis},
  booktitle    = {45th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2023, Melbourne, Australia, May 14-20, 2023},
  pages        = {932--944},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICSE48619.2023.00086},
  doi          = {10.1109/ICSE48619.2023.00086},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/WangKZYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Jangid0L23,
  author       = {Mohit Kumar Jangid and
                  Yue Zhang and
                  Zhiqiang Lin},
  title        = {Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey
                  Entry Pairing},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/extrapolating-formal-analysis-to-uncover-attacks-in-bluetooth-passkey-entry-pairing/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Jangid0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WenPYL23,
  author       = {Haohuang Wen and
                  Phillip A. Porras and
                  Vinod Yegneswaran and
                  Zhiqiang Lin},
  title        = {Thwarting Smartphone {SMS} Attacks at the Radio Interface Layer},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/thwarting-smartphone-sms-attacks-at-the-radio-interface-layer/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/WenPYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AnwarZYL23,
  author       = {Md Sakib Anwar and
                  Chaoshun Zuo and
                  Carter Yagemann and
                  Zhiqiang Lin},
  title        = {Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {17--31},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607211},
  doi          = {10.1145/3607199.3607211},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AnwarZYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BaumanDHL23,
  author       = {Erick Bauman and
                  Jun Duan and
                  Kevin W. Hamlen and
                  Zhiqiang Lin},
  title        = {Renewable Just-In-Time Control-Flow Integrity},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {580--594},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607239},
  doi          = {10.1145/3607199.3607239},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BaumanDHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/LuZCLL23,
  author       = {Haoran Lu and
                  Qingchuan Zhao and
                  Yongliang Chen and
                  Xiaojing Liao and
                  Zhiqiang Lin},
  editor       = {Evgenia Smirni and
                  Konstantin Avrachenkov and
                  Phillipa Gill and
                  Bhuvan Urgaonkar},
  title        = {Detecting and Measuring Aggressive Location Harvesting in Mobile Apps
                  via Data-flow Path Embedding},
  booktitle    = {Abstract Proceedings of the 2023 {ACM} {SIGMETRICS} International
                  Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS}
                  2023, Orlando, FL, USA, June 19-23, 2023},
  pages        = {45--46},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3578338.3593535},
  doi          = {10.1145/3578338.3593535},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/LuZCLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0002LM0023,
  author       = {Zhuo Zhang and
                  Zhiqiang Lin and
                  Marcelo Morales and
                  Xiangyu Zhang and
                  Kaiyuan Zhang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {1757--1774},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-zhuo-exploit},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0002LM0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZuoWL23,
  author       = {Chaoshun Zuo and
                  Chao Wang and
                  Zhiqiang Lin},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3925--3942},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/zuo},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZuoWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WenL23,
  author       = {Haohuang Wen and
                  Zhiqiang Lin},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Egg Hunt in Tesla Infotainment: {A} First Look at Reverse Engineering
                  of Qt Binaries},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3997--4014},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/wen},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WenL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0002XCZZL23,
  author       = {Shixuan Zhao and
                  Pinshen Xu and
                  Guoxing Chen and
                  Mengya Zhang and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Reusable Enclaves for Confidential Serverless Computing},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4015--4032},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhao-shixuan},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0002XCZZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenLZ23,
  author       = {Sanchuan Chen and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Controlled Data Races in Enclaves: Attacks and Detection},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4069--4086},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/chen-sanchuan},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChenLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangZL23,
  author       = {Chao Wang and
                  Yue Zhang and
                  Zhiqiang Lin},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {One Size Does Not Fit All: Uncovering and Exploiting Cross Platform
                  Discrepant APIs in WeChat},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {6629--6646},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/wang-chao},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WangZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sats/2023,
  editor       = {Zhiqiang Lin and
                  Xiaojing Liao},
  title        = {Proceedings of the 2023 {ACM} Workshop on Secure and Trustworthy Superapps,
                  SaTS 2023, Copenhagen, Denmark, 26 November 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605762},
  doi          = {10.1145/3605762},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sats/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2022,
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-25538-0},
  doi          = {10.1007/978-3-031-25538-0},
  isbn         = {978-3-031-25537-3},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-07495,
  author       = {Yuqing Yang and
                  Chao Wang and
                  Yue Zhang and
                  Zhiqiang Lin},
  title        = {SoK: Decoding the Super App Enigma: The Security Mechanisms, Threats,
                  and Trade-offs in OS-alike Apps},
  journal      = {CoRR},
  volume       = {abs/2306.07495},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.07495},
  doi          = {10.48550/ARXIV.2306.07495},
  eprinttype    = {arXiv},
  eprint       = {2306.07495},
  timestamp    = {Sun, 18 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-07495.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-08134,
  author       = {Chao Wang and
                  Yue Zhang and
                  Zhiqiang Lin},
  title        = {Uncovering and Exploiting Hidden APIs in Mobile Super Apps},
  journal      = {CoRR},
  volume       = {abs/2306.08134},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.08134},
  doi          = {10.48550/ARXIV.2306.08134},
  eprinttype    = {arXiv},
  eprint       = {2306.08134},
  timestamp    = {Sun, 18 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-08134.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-08151,
  author       = {Yue Zhang and
                  Yuqing Yang and
                  Zhiqiang Lin},
  title        = {Don't Leak Your Keys: Understanding, Measuring, and Exploiting the
                  AppSecret Leaks in Mini-Programs},
  journal      = {CoRR},
  volume       = {abs/2306.08151},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.08151},
  doi          = {10.48550/ARXIV.2306.08151},
  eprinttype    = {arXiv},
  eprint       = {2306.08151},
  timestamp    = {Sun, 18 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-08151.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-00097,
  author       = {Ada Barach and
                  Maxwell Taylor and
                  Vincent Beardsley and
                  Jacob Bambeck and
                  Michael D. Bond and
                  Zhiqiang Lin},
  title        = {Cocoon: Static Information Flow Control in Rust},
  journal      = {CoRR},
  volume       = {abs/2311.00097},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.00097},
  doi          = {10.48550/ARXIV.2311.00097},
  eprinttype    = {arXiv},
  eprint       = {2311.00097},
  timestamp    = {Tue, 07 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-00097.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-09601,
  author       = {Xin Jin and
                  Jonathan Larson and
                  Weiwei Yang and
                  Zhiqiang Lin},
  title        = {Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large
                  Language Models},
  journal      = {CoRR},
  volume       = {abs/2312.09601},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.09601},
  doi          = {10.48550/ARXIV.2312.09601},
  eprinttype    = {arXiv},
  eprint       = {2312.09601},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-09601.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-12573,
  author       = {Mengya Zhang and
                  Xiaokuan Zhang and
                  Josh Barbee and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and
                  Open Problems},
  journal      = {CoRR},
  volume       = {abs/2312.12573},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.12573},
  doi          = {10.48550/ARXIV.2312.12573},
  eprinttype    = {arXiv},
  eprint       = {2312.12573},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-12573.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/EllisWLA22,
  author       = {Christopher Ellis and
                  Haohuang Wen and
                  Zhiqiang Lin and
                  Anish Arora},
  title        = {Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification
                  Contact Tracing},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {4},
  pages        = {727--745},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0130},
  doi          = {10.56553/POPETS-2022-0130},
  timestamp    = {Fri, 30 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/EllisWLA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiLC22,
  author       = {Weizhou Li and
                  Zhiqiang Lin and
                  Qi Chen},
  title        = {A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses},
  journal      = {Secur. Commun. Networks},
  volume       = {2022},
  pages        = {1417607:1--1417607:9},
  year         = {2022},
  url          = {https://doi.org/10.1155/2022/1417607},
  doi          = {10.1155/2022/1417607},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/TangQLLYXL22,
  author       = {Yutao Tang and
                  Zhengrui Qin and
                  Zhiqiang Lin and
                  Yue Li and
                  Shanhe Yi and
                  Fengyuan Xu and
                  Qun Li},
  title        = {vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted
                  {OS}},
  journal      = {{IEEE} Trans. Computers},
  volume       = {71},
  number       = {12},
  pages        = {3349--3360},
  year         = {2022},
  url          = {https://doi.org/10.1109/TC.2022.3152074},
  doi          = {10.1109/TC.2022.3152074},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/TangQLLYXL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ChenTL22,
  author       = {Qi Chen and
                  Chunming Tang and
                  Zhiqiang Lin},
  title        = {Efficient Explicit Constructions of Multipartite Secret Sharing Schemes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {68},
  number       = {1},
  pages        = {601--631},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIT.2021.3123102},
  doi          = {10.1109/TIT.2021.3123102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/ChenTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ZhaoZBL22,
  author       = {Qingchuan Zhao and
                  Chaoshun Zuo and
                  Jorge Blasco and
                  Zhiqiang Lin},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined
                  Bluetooth Peripherals},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {521--533},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517410},
  doi          = {10.1145/3488932.3517410},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ZhaoZBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JinMKLN22,
  author       = {Xin Jin and
                  Sunil Manandhar and
                  Kaushal Kafle and
                  Zhiqiang Lin and
                  Adwait Nadkarni},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Understanding IoT Security from a Market-Scale Perspective},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1615--1629},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560640},
  doi          = {10.1145/3548606.3560640},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JinMKLN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JinPWL22,
  author       = {Xin Jin and
                  Kexin Pei and
                  Jun Yeon Won and
                  Zhiqiang Lin},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive
                  Execution-Aware Code Embeddings},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1631--1645},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560612},
  doi          = {10.1145/3548606.3560612},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JinPWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangEZ0SL22,
  author       = {Yuqing Yang and
                  Mohamed Elsabagh and
                  Chaoshun Zuo and
                  Ryan Johnson and
                  Angelos Stavrou and
                  Zhiqiang Lin},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Detecting and Measuring Misconfigured Manifests in Android Apps},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3063--3077},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560607},
  doi          = {10.1145/3548606.3560607},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YangEZ0SL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Yang0L22,
  author       = {Yuqing Yang and
                  Yue Zhang and
                  Zhiqiang Lin},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability
                  Detection},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3079--3092},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560597},
  doi          = {10.1145/3548606.3560597},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Yang0L22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0025L22,
  author       = {Yue Zhang and
                  Zhiqiang Lin},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via
                  Allowlist-based Side Channel and Its Countermeasure},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3181--3194},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559372},
  doi          = {10.1145/3548606.3559372},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0025L22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/LinSABBCCEEIJJKLLLLMMNOPPSSSSTYY22,
  author       = {Sen Lin and
                  Ming Shi and
                  Anish Arora and
                  Raef Bassily and
                  Elisa Bertino and
                  Constantine Caramanis and
                  Kaushik R. Chowdhury and
                  Eylem Ekici and
                  Atilla Eryilmaz and
                  Stratis Ioannidis and
                  Nan Jiang and
                  Gauri Joshi and
                  Jim Kurose and
                  Yingbin Liang and
                  Zhiqiang Lin and
                  Jia Liu and
                  Mingyan Liu and
                  Tommaso Melodia and
                  Aryan Mokhtari and
                  Rob Nowak and
                  Sewoong Oh and
                  Srini Parthasarathy and
                  Chunyi Peng and
                  Hulya Seferoglu and
                  Ness B. Shroff and
                  Sanjay Shakkottai and
                  Kannan Srinivasan and
                  Ameet Talwalkar and
                  Aylin Yener and
                  Lei Ying},
  title        = {Leveraging Synergies Between {AI} and Networking to Build Next Generation
                  Edge Networks},
  booktitle    = {8th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2022, Atlanta, GA, USA, December 14-16, 2022},
  pages        = {16--25},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CIC56439.2022.00013},
  doi          = {10.1109/CIC56439.2022.00013},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/LinSABBCCEEIJJKLLLLMMNOPPSSSSTYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/WenPYL22,
  author       = {Haohuang Wen and
                  Phillip A. Porras and
                  Vinod Yegneswaran and
                  Zhiqiang Lin},
  editor       = {Qing Wang and
                  Arash Asadi},
  title        = {A fine-grained telemetry stream for security services in 5G open radio
                  access networks},
  booktitle    = {Proceedings of the 1st International Workshop on Emerging Topics in
                  Wireless, EmergingWireless 2022, Rome, Italy, 9 December 2022},
  pages        = {18--23},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3565474.3569070},
  doi          = {10.1145/3565474.3569070},
  timestamp    = {Thu, 22 Dec 2022 12:15:37 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/WenPYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangCZL22,
  author       = {Huibo Wang and
                  Guoxing Chen and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their
                  Countermeasures},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-253/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/WangCZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WonWL22,
  author       = {Jun Yeon Won and
                  Haohuang Wen and
                  Zhiqiang Lin},
  title        = {What You See is Not What You Get: Revealing Hidden Memory Mapping
                  for Peripheral Modeling},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {200--213},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545957},
  doi          = {10.1145/3545948.3545957},
  timestamp    = {Thu, 20 Oct 2022 10:46:43 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WonWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhaoLZL22,
  author       = {Shixuan Zhao and
                  Mengyuan Li and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {vSGX: Virtualizing {SGX} Enclaves on {AMD} {SEV}},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {321--336},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833694},
  doi          = {10.1109/SP46214.2022.9833694},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhaoLZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZuoL22,
  author       = {Chaoshun Zuo and
                  Zhiqiang Lin},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Playing Without Paying: Detecting Vulnerable Payment Verification
                  in Native Binaries of Unity Mobile Games},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3093--3110},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/zuo},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZuoL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-02858,
  author       = {Xingyu Lyu and
                  Mengya Zhang and
                  Xiaokuan Zhang and
                  Jianyu Niu and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {An Empirical Study on Ethereum Private Transactions and the Security
                  Implications},
  journal      = {CoRR},
  volume       = {abs/2208.02858},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.02858},
  doi          = {10.48550/ARXIV.2208.02858},
  eprinttype    = {arXiv},
  eprint       = {2208.02858},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-02858.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-05327,
  author       = {Ronny Ko and
                  Chuan Xiao and
                  Makoto Onizuka and
                  Yihe Huang and
                  Zhiqiang Lin},
  title        = {Ultraverse: Efficient Retroactive Operation for Attack Recovery in
                  Database Systems and Web Frameworks},
  journal      = {CoRR},
  volume       = {abs/2211.05327},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.05327},
  doi          = {10.48550/ARXIV.2211.05327},
  eprinttype    = {arXiv},
  eprint       = {2211.05327},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-05327.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bspc/LinQLZZM21,
  author       = {Zhiqiang Lin and
                  Taorong Qiu and
                  Ping Liu and
                  Lingyun Zhang and
                  Siwei Zhang and
                  Zhendong Mu},
  title        = {Fatigue driving recognition based on deep learning and graph neural
                  network},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {68},
  pages        = {102598},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.bspc.2021.102598},
  doi          = {10.1016/J.BSPC.2021.102598},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bspc/LinQLZZM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pomacs/ZhangTYZL21,
  author       = {Yue Zhang and
                  Bayan Turkistani and
                  Allen Yuqing Yang and
                  Chaoshun Zuo and
                  Zhiqiang Lin},
  title        = {A Measurement Study of Wechat Mini-Apps},
  journal      = {Proc. {ACM} Meas. Anal. Comput. Syst.},
  volume       = {5},
  number       = {2},
  pages        = {14:1--14:25},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460081},
  doi          = {10.1145/3460081},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pomacs/ZhangTYZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangWL21,
  author       = {Kaiqing Huang and
                  Xueli Wang and
                  Zhiqiang Lin},
  title        = {Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided
                  Internet of Things},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {8872699:1--8872699:22},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/8872699},
  doi          = {10.1155/2021/8872699},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiZL21,
  author       = {Mengyuan Li and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {CrossLine: Breaking "Security-by-Crash" based Memory Isolation
                  in {AMD} {SEV}},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2937--2950},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485253},
  doi          = {10.1145/3460120.3485253},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/WangCCZL21,
  author       = {Wubing Wang and
                  Guoxing Chen and
                  Yueqiang Cheng and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Leyla Bilge and
                  Lorenzo Cavallaro and
                  Giancarlo Pellegrino and
                  Nuno Neves},
  title        = {Specularizer : Detecting Speculative Execution Attacks via Performance
                  Tracing},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 18th International Conference, {DIMVA} 2021, Virtual Event, July
                  14-16, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12756},
  pages        = {151--172},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-80825-9\_8},
  doi          = {10.1007/978-3-030-80825-9\_8},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/WangCCZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/BiPL21,
  author       = {Yechuan Bi and
                  Jianshan Peng and
                  Zhiqiang Lin},
  title        = {Data flow sensitive driver vulnerability mining method},
  booktitle    = {{EITCE} 2021: 5th International Conference on Electronic Information
                  Technology and Computer Engineering, Xiamen, China, October 22 - 24,
                  2021},
  pages        = {1263--1268},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3501409.3501631},
  doi          = {10.1145/3501409.3501631},
  timestamp    = {Fri, 04 Aug 2023 10:50:51 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/BiPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccse/XuMLXCL21,
  author       = {Ronghua Xu and
                  Hefeng Meng and
                  Zhiqiang Lin and
                  Yonghui Xu and
                  Lizhen Cui and
                  Jun Lin},
  title        = {Credit Default Prediction via Explainable Ensemble Learning},
  booktitle    = {{ICCSE} '21: 5th International Conference on Crowd Science and Engineering,
                  Jinan, China, October 16 - 18, 2021},
  pages        = {81--87},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3503181.3503195},
  doi          = {10.1145/3503181.3503195},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccse/XuMLXCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccse/ZhangYMLXC21,
  author       = {Jiancheng Zhang and
                  Xiao Yang and
                  Hefeng Meng and
                  Zhiqiang Lin and
                  Yonghui Xu and
                  Lizhen Cui},
  title        = {A Survey on Knowledge Enhanced {EHR} Data Mining},
  booktitle    = {{ICCSE} '21: 5th International Conference on Crowd Science and Engineering,
                  Jinan, China, October 16 - 18, 2021},
  pages        = {124--131},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3503181.3503202},
  doi          = {10.1145/3503181.3503202},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccse/ZhangYMLXC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccse/MengLYXC21,
  author       = {Hefeng Meng and
                  Zhiqiang Lin and
                  Fan Yang and
                  Yonghui Xu and
                  Lizhen Cui},
  title        = {Knowledge Distillation In Medical Data Mining: {A} Survey},
  booktitle    = {{ICCSE} '21: 5th International Conference on Crowd Science and Engineering,
                  Jinan, China, October 16 - 18, 2021},
  pages        = {175--182},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3503181.3503211},
  doi          = {10.1145/3503181.3503211},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccse/MengLYXC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icct/LiSZL21,
  author       = {Xiaowei Li and
                  Hui Shu and
                  Yi Zhai and
                  Zhiqiang Lin},
  title        = {A Method for Resume Information Extraction Using BERT-BiLSTM-CRF},
  booktitle    = {21st International Conference on Communication Technology, {ICCT}
                  2021, Tianjin, China, October 13-16, 2021},
  pages        = {1437--1442},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCT52962.2021.9657937},
  doi          = {10.1109/ICCT52962.2021.9657937},
  timestamp    = {Tue, 11 Jan 2022 10:02:53 +0100},
  biburl       = {https://dblp.org/rec/conf/icct/LiSZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/Lin21,
  author       = {Zhiqiang Lin},
  title        = {Keynote: Uncovering Vulnerabilities in Bluetooth Devices with Automated
                  Binary Analysis},
  booktitle    = {19th {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops and other Affiliated Events, PerCom Workshops 2021, Kassel,
                  Germany, March 22-26, 2021},
  pages        = {545},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PerComWorkshops51409.2021.9430937},
  doi          = {10.1109/PERCOMWORKSHOPS51409.2021.9430937},
  timestamp    = {Wed, 02 Jun 2021 11:59:28 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/Lin21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MunteanVLTG021,
  author       = {Paul Muntean and
                  Richard Viehoever and
                  Zhiqiang Lin and
                  Gang Tan and
                  Jens Grossklags and
                  Claudia Eckert},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {iTOP: Automating Counterfeit Object-Oriented Programming Attacks},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {162--176},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471847},
  doi          = {10.1145/3471621.3471847},
  timestamp    = {Fri, 08 Oct 2021 09:46:25 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MunteanVLTG021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/0025TYZL21,
  author       = {Yue Zhang and
                  Bayan Turkistani and
                  Allen Yuqing Yang and
                  Chaoshun Zuo and
                  Zhiqiang Lin},
  editor       = {Longbo Huang and
                  Anshul Gandhi and
                  Negar Kiyavash and
                  Jia Wang},
  title        = {A Measurement Study of Wechat Mini-Apps},
  booktitle    = {{SIGMETRICS} '21: {ACM} {SIGMETRICS} / International Conference on
                  Measurement and Modeling of Computer Systems, Virtual Event, China,
                  June 14-18, 2021},
  pages        = {19--20},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3410220.3460106},
  doi          = {10.1145/3410220.3460106},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/0025TYZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JangidCZL21,
  author       = {Mohit Kumar Jangid and
                  Guoxing Chen and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Towards Formal Verification of State Continuity for Enclave Programs},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {573--590},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/jangid},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JangidCZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenLZ21,
  author       = {Sanchuan Chen and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1665--1682},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-sanchuan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChenLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiCLWC21,
  author       = {Xing Li and
                  Yan Chen and
                  Zhiqiang Lin and
                  Xiao Wang and
                  Jim Hao Chen},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Automatic Policy Generation for Inter-Service Access Control of Microservices},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3971--3988},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-xing},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiCLWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiaccs/2021,
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210},
  doi          = {10.1145/3433210},
  isbn         = {978-1-4503-8287-8},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-11171,
  author       = {Cheng Zhang and
                  Yunze Pan and
                  Yunqi Zhang and
                  Adam C. Champion and
                  Zhaohui Shen and
                  Dong Xuan and
                  Zhiqiang Lin and
                  Ness B. Shroff},
  title        = {WLAN-Log-Based Superspreader Detection in the {COVID-19} Pandemic},
  journal      = {CoRR},
  volume       = {abs/2102.11171},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.11171},
  eprinttype    = {arXiv},
  eprint       = {2102.11171},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-11171.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RenZGL20,
  author       = {Yan Ren and
                  Qiuxia Zhao and
                  Haipeng Guan and
                  Zhiqiang Lin},
  title        = {On Design of Single-Layer and Multilayer Code-Based Linkable Ring
                  Signatures},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {17854--17862},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2967789},
  doi          = {10.1109/ACCESS.2020.2967789},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/RenZGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiCXLZ20,
  author       = {Qiaoyang Li and
                  Guiming Chen and
                  Lingliang Xu and
                  Zhiqiang Lin and
                  Liyao Zhou},
  title        = {An Improved Model for Effectiveness Evaluation of Missile Electromagnetic
                  Launch System},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {156615--156633},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3018447},
  doi          = {10.1109/ACCESS.2020.3018447},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiCXLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/RenZGL20,
  author       = {Yan Ren and
                  Qiuxia Zhao and
                  Haipeng Guan and
                  Zhiqiang Lin},
  title        = {A novel authentication scheme based on edge computing for blockchain-based
                  distributed energy trading system},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2020},
  number       = {1},
  pages        = {152},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13638-020-01762-w},
  doi          = {10.1186/S13638-020-01762-W},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/RenZGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ZhangQLZB20,
  author       = {Lingyun Zhang and
                  Taorong Qiu and
                  Zhiqiang Lin and
                  Shuli Zou and
                  Xiaoming Bai},
  title        = {Construction and Application of Functional Brain Network Based on
                  Entropy},
  journal      = {Entropy},
  volume       = {22},
  number       = {11},
  pages        = {1234},
  year         = {2020},
  url          = {https://doi.org/10.3390/e22111234},
  doi          = {10.3390/E22111234},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/ZhangQLZB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ChenCXZLL20,
  author       = {Guoxing Chen and
                  Sanchuan Chen and
                  Yuan Xiao and
                  Yinqian Zhang and
                  Zhiqiang Lin and
                  Ten{-}Hwang Lai},
  title        = {SgxPectre: Stealing Intel Secrets From {SGX} Enclaves via Speculative
                  Execution},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {3},
  pages        = {28--37},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2019.2963021},
  doi          = {10.1109/MSEC.2019.2963021},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ChenCXZLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/ChenTL20,
  author       = {Qi Chen and
                  Chunming Tang and
                  Zhiqiang Lin},
  title        = {Compartmented Secret Sharing Schemes and Locally Repairable Codes},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {68},
  number       = {10},
  pages        = {5976--5987},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCOMM.2020.3005430},
  doi          = {10.1109/TCOMM.2020.3005430},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcom/ChenTL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MunteanNLTG020,
  author       = {Paul Muntean and
                  Matthias Neumayer and
                  Zhiqiang Lin and
                  Gang Tan and
                  Jens Grossklags and
                  Claudia Eckert},
  title        = {{\(\rho\)}FEM: Efficient Backward-edge Protection Using Reversed Forward-edge
                  Mappings},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {466--479},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427246},
  doi          = {10.1145/3427228.3427246},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MunteanNLTG020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bsci/RenZGL20,
  author       = {Yan Ren and
                  Qiuxia Zhao and
                  Haipeng Guan and
                  Zhiqiang Lin},
  editor       = {Keke Gai and
                  Kim{-}Kwang Raymond Choo and
                  Jiamou Liu},
  title        = {On Design of Blockchain-based Transport Scheme},
  booktitle    = {{BSCI} '20: Proceedings of the 2nd {ACM} International Symposium on
                  Blockchain and Secure Critical Infrastructure, co-located with AsiaCCS
                  2020, Taipei, Taiwan, October 6, 2020},
  pages        = {214--215},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384943.3409444},
  doi          = {10.1145/3384943.3409444},
  timestamp    = {Wed, 21 Oct 2020 12:23:01 +0200},
  biburl       = {https://dblp.org/rec/conf/bsci/RenZGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WenLZ20,
  author       = {Haohuang Wen and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal
                  Firmware},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {167--180},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423344},
  doi          = {10.1145/3372297.3423344},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WenLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WenZCL20,
  author       = {Haohuang Wen and
                  Qingchuan Zhao and
                  Qi Alfred Chen and
                  Zhiqiang Lin},
  title        = {Automated Cross-Platform Reverse Engineering of {CAN} Bus Commands
                  From Mobile Apps},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/automated-cross-platform-reverse-engineering-of-can-bus-commands-from-mobile-apps/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WenZCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhaoWLXS20,
  author       = {Qingchuan Zhao and
                  Haohuang Wen and
                  Zhiqiang Lin and
                  Dong Xuan and
                  Ness B. Shroff},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing
                  Apps},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {335},
  pages        = {49--60},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63086-7\_4},
  doi          = {10.1007/978-3-030-63086-7\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhaoWLXS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/HanLP20,
  author       = {Jaehyun Han and
                  Zhiqiang Lin and
                  Donald E. Porter},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {On the Effectiveness of Behavior-Based Ransomware Detection},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {336},
  pages        = {120--140},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63095-9\_7},
  doi          = {10.1007/978-3-030-63095-9\_7},
  timestamp    = {Tue, 15 Dec 2020 15:30:59 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/HanLP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WenZLXS20,
  author       = {Haohuang Wen and
                  Qingchuan Zhao and
                  Zhiqiang Lin and
                  Dong Xuan and
                  Ness B. Shroff},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {A Study of the Privacy of {COVID-19} Contact Tracing Apps},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {335},
  pages        = {297--317},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63086-7\_17},
  doi          = {10.1007/978-3-030-63086-7\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/WenZLXS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhaoZDPL20,
  author       = {Qingchuan Zhao and
                  Chaoshun Zuo and
                  Brendan Dolan{-}Gavitt and
                  Giancarlo Pellegrino and
                  Zhiqiang Lin},
  title        = {Automatic Uncovering of Hidden Behaviors From Input Validation in
                  Mobile Apps},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1106--1120},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00072},
  doi          = {10.1109/SP40000.2020.00072},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhaoZDPL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/KunduLH20,
  author       = {Ashish Kundu and
                  Zhiqiang Lin and
                  Joshua Hammond},
  title        = {Energy Attacks on Mobile Devices},
  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,
                  GA, USA, October 28-31, 2020},
  pages        = {107--117},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00024},
  doi          = {10.1109/TPS-ISA50397.2020.00024},
  timestamp    = {Tue, 26 Jan 2021 14:00:08 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/KunduLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/00250DJLF20,
  author       = {Yue Zhang and
                  Jian Weng and
                  Rajib Dey and
                  Yier Jin and
                  Zhiqiang Lin and
                  Xinwen Fu},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {37--54},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-yue},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/00250DJLF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/QuinonezGSBCL20,
  author       = {Raul Quinonez and
                  Jairo Giraldo and
                  Luis E. Salazar and
                  Erick Bauman and
                  Alvaro A. C{\'{a}}rdenas and
                  Zhiqiang Lin},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{SAVIOR:} Securing Autonomous Vehicles with Robust Physical Invariants},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {895--912},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/quinonez},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/QuinonezGSBCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WenCL20,
  author       = {Haohuang Wen and
                  Qi Alfred Chen and
                  Zhiqiang Lin},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Plug-N-Pwned: Comprehensive Vulnerability Analysis of {OBD-II} Dongles
                  as {A} New Over-the-Air Attack Surface in Automotive IoT},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {949--965},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/wen},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WenCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Elsabagh0SZZL20,
  author       = {Mohamed Elsabagh and
                  Ryan Johnson and
                  Angelos Stavrou and
                  Chaoshun Zuo and
                  Qingchuan Zhao and
                  Zhiqiang Lin},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{FIRMSCOPE:} Automatic Uncovering of Privilege-Escalation Vulnerabilities
                  in Pre-Installed Apps in Android Firmware},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2379--2396},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/elsabagh},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Elsabagh0SZZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangZZL20,
  author       = {Mengya Zhang and
                  Xiaokuan Zhang and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{TXSPECTOR:} Uncovering Attacks in Ethereum from Transactions},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2775--2792},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-mengya},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangZZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-13362,
  author       = {Yuxiang Luo and
                  Cheng Zhang and
                  Yunqi Zhang and
                  Chaoshun Zuo and
                  Dong Xuan and
                  Zhiqiang Lin and
                  Adam C. Champion and
                  Ness B. Shroff},
  title        = {{ACOUSTIC-TURF:} Acoustic-based Privacy-Preserving {COVID-19} Contact
                  Tracing},
  journal      = {CoRR},
  volume       = {abs/2006.13362},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.13362},
  eprinttype    = {arXiv},
  eprint       = {2006.13362},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-13362.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-00146,
  author       = {Mengyuan Li and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {{CROSSLINE:} Breaking "Security-by-Crash" based Memory Isolation
                  in {AMD} {SEV}},
  journal      = {CoRR},
  volume       = {abs/2008.00146},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.00146},
  eprinttype    = {arXiv},
  eprint       = {2008.00146},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-00146.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DuLZCX19,
  author       = {Heng Du and
                  Zhiqiang Lin and
                  Yuan Zhang and
                  Hui Chen and
                  Zhimin Xu},
  title        = {Improved Migration Genetic Algorithm Optimization for Variable-Speed
                  Falling Trajectory of Mobile Crossbeam in Composite Hydraulic Press
                  With Pressure Shock},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {39459--39473},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2905849},
  doi          = {10.1109/ACCESS.2019.2905849},
  timestamp    = {Thu, 14 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/DuLZCX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LinLWML19,
  author       = {Zhiqiang Lin and
                  Shimin Lin and
                  Sen Wu and
                  Ge Ma and
                  Zhongwei Liang},
  title        = {Vibration Control of a Flexible Spacecraft System With Input Backlash},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {87017--87026},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2926516},
  doi          = {10.1109/ACCESS.2019.2926516},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LinLWML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LinLHZL19,
  author       = {Zhiqiang Lin and
                  Shimin Lin and
                  Meihua Huang and
                  Jianing Zhang and
                  Zhongwei Liang},
  title        = {Vibration Control for Two Kinds of Flexible Mechanical Systems With
                  Full State Output Constraints},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {120734--120743},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2933914},
  doi          = {10.1109/ACCESS.2019.2933914},
  timestamp    = {Sat, 12 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LinLHZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenTL19,
  author       = {Qi Chen and
                  Chunming Tang and
                  Zhiqiang Lin},
  title        = {Efficient explicit constructions of compartmented secret sharing schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2913--2940},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00657-2},
  doi          = {10.1007/S10623-019-00657-2},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenTL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuWYL19,
  author       = {Jingang Liu and
                  Yongge Wang and
                  Zongxiang Yi and
                  Zhiqiang Lin},
  title        = {polarRLCE: {A} New Code-Based Cryptosystem Using Polar Codes},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3086975:1--3086975:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3086975},
  doi          = {10.1155/2019/3086975},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuWYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MunteanNLTG019,
  author       = {Paul Muntean and
                  Matthias Neumayer and
                  Zhiqiang Lin and
                  Gang Tan and
                  Jens Grossklags and
                  Claudia Eckert},
  editor       = {David Balenson},
  title        = {Analyzing control flow integrity with {LLVM-CFI}},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {584--597},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359806},
  doi          = {10.1145/3359789.3359806},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MunteanNLTG019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenTL19,
  author       = {Qi Chen and
                  Chunming Tang and
                  Zhiqiang Lin},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Efficient Explicit Constructions of Multipartite Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  pages        = {505--536},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8\_18},
  doi          = {10.1007/978-3-030-34621-8\_18},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChenTL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangBKLCZ19,
  author       = {Huibo Wang and
                  Erick Bauman and
                  Vishal Karande and
                  Zhiqiang Lin and
                  Yueqiang Cheng and
                  Yinqian Zhang},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Running Language Interpreters Inside {SGX:} {A} Lightweight, Legacy-Compatible
                  Script Code Hardening Approach},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {114--121},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329848},
  doi          = {10.1145/3321705.3329848},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangBKLCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZuoWLZ19,
  author       = {Chaoshun Zuo and
                  Haohuang Wen and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Automatic Fingerprinting of Vulnerable {BLE} IoT Devices with Static
                  UUIDs from Mobile Apps},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1469--1483},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354240},
  doi          = {10.1145/3319535.3354240},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZuoWLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangWDSJDLZWL19,
  author       = {Huibo Wang and
                  Pei Wang and
                  Yu Ding and
                  Mingshen Sun and
                  Yiming Jing and
                  Ran Duan and
                  Long Li and
                  Yulong Zhang and
                  Tao Wei and
                  Zhiqiang Lin},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Towards Memory Safe Enclave Programming with Rust-SGX},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2333--2350},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354241},
  doi          = {10.1145/3319535.3354241},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangWDSJDLZWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dpta/LiuLLLS19,
  author       = {Yuzhong Liu and
                  Zhiqiang Lin and
                  Li Li and
                  Hualiang Li and
                  Yali Shen},
  editor       = {Chuanchao Huang and
                  Yu{-}Wei Chan and
                  Neil Y. Yen},
  title        = {Effects of Extremely Low Frequency Electromagnetic Fields Exposure
                  in an Informationalized Perspective},
  booktitle    = {Data Processing Techniques and Applications for Cyber-Physical Systems,
                  {DPTA} 2019, Shanghai, China, November 15-16, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1088},
  pages        = {1191--1201},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-1468-5\_140},
  doi          = {10.1007/978-981-15-1468-5\_140},
  timestamp    = {Tue, 11 Feb 2020 13:32:03 +0100},
  biburl       = {https://dblp.org/rec/conf/dpta/LiuLLLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ChenZDDZSLZZ19,
  author       = {Jiongyi Chen and
                  Chaoshun Zuo and
                  Wenrui Diao and
                  Shuaike Dong and
                  Qingchuan Zhao and
                  Menghan Sun and
                  Zhiqiang Lin and
                  Yinqian Zhang and
                  Kehuan Zhang},
  title        = {Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices
                  and Users},
  booktitle    = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019},
  pages        = {222--233},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSN.2019.00034},
  doi          = {10.1109/DSN.2019.00034},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/ChenZDDZSLZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ChenCXZLL19,
  author       = {Guoxing Chen and
                  Sanchuan Chen and
                  Yuan Xiao and
                  Yinqian Zhang and
                  Zhiqiang Lin and
                  Ten{-}Hwang Lai},
  title        = {SgxPectre: Stealing Intel Secrets from {SGX} Enclaves Via Speculative
                  Execution},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {142--157},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00020},
  doi          = {10.1109/EUROSP.2019.00020},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ChenCXZLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/MillerKSZZL19,
  author       = {Kenneth A. Miller and
                  Yonghwi Kwon and
                  Yi Sun and
                  Zhuo Zhang and
                  Xiangyu Zhang and
                  Zhiqiang Lin},
  editor       = {Joanne M. Atlee and
                  Tevfik Bultan and
                  Jon Whittle},
  title        = {Probabilistic disassembly},
  booktitle    = {Proceedings of the 41st International Conference on Software Engineering,
                  {ICSE} 2019, Montreal, QC, Canada, May 25-31, 2019},
  pages        = {1187--1198},
  publisher    = {{IEEE} / {ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICSE.2019.00121},
  doi          = {10.1109/ICSE.2019.00121},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/MillerKSZZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhaoZPL19,
  author       = {Qingchuan Zhao and
                  Chaoshun Zuo and
                  Giancarlo Pellegrino and
                  Zhiqiang Lin},
  title        = {Geo-locating Drivers: {A} Study of Sensitive Data Leakage in Ride-Hailing
                  Services},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/geo-locating-drivers-a-study-of-sensitive-data-leakage-in-ride-hailing-services/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhaoZPL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangZL19,
  author       = {Wubing Wang and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities
                  in Enclave Binaries},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {443--457},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/wang-wubing},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WangZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LiCL19,
  author       = {Xing Li and
                  Yan Chen and
                  Zhiqiang Lin},
  title        = {Towards Automated Inter-Service Authorization for Microservice Applications},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2019 Conference Posters and Demos,
                  {SIGCOMM} 2019, Beijing, China, August 19-23, 2019},
  pages        = {3--5},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3342280.3342288},
  doi          = {10.1145/3342280.3342288},
  timestamp    = {Thu, 15 Aug 2019 09:02:14 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/LiCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZuoLZ19,
  author       = {Chaoshun Zuo and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  title        = {Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from
                  Mobile Apps},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1296--1310},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00009},
  doi          = {10.1109/SP.2019.00009},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZuoLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlrawiZDKLS19,
  author       = {Omar Alrawi and
                  Chaoshun Zuo and
                  Ruian Duan and
                  Ranjita Pai Kasturi and
                  Zhiqiang Lin and
                  Brendan Saltaformaggio},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile
                  Backends},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {551--566},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/alrawi},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AlrawiZDKLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiZLS19,
  author       = {Mengyuan Li and
                  Yinqian Zhang and
                  Zhiqiang Lin and
                  Yan Solihin},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Exploiting Unprotected {I/O} Operations in AMD's Secure Encrypted
                  Virtualization},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1257--1272},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/li-mengyuan},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LiZLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XuGWHL19,
  author       = {Xiaoyang Xu and
                  Masoud Ghaffarinia and
                  Wenhao Wang and
                  Kevin W. Hamlen and
                  Zhiqiang Lin},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {{CONFIRM:} Evaluating Compatibility and Relevance of Control-flow
                  Integrity Protections for Modern Software},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1805--1821},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/xu-xiaoyang},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XuGWHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2019,
  editor       = {Zhiqiang Lin and
                  Charalampos Papamanthou and
                  Michalis Polychronakis},
  title        = {Information Security - 22nd International Conference, {ISC} 2019,
                  New York City, NY, USA, September 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11723},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30215-3},
  doi          = {10.1007/978-3-030-30215-3},
  isbn         = {978-3-030-30214-6},
  timestamp    = {Mon, 02 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-10497,
  author       = {Yue Zhang and
                  Jian Weng and
                  Rajib Dey and
                  Yier Jin and
                  Zhiqiang Lin and
                  Xinwen Fu},
  title        = {On the (In)security of Bluetooth Low Energy One-Way Secure Connections
                  Only Mode},
  journal      = {CoRR},
  volume       = {abs/1908.10497},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.10497},
  eprinttype    = {arXiv},
  eprint       = {1908.10497},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-10497.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-01485,
  author       = {Paul Muntean and
                  Matthias Neumayer and
                  Zhiqiang Lin and
                  Gang Tan and
                  Jens Grossklags and
                  Claudia Eckert},
  title        = {Analyzing Control Flow Integrity with {LLVM-CFI}},
  journal      = {CoRR},
  volume       = {abs/1910.01485},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.01485},
  eprinttype    = {arXiv},
  eprint       = {1910.01485},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-01485.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenTL19,
  author       = {Qi Chen and
                  Chunming Tang and
                  Zhiqiang Lin},
  title        = {Efficient Explicit Constructions of Multipartite Secret Sharing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1100},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1100},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenTL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShiLHYC18,
  author       = {Haobin Shi and
                  Zhiqiang Lin and
                  Kao{-}Shing Hwang and
                  Shike Yang and
                  Jialin Chen},
  title        = {An Adaptive Strategy Selection Method With Reinforcement Learning
                  for Robotic Soccer Games},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {8376--8386},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2808266},
  doi          = {10.1109/ACCESS.2018.2808266},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShiLHYC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/YiLK18,
  author       = {Zongxiang Yi and
                  Zhiqiang Lin and
                  Lishan Ke},
  title        = {A generic method to construct zero-difference balanced functions},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {4},
  pages        = {591--609},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0247-4},
  doi          = {10.1007/S12095-017-0247-4},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/YiLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LinPLZ18,
  author       = {Zhiqiang Lin and
                  Dingyi Pei and
                  Dongdai Lin and
                  Xiaolei Zhang},
  title        = {Fast construction of binary ring FCSRs for hardware stream ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {939--953},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0370-4},
  doi          = {10.1007/S10623-017-0370-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LinPLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/YangLGCL18,
  author       = {Hang Yang and
                  Peng Li and
                  Xiaobin Guo and
                  Huajun Chen and
                  Zhiqiang Lin},
  title        = {A review: The effects of imperfect data on incremental decision tree},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {12},
  number       = {1/2},
  pages        = {162--174},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICT.2018.10008905},
  doi          = {10.1504/IJICT.2018.10008905},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijict/YangLGCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShiLZLH18,
  author       = {Haobin Shi and
                  Zhiqiang Lin and
                  Shuge Zhang and
                  Xuesi Li and
                  Kao{-}Shing Hwang},
  title        = {An adaptive decision-making method with fuzzy Bayesian reinforcement
                  learning for robot soccer},
  journal      = {Inf. Sci.},
  volume       = {436-437},
  pages        = {268--281},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.01.032},
  doi          = {10.1016/J.INS.2018.01.032},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ShiLZLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/VeneziaHYZZLG18,
  author       = {Vincent C. Venezia and
                  Alan Chih{-}Wei Hsiung and
                  Wu{-}Zang Yang and
                  Yuying Zhang and
                  Cheng Zhao and
                  Zhiqiang Lin and
                  Lindsay A. Grant},
  title        = {Second Generation Small Pixel Technology Using Hybrid Bond Stacking},
  journal      = {Sensors},
  volume       = {18},
  number       = {2},
  pages        = {667},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18020667},
  doi          = {10.3390/S18020667},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/VeneziaHYZZLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuZLZL18,
  author       = {Bo Lu and
                  Xiaokuan Zhang and
                  Ziman Ling and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {A Measurement Study of Authentication Rate-Limiting Mechanisms of
                  Modern Websites},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274714},
  doi          = {10.1145/3274694.3274714},
  timestamp    = {Wed, 05 Dec 2018 09:44:25 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LuZLZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/ZhangYL18,
  author       = {Chao Zhang and
                  Weiliang Yin and
                  Zhiqiang Lin},
  editor       = {Horst Lichter and
                  Thanwadee Sunetnanta and
                  Toni Anwar and
                  Taratip Suwannasart},
  title        = {Boost Symbolic Execution Using Dynamic State Merging and Forking},
  booktitle    = {Proceedings of the 6th International Workshop on Quantitative Approaches
                  to Software Quality co-located with 25th Asia-Pacific Software Engineering
                  Conference {(APSEC} 2018), Nara, Japan, December 4, 2018},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2273},
  pages        = {14--21},
  publisher    = {CEUR-WS.org},
  year         = {2018},
  url          = {https://ceur-ws.org/Vol-2273/QuASoQ-02.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:12 +0100},
  biburl       = {https://dblp.org/rec/conf/apsec/ZhangYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KarandeCLCKH18,
  author       = {Vishal Karande and
                  Swarup Chandra and
                  Zhiqiang Lin and
                  Juan Caballero and
                  Latifur Khan and
                  Kevin W. Hamlen},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{BCD:} Decomposing Binary Code Into Components Using Graph-Based Clustering},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {393--398},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196504},
  doi          = {10.1145/3196494.3196504},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KarandeCLCKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiLCZG18,
  author       = {Juanru Li and
                  Zhiqiang Lin and
                  Juan Caballero and
                  Yuanyuan Zhang and
                  Dawu Gu},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {412--425},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243783},
  doi          = {10.1145/3243734.3243783},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiLCZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgo/BaumanWZL18,
  author       = {Erick Bauman and
                  Huibo Wang and
                  Mingwei Zhang and
                  Zhiqiang Lin},
  editor       = {Jens Knoop and
                  Markus Schordan and
                  Teresa Johnson and
                  Michael F. P. O'Boyle},
  title        = {SGXElide: enabling enclave code secrecy via self-modification},
  booktitle    = {Proceedings of the 2018 International Symposium on Code Generation
                  and Optimization, {CGO} 2018, V{\"{o}}sendorf / Vienna, Austria,
                  February 24-28, 2018},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3168833},
  doi          = {10.1145/3168833},
  timestamp    = {Fri, 06 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cgo/BaumanWZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/ChenTL18,
  author       = {Qi Chen and
                  Chunming Tang and
                  Zhiqiang Lin},
  title        = {Locally Repairable Codes with Heterogeneous Locality Constraints},
  booktitle    = {{IEEE} Information Theory Workshop, {ITW} 2018, Guangzhou, China,
                  November 25-29, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ITW.2018.8613318},
  doi          = {10.1109/ITW.2018.8613318},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itw/ChenTL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BaumanLH18,
  author       = {Erick Bauman and
                  Zhiqiang Lin and
                  Kevin W. Hamlen},
  title        = {Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_05A-4\_Bauman\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BaumanLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenDZZL0LSYZ18,
  author       = {Jiongyi Chen and
                  Wenrui Diao and
                  Qingchuan Zhao and
                  Chaoshun Zuo and
                  Zhiqiang Lin and
                  XiaoFeng Wang and
                  Wing Cheong Lau and
                  Menghan Sun and
                  Ronghai Yang and
                  Kehuan Zhang},
  title        = {IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based
                  Fuzzing},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_01A-1\_Chen\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenDZZL0LSYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MunteanFTLGE18,
  author       = {Paul Muntean and
                  Matthias Fischer and
                  Gang Tan and
                  Zhiqiang Lin and
                  Jens Grossklags and
                  Claudia Eckert},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {{\(\tau\)}CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {423--444},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_20},
  doi          = {10.1007/978-3-030-00470-5\_20},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MunteanFTLGE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WuLLT18,
  author       = {Jiaxi Wu and
                  Xiaotong Lin and
                  Zhiqiang Lin and
                  Yi Tang},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {A Security Concern About Deep Learning Models},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {199--206},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_15},
  doi          = {10.1007/978-3-030-03026-1\_15},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WuLLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/BhattAL18,
  author       = {Manish Bhatt and
                  Irfan Ahmed and
                  Zhiqiang Lin},
  editor       = {Tiffany Barnes and
                  Daniel D. Garcia and
                  Elizabeth K. Hawthorne and
                  Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones},
  title        = {Using Virtual Machine Introspection for Operating Systems Security
                  Education},
  booktitle    = {Proceedings of the 49th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2018, Baltimore, MD, USA, February 21-24, 2018},
  pages        = {396--401},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3159450.3159606},
  doi          = {10.1145/3159450.3159606},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/BhattAL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SilvestroLLLL18,
  author       = {Sam Silvestro and
                  Hongyu Liu and
                  Tianyi Liu and
                  Zhiqiang Lin and
                  Tongping Liu},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Guarder: {A} Tunable Secure Allocator},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {117--133},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/silvestro},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SilvestroLLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TuLLH18,
  author       = {Yazhou Tu and
                  Zhiqiang Lin and
                  Insup Lee and
                  Xiali Hei},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Injected and Delivered: Fabricating Implicit Control over Actuation
                  Systems by Spoofing Inertial Sensors},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1545--1562},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/tu},
  timestamp    = {Wed, 09 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TuLLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-09085,
  author       = {Guoxing Chen and
                  Sanchuan Chen and
                  Yuan Xiao and
                  Yinqian Zhang and
                  Zhiqiang Lin and
                  Ten{-}Hwang Lai},
  title        = {SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution},
  journal      = {CoRR},
  volume       = {abs/1802.09085},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.09085},
  eprinttype    = {arXiv},
  eprint       = {1802.09085},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-09085.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-07558,
  author       = {Yazhou Tu and
                  Zhiqiang Lin and
                  Insup Lee and
                  Xiali Hei},
  title        = {Injected and Delivered: Fabricating Implicit Control over Actuation
                  Systems by Spoofing Inertial Sensors},
  journal      = {CoRR},
  volume       = {abs/1806.07558},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.07558},
  eprinttype    = {arXiv},
  eprint       = {1806.07558},
  timestamp    = {Wed, 09 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-07558.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/LinLP17,
  author       = {Zhiqiang Lin and
                  Dongdai Lin and
                  Dingyi Pei},
  title        = {Practical construction of ring LFSRs and ring FCSRs with low diffusion
                  delay for hardware cryptographic applications},
  journal      = {Cryptogr. Commun.},
  volume       = {9},
  number       = {4},
  pages        = {431--443},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12095-016-0183-8},
  doi          = {10.1007/S12095-016-0183-8},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/LinLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YuKLW17,
  author       = {Yuyin Yu and
                  Lishan Ke and
                  Zhiqiang Lin and
                  Qiuyan Wang},
  title        = {Permutation Polynomials over Z\emph{\({}_{\mbox{p\({}^{\mbox{n}}\)}}\)}
                  and Their Randomness},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {3},
  pages        = {913--915},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.913},
  doi          = {10.1587/TRANSFUN.E100.A.913},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YuKLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsys/GuHKLP17,
  author       = {Guofei Gu and
                  Hongxin Hu and
                  Eric Keller and
                  Zhiqiang Lin and
                  Donald E. Porter},
  title        = {Building a Security {OS} With Software Defined Infrastructure},
  booktitle    = {Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India,
                  September 2, 2017},
  pages        = {4:1--4:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3124680.3124720},
  doi          = {10.1145/3124680.3124720},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsys/GuHKLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KarandeBLK17,
  author       = {Vishal Karande and
                  Erick Bauman and
                  Zhiqiang Lin and
                  Latifur Khan},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {SGX-Log: Securing System Logs With {SGX}},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {19--30},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053034},
  doi          = {10.1145/3052973.3053034},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KarandeBLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZuoZL17,
  author       = {Chaoshun Zuo and
                  Qingchuan Zhao and
                  Zhiqiang Lin},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{AUTHSCOPE:} Towards Automatic Discovery of Vulnerable Authorizations
                  in Online Services},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {799--813},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134089},
  doi          = {10.1145/3133956.3134089},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZuoZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShaonKLK17,
  author       = {Fahad Shaon and
                  Murat Kantarcioglu and
                  Zhiqiang Lin and
                  Latifur Khan},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {SGX-BigMatrix: {A} Practical Encrypted Data Analytic Framework With
                  Trusted Processors},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1211--1228},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134095},
  doi          = {10.1145/3133956.3134095},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShaonKLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SilvestroLCLL17,
  author       = {Sam Silvestro and
                  Hongyu Liu and
                  Corey Crosser and
                  Zhiqiang Lin and
                  Tongping Liu},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {FreeGuard: {A} Faster Secure Heap Allocator},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2389--2403},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133957},
  doi          = {10.1145/3133956.3133957},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SilvestroLCLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimLT17,
  author       = {Taesoo Kim and
                  Zhiqiang Lin and
                  Chia{-}che Tsai},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {CCS'17 Tutorial Abstract / {SGX} Security and Privacy},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2613--2614},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3136068},
  doi          = {10.1145/3133956.3136068},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KimLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GuZZL17,
  author       = {Yufei Gu and
                  Qingchuan Zhao and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Gail{-}Joon Ahn and
                  Alexander Pretschner and
                  Gabriel Ghinita},
  title        = {{PT-CFI:} Transparent Backward-Edge Control Flow Violation Detection
                  Using Intel Processor Trace},
  booktitle    = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  pages        = {173--184},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3029806.3029830},
  doi          = {10.1145/3029806.3029830},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GuZZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChandraKLKKT17,
  author       = {Swarup Chandra and
                  Vishal Karande and
                  Zhiqiang Lin and
                  Latifur Khan and
                  Murat Kantarcioglu and
                  Bhavani Thuraisingham},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Securing Data Analytics on {SGX} with Randomization},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  pages        = {352--369},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6\_21},
  doi          = {10.1007/978-3-319-66402-6\_21},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChandraKLKKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FuBQL17,
  author       = {Yangchun Fu and
                  Erick Bauman and
                  Raul Quinonez and
                  Zhiqiang Lin},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable
                  Page Faults},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {357--380},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_16},
  doi          = {10.1007/978-3-319-66332-6\_16},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/FuBQL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ZuoL17,
  author       = {Chaoshun Zuo and
                  Zhiqiang Lin},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {{SMARTGEN:} Exposing Server URLs of Mobile Apps With Selective Symbolic
                  Execution},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web,
                  {WWW} 2017, Perth, Australia, April 3-7, 2017},
  pages        = {867--876},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3038912.3052609},
  doi          = {10.1145/3038912.3052609},
  timestamp    = {Tue, 06 Nov 2018 16:57:07 +0100},
  biburl       = {https://dblp.org/rec/conf/www/ZuoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KunduLH17,
  author       = {Ashish Kundu and
                  Zhiqiang Lin and
                  Joshua Hammond},
  title        = {Energy Attacks on Mobile Devices},
  journal      = {CoRR},
  volume       = {abs/1704.04464},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.04464},
  eprinttype    = {arXiv},
  eprint       = {1704.04464},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KunduLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-02746,
  author       = {Sam Silvestro and
                  Hongyu Liu and
                  Corey Crosser and
                  Zhiqiang Lin and
                  Tongping Liu},
  title        = {FreeGuard: {A} Faster Secure Heap Allocator},
  journal      = {CoRR},
  volume       = {abs/1709.02746},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.02746},
  eprinttype    = {arXiv},
  eprint       = {1709.02746},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-02746.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/CaballeroL16,
  author       = {Juan Caballero and
                  Zhiqiang Lin},
  title        = {Type Inference on Executables},
  journal      = {{ACM} Comput. Surv.},
  volume       = {48},
  number       = {4},
  pages        = {65:1--65:35},
  year         = {2016},
  url          = {https://doi.org/10.1145/2896499},
  doi          = {10.1145/2896499},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/CaballeroL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Al-NaamiCMKLHT16,
  author       = {Khaled Al{-}Naami and
                  Swarup Chandra and
                  Ahmad M. Mustafa and
                  Latifur Khan and
                  Zhiqiang Lin and
                  Kevin W. Hamlen and
                  Bhavani Thuraisingham},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Adaptive encrypted traffic fingerprinting with bi-directional dependence},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {177--188},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991123},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Al-NaamiCMKLHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GuL16,
  author       = {Yufei Gu and
                  Zhiqiang Lin},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Derandomizing Kernel Address Space Layout for Memory Introspection
                  and Forensics},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {62--72},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857707},
  doi          = {10.1145/2857705.2857707},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/GuL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icinfa/YangSYL16,
  author       = {Xinyi Yang and
                  Haobin Shi and
                  Shike Yang and
                  Zhiqiang Lin},
  title        = {Load balancing scheduling algorithm for storage system based on state
                  acquisition and dynamic feedback},
  booktitle    = {{IEEE} International Conference on Information and Automation, {ICIA}
                  2016, Ningbo, China, August 1-3, 2016},
  pages        = {1737--1742},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICInfA.2016.7832098},
  doi          = {10.1109/ICINFA.2016.7832098},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icinfa/YangSYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/BaumanL16,
  author       = {Erick Bauman and
                  Zhiqiang Lin},
  title        = {A Case for Protecting Computer Games With {SGX}},
  booktitle    = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  pages        = {4:1--4:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788.3007792},
  doi          = {10.1145/3007788.3007792},
  timestamp    = {Tue, 06 Nov 2018 16:57:13 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/BaumanL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZuoWLW16,
  author       = {Chaoshun Zuo and
                  Wubing Wang and
                  Zhiqiang Lin and
                  Rui Wang},
  title        = {Automatic Forgery of Cryptographically Consistent Messages to Identify
                  Security Vulnerabilities in Mobile Services},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/automatic-forgery-cryptographically-consistent-messages-identify-security-vulnerabilities.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ZuoWLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZengFL16,
  author       = {Junyuan Zeng and
                  Yangchun Fu and
                  Zhiqiang Lin},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Automatic Uncovering of Tap Points from Kernel Executions},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {49--70},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_3},
  doi          = {10.1007/978-3-319-45719-2\_3},
  timestamp    = {Fri, 27 Dec 2019 21:24:31 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZengFL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FuRLL0J16,
  author       = {Yangchun Fu and
                  Junghwan Rhee and
                  Zhiqiang Lin and
                  Zhichun Li and
                  Hui Zhang and
                  Guofei Jiang},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Detecting Stack Layout Corruptions with Robust Stack Unwinding},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {71--94},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_4},
  doi          = {10.1007/978-3-319-45719-2\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/FuRLL0J16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BaumanAL15,
  author       = {Erick Bauman and
                  Gbadebo Ayoade and
                  Zhiqiang Lin},
  title        = {A Survey on Hypervisor-Based Monitoring: Approaches, Applications,
                  and Evolutions},
  journal      = {{ACM} Comput. Surv.},
  volume       = {48},
  number       = {1},
  pages        = {10:1--10:33},
  year         = {2015},
  url          = {https://doi.org/10.1145/2775111},
  doi          = {10.1145/2775111},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/BaumanAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LinKLG15,
  author       = {Zhiqiang Lin and
                  Lishan Ke and
                  Dongdai Lin and
                  Jian Gao},
  title        = {On the LFSRization of a Class of {FCSR} Automata},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {434--440},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.434},
  doi          = {10.1587/TRANSFUN.E98.A.434},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LinKLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/Lin15,
  author       = {Zhiqiang Lin},
  title        = {On two circuit configurations of non-linear feedback shift registers},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {7},
  number       = {2/3},
  pages        = {185--201},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICT.2015.068378},
  doi          = {10.1504/IJICT.2015.068378},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijict/Lin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/LiuYLX15,
  author       = {Zhusong Liu and
                  Hongyang Yan and
                  Zhiqiang Lin and
                  Lingling Xu},
  title        = {An Improved Cloud Data Sharing Scheme with Hierarchical Attribute
                  Structure},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {21},
  number       = {3},
  pages        = {454--472},
  year         = {2015},
  url          = {http://www.jucs.org/jucs\_21\_3/an\_improved\_cloud\_data},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/LiuYLX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PrakashVYL15,
  author       = {Aravind Prakash and
                  Eknath Venkataramani and
                  Heng Yin and
                  Zhiqiang Lin},
  title        = {On the Trustworthiness of Memory Analysis - An Empirical Study from
                  the Perspective of Binary Execution},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {5},
  pages        = {557--570},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2366464},
  doi          = {10.1109/TDSC.2014.2366464},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/PrakashVYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PeiLZ15,
  author       = {Dingyi Pei and
                  Zhiqiang Lin and
                  Xiaolei Zhang},
  title        = {Construction of Transition Matrices for Ternary Ring Feedback With
                  Carry Shift Registers},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {61},
  number       = {5},
  pages        = {2942--2951},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIT.2015.2416712},
  doi          = {10.1109/TIT.2015.2416712},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/PeiLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/KimXLLRS15,
  author       = {Seung{-}Hun Kim and
                  Lei Xu and
                  Ziyi Liu and
                  Zhiqiang Lin and
                  Won Woo Ro and
                  Weidong Shi},
  title        = {Enhancing Software Dependability and Security with Hardware Supported
                  Instruction Address Space Randomization},
  booktitle    = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015},
  pages        = {251--262},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSN.2015.48},
  doi          = {10.1109/DSN.2015.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/KimXLLRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChenXLXML15,
  author       = {Ping Chen and
                  Jun Xu and
                  Zhiqiang Lin and
                  Dongyan Xu and
                  Bing Mao and
                  Peng Liu},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {A Practical Approach for Adaptive Data Structure Layout Randomization},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {69--89},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_4},
  doi          = {10.1007/978-3-319-24174-6\_4},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ChenXLXML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/BaumanLL15,
  author       = {Erick Bauman and
                  Yafeng Lu and
                  Zhiqiang Lin},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Half a Century of Practice: Who Is Still Storing Plaintext Passwords?},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {253--267},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_18},
  doi          = {10.1007/978-3-319-17533-1\_18},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/BaumanLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZengL15,
  author       = {Junyuan Zeng and
                  Zhiqiang Lin},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Towards Automatic Inference of Kernel Object Semantics from Binary
                  Code},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {538--561},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_25},
  doi          = {10.1007/978-3-319-26362-5\_25},
  timestamp    = {Sun, 25 Oct 2020 22:56:09 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZengL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/FuLB15,
  author       = {Yangchun Fu and
                  Zhiqiang Lin and
                  David Brumley},
  editor       = {Elisabetta Di Nitto and
                  Mark Harman and
                  Patrick Heymans},
  title        = {Automatically deriving pointer reference expressions from binary code
                  for memory dump analysis},
  booktitle    = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September
                  4, 2015},
  pages        = {614--624},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2786805.2786810},
  doi          = {10.1145/2786805.2786810},
  timestamp    = {Tue, 06 Nov 2018 16:59:22 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/FuLB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenCBLZG15,
  author       = {Jin Chen and
                  Haibo Chen and
                  Erick Bauman and
                  Zhiqiang Lin and
                  Binyu Zang and
                  Haibing Guan},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage
                  in Mobile {IME} Apps},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {657--690},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/chen-jin},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChenCBLZG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vee/ZengFL15,
  author       = {Junyuan Zeng and
                  Yangchun Fu and
                  Zhiqiang Lin},
  editor       = {Ada Gavrilovska and
                  Angela Demke Brown and
                  Bjarne Steensgaard},
  title        = {{PEMU:} {A} Pin Highly Compatible Out-of-VM Dynamic Binary Instrumentation
                  Framework},
  booktitle    = {Proceedings of the 11th {ACM} {SIGPLAN/SIGOPS} International Conference
                  on Virtual Execution Environments, Istanbul, Turkey, March 14-15,
                  2015},
  pages        = {147--160},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2731186.2731201},
  doi          = {10.1145/2731186.2731201},
  timestamp    = {Wed, 23 Jun 2021 16:58:51 +0200},
  biburl       = {https://dblp.org/rec/conf/vee/ZengFL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinPL15,
  author       = {Zhiqiang Lin and
                  Dingyi Pei and
                  Dongdai Lin},
  title        = {Construction of Transition Matrices for Binary FCSRs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1181},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/Lin14,
  author       = {Zhiqiang Lin},
  title        = {Clock-controlled generators with large period output sequences},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {278--285},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJGUC.2014.065371},
  doi          = {10.1504/IJGUC.2014.065371},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/Lin14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/GuFPLY14,
  author       = {Yufei Gu and
                  Yangchun Fu and
                  Aravind Prakash and
                  Zhiqiang Lin and
                  Heng Yin},
  title        = {Multi-Aspect, Robust, and Memory Exclusive Guest {OS} Fingerprinting},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {2},
  number       = {4},
  pages        = {380--394},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCC.2014.2338305},
  doi          = {10.1109/TCC.2014.2338305},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/GuFPLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RheeRLJX14,
  author       = {Junghwan Rhee and
                  Ryan D. Riley and
                  Zhiqiang Lin and
                  Xuxian Jiang and
                  Dongyan Xu},
  title        = {Data-Centric {OS} Kernel Malware Characterization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {1},
  pages        = {72--87},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2013.2291964},
  doi          = {10.1109/TIFS.2013.2291964},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/RheeRLJX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/KeL14,
  author       = {Lishan Ke and
                  Zhiqiang Lin},
  title        = {Distribution Properties and 2-Adic Complexity of Clock-Controlled
                  {FCSR} Sequences},
  booktitle    = {2014 Ninth International Conference on P2P, Parallel, Grid, Cloud
                  and Internet Computing, Guangdong, China, November 8-10, 2014},
  pages        = {386--389},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/3PGCIC.2014.134},
  doi          = {10.1109/3PGCIC.2014.134},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/3pgcic/KeL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FengPYL14,
  author       = {Qian Feng and
                  Aravind Prakash and
                  Heng Yin and
                  Zhiqiang Lin},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {{MACE:} high-coverage and robust memory analysis for commodity operating
                  systems},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {196--205},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664248},
  doi          = {10.1145/2664243.2664248},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FengPYL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/LiuSXL14,
  author       = {Ziyi Liu and
                  Weidong Shi and
                  Shouhuai Xu and
                  Zhiqiang Lin},
  editor       = {Gerhard P. Fettweis and
                  Wolfgang Nebel},
  title        = {Programmable decoder and shadow threads: Tolerate remote code injection
                  exploits with diversified redundancy},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2014, Dresden, Germany, March 24-28, 2014},
  pages        = {1--6},
  publisher    = {European Design and Automation Association},
  year         = {2014},
  url          = {https://doi.org/10.7873/DATE.2014.064},
  doi          = {10.7873/DATE.2014.064},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/LiuSXL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/UrbinaGCL14,
  author       = {David I. Urbina and
                  Yufei Gu and
                  Juan Caballero and
                  Zhiqiang Lin},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {SigPath: {A} Memory Graph Based Approach for Program Data Introspection
                  and Modification},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {237--256},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_14},
  doi          = {10.1007/978-3-319-11212-1\_14},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/UrbinaGCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SaberiFL14,
  author       = {Alireza Saberi and
                  Yangchun Fu and
                  Zhiqiang Lin},
  title        = {Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in {VMI} via
                  Decoupled Execution and Training Memoization},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/hybrid-bridge-efficiently-bridging-semantic-gap-virtual-machine-introspection-decoupled},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SaberiFL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SounthirarajSGLK14,
  author       = {David Sounthiraraj and
                  Justin Sahs and
                  Garret Greenwood and
                  Zhiqiang Lin and
                  Latifur Khan},
  title        = {SMV-Hunter: Large Scale, Automated Detection of {SSL/TLS} Man-in-the-Middle
                  Vulnerabilities in Android Apps},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/smv-hunter-large-scale-automated-detection-ssltls-man-middle-vulnerabilities-android-apps},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SounthirarajSGLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuZGL14,
  author       = {Zhaoyan Xu and
                  Jialong Zhang and
                  Guofei Gu and
                  Zhiqiang Lin},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted
                  Environment},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {22--45},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_2},
  doi          = {10.1007/978-3-319-11379-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XuZGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChandraLKK14,
  author       = {Swarup Chandra and
                  Zhiqiang Lin and
                  Ashish Kundu and
                  Latifur Khan},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Towards a Systematic Study of the Covert Channel Attacks in Smartphones},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {427--435},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_29},
  doi          = {10.1007/978-3-319-23829-6\_29},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChandraLKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/FuZL14,
  author       = {Yangchun Fu and
                  Junyuan Zeng and
                  Zhiqiang Lin},
  editor       = {Garth Gibson and
                  Nickolai Zeldovich},
  title        = {{HYPERSHELL:} {A} Practical Hypervisor Layer Guest {OS} Shell for
                  Automated In-VM Management},
  booktitle    = {2014 {USENIX} Annual Technical Conference, {USENIX} {ATC} '14, Philadelphia,
                  PA, USA, June 19-20, 2014},
  pages        = {85--96},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/atc14/technical-sessions/presentation/fu},
  timestamp    = {Mon, 01 Feb 2021 08:43:38 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/FuZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PattukKLU14,
  author       = {Erman Pattuk and
                  Murat Kantarcioglu and
                  Zhiqiang Lin and
                  Huseyin Ulusoy},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Preventing Cryptographic Key Leakage in Cloud Virtual Machines},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {703--718},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/pattuk},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PattukKLU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PengDZXLS14,
  author       = {Fei Peng and
                  Zhui Deng and
                  Xiangyu Zhang and
                  Dongyan Xu and
                  Zhiqiang Lin and
                  Zhendong Su},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {X-Force: Force-Executing Binary Programs for Security Applications},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {829--844},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/peng},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PengDZXLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FuL13,
  author       = {Yangchun Fu and
                  Zhiqiang Lin},
  title        = {Bridging the Semantic Gap in Virtual Machine Introspection via Online
                  Kernel Data Redirection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {7},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516951.2505124},
  doi          = {10.1145/2516951.2505124},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/FuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FuLH13,
  author       = {Yangchun Fu and
                  Zhiqiang Lin and
                  Kevin W. Hamlen},
  editor       = {Charles N. Payne Jr.},
  title        = {Subverting system authentication with context-aware, reactive virtual
                  machine introspection},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {229--238},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523664},
  doi          = {10.1145/2523649.2523664},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FuLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZengFMLZX13,
  author       = {Junyuan Zeng and
                  Yangchun Fu and
                  Kenneth A. Miller and
                  Zhiqiang Lin and
                  Xiangyu Zhang and
                  Dongyan Xu},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Obfuscation resilient binary code reuse through trace-oriented programming},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {487--498},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516664},
  doi          = {10.1145/2508859.2516664},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZengFMLZX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/PrakashVYL13,
  author       = {Aravind Prakash and
                  Eknath Venkataramani and
                  Heng Yin and
                  Zhiqiang Lin},
  title        = {Manipulating semantic values in kernel data structures: Attack assessments
                  and implications},
  booktitle    = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSN.2013.6575344},
  doi          = {10.1109/DSN.2013.6575344},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/PrakashVYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/Lin13,
  author       = {Zhiqiang Lin},
  title        = {The Transformation from the Galois {NLFSR} to the Fibonacci Configuration},
  booktitle    = {2013 Fourth International Conference on Emerging Intelligent Data
                  and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013},
  pages        = {335--339},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/EIDWT.2013.64},
  doi          = {10.1109/EIDWT.2013.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eidwt/Lin13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/XuZGL13,
  author       = {Zhaoyan Xu and
                  Jialong Zhang and
                  Guofei Gu and
                  Zhiqiang Lin},
  title        = {{AUTOVAC:} Automatically Extracting System Resource Constraints and
                  Generating Vaccines for Malware Immunization},
  booktitle    = {{IEEE} 33rd International Conference on Distributed Computing Systems,
                  {ICDCS} 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, {USA}},
  pages        = {112--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICDCS.2013.69},
  doi          = {10.1109/ICDCS.2013.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/XuZGL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/CaiL13,
  author       = {Zhipeng Cai and
                  Zhiqiang Lin},
  title        = {Message from the {IPCCC} 2013 technical program chairs},
  booktitle    = {{IEEE} 32nd International Performance Computing and Communications
                  Conference, {IPCCC} 2013, San Diego, CA, USA, December 6-8, 2013},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PCCC.2013.6742749},
  doi          = {10.1109/PCCC.2013.6742749},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/CaiL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/LiuLZWLS13,
  author       = {Ziyi Liu and
                  Jong{-}Hyuk Lee and
                  Junyuan Zeng and
                  Yuanfeng Wen and
                  Zhiqiang Lin and
                  Weidong Shi},
  editor       = {Avi Mendelson},
  title        = {{CPU} transparent protection of {OS} kernel and hypervisor integrity
                  with programmable {DRAM}},
  booktitle    = {The 40th Annual International Symposium on Computer Architecture,
                  ISCA'13, Tel-Aviv, Israel, June 23-27, 2013},
  pages        = {392--403},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2485922.2485956},
  doi          = {10.1145/2485922.2485956},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/LiuLZWLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vee/FuL13,
  author       = {Yangchun Fu and
                  Zhiqiang Lin},
  editor       = {Steve Muir and
                  Gernot Heiser and
                  Stephen M. Blackburn},
  title        = {{EXTERIOR:} using a dual-VM based external shell for guest-OS introspection,
                  configuration, and recovery},
  booktitle    = {{ACM} {SIGPLAN/SIGOPS} International Conference on Virtual Execution
                  Environments (co-located with {ASPLOS} 2013), {VEE} '13, Houston,
                  TX, USA, March 16-17, 2013},
  pages        = {97--110},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2451512.2451534},
  doi          = {10.1145/2451512.2451534},
  timestamp    = {Thu, 24 Jun 2021 16:19:30 +0200},
  biburl       = {https://dblp.org/rec/conf/vee/FuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HandLGT12,
  author       = {Scott Hand and
                  Zhiqiang Lin and
                  Guofei Gu and
                  Bhavani Thuraisingham},
  title        = {Bin-Carver: Automatic recovery of binary executable files},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S108--S117},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.014},
  doi          = {10.1016/J.DIIN.2012.05.014},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HandLGT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WartellMHL12,
  author       = {Richard Wartell and
                  Vishwath Mohan and
                  Kevin W. Hamlen and
                  Zhiqiang Lin},
  editor       = {Robert H'obbes' Zakon},
  title        = {Securing untrusted code via compiler-agnostic binary rewriting},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {299--308},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420995},
  doi          = {10.1145/2420950.2420995},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WartellMHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WartellMHL12,
  author       = {Richard Wartell and
                  Vishwath Mohan and
                  Kevin W. Hamlen and
                  Zhiqiang Lin},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Binary stirring: self-randomizing instruction addresses of legacy
                  x86 binary code},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {157--168},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382216},
  doi          = {10.1145/2382196.2382216},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WartellMHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuZGL12,
  author       = {Zhaoyan Xu and
                  Jialong Zhang and
                  Guofei Gu and
                  Zhiqiang Lin},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Automatic generation of vaccines for malware immunization},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1037--1039},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382317},
  doi          = {10.1145/2382196.2382317},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuZGL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud/GuFPLY12,
  author       = {Yufei Gu and
                  Yangchun Fu and
                  Aravind Prakash and
                  Zhiqiang Lin and
                  Heng Yin},
  editor       = {Michael J. Carey and
                  Steven Hand},
  title        = {OS-Sommelier: memory-only operating system fingerprinting in the cloud},
  booktitle    = {{ACM} Symposium on Cloud Computing, {SOCC} '12, San Jose, CA, USA,
                  October 14-17, 2012},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2391229.2391234},
  doi          = {10.1145/2391229.2391234},
  timestamp    = {Tue, 20 Dec 2022 17:33:10 +0100},
  biburl       = {https://dblp.org/rec/conf/cloud/GuFPLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LinRWZX12,
  author       = {Zhiqiang Lin and
                  Junghwan Rhee and
                  Chao Wu and
                  Xiangyu Zhang and
                  Dongyan Xu},
  title        = {Discovering Semantic Data of Interest from Un-mappable Memory with
                  Confidence},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/discovering-semantic-data-interest-un-mappable-memory-confidence},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LinRWZX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FuL12,
  author       = {Yangchun Fu and
                  Zhiqiang Lin},
  title        = {Space Traveling across {VM:} Automatically Bridging the Semantic Gap
                  in Virtual Machine Introspection via Online Kernel Data Redirection},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {586--600},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.40},
  doi          = {10.1109/SP.2012.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FuL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RheeLX11,
  author       = {Junghwan Rhee and
                  Zhiqiang Lin and
                  Dongyan Xu},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Characterizing kernel malware behavior with kernel data access patterns},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {207--216},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966940},
  doi          = {10.1145/1966913.1966940},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RheeLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LinRZXJ11,
  author       = {Zhiqiang Lin and
                  Junghwan Rhee and
                  Xiangyu Zhang and
                  Dongyan Xu and
                  Xuxian Jiang},
  title        = {SigGraph: Brute Force Scanning of Kernel Data Structure Instances
                  Using Graph-based Signatures},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/siggraph-brute-force-scanning-of-kernel-data-structure-instances-using-graph-based-signatures},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LinRZXJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinP11,
  author       = {Zhiqiang Lin and
                  Dingyi Pei},
  title        = {Constructing a Diversified {FCSR} with a Given Connection Integer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/LinZX10,
  author       = {Zhiqiang Lin and
                  Xiangyu Zhang and
                  Dongyan Xu},
  title        = {Reverse Engineering Input Syntactic Structure from Program Execution
                  and Its Applications},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {36},
  number       = {5},
  pages        = {688--703},
  year         = {2010},
  url          = {https://doi.org/10.1109/TSE.2009.54},
  doi          = {10.1109/TSE.2009.54},
  timestamp    = {Thu, 05 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/LinZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LinZX10,
  author       = {Zhiqiang Lin and
                  Xiangyu Zhang and
                  Dongyan Xu},
  title        = {Reuse-oriented camouflaging trojan: Vulnerability detection and attack
                  construction},
  booktitle    = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July
                  1 2010},
  pages        = {281--290},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DSN.2010.5544305},
  doi          = {10.1109/DSN.2010.5544305},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LinZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/BaoZLZX10,
  author       = {Tao Bao and
                  Yunhui Zheng and
                  Zhiqiang Lin and
                  Xiangyu Zhang and
                  Dongyan Xu},
  editor       = {Paolo Tonella and
                  Alessandro Orso},
  title        = {Strict control dependence and its effect on dynamic information flow
                  analyses},
  booktitle    = {Proceedings of the Nineteenth International Symposium on Software
                  Testing and Analysis, {ISSTA} 2010, Trento, Italy, July 12-16, 2010},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1831708.1831711},
  doi          = {10.1145/1831708.1831711},
  timestamp    = {Tue, 06 Nov 2018 16:57:30 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/BaoZLZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LinZX10,
  author       = {Zhiqiang Lin and
                  Xiangyu Zhang and
                  Dongyan Xu},
  title        = {Automatic Reverse Engineering of Data Structures from Binary Execution},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/automatic-reverse-engineering-data-structures-binary-execution},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LinZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/LinRX09,
  author       = {Zhiqiang Lin and
                  Ryan D. Riley and
                  Dongyan Xu},
  editor       = {Ulrich Flegel and
                  Danilo Bruschi},
  title        = {Polymorphing Software by Randomizing Data Structure Layout},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5587},
  pages        = {107--126},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02918-9\_7},
  doi          = {10.1007/978-3-642-02918-9\_7},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/LinRX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isnn/DuanLMQ09,
  author       = {Lijuan Duan and
                  Zhiqiang Lin and
                  Jun Miao and
                  Yuanhua Qiao},
  editor       = {Wen Yu and
                  Haibo He and
                  Nian Zhang},
  title        = {A Method of Human Skin Region Detection Based on {PCNN}},
  booktitle    = {Advances in Neural Networks - {ISNN} 2009, 6th International Symposium
                  on Neural Networks, {ISNN} 2009, Wuhan, China, May 26-29, 2009, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5553},
  pages        = {486--493},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01513-7\_53},
  doi          = {10.1007/978-3-642-01513-7\_53},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/isnn/DuanLMQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangWLZ09,
  author       = {Tielei Wang and
                  Tao Wei and
                  Zhiqiang Lin and
                  Wei Zou},
  title        = {IntScope: Automatically Detecting Integer Overflow Vulnerability in
                  {X86} Binary Using Symbolic Execution},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/intscope-automatically-detecting-integer-overflow-vulnerability-in-x86-binary-using-symbolic-execution/},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WangWLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/LinHSLB08,
  author       = {Zhiqiang Lin and
                  Michael W. Hoffman and
                  Nathan Schemm and
                  Walter D. Leon{-}Salas and
                  Sina Balkir},
  title        = {A {CMOS} Image Sensor for Multi-Level Focal Plane Image Decomposition},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {55-I},
  number       = {9},
  pages        = {2561--2572},
  year         = {2008},
  url          = {https://doi.org/10.1109/TCSI.2008.920094},
  doi          = {10.1109/TCSI.2008.920094},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcas/LinHSLB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LinZX08,
  author       = {Zhiqiang Lin and
                  Xiangyu Zhang and
                  Dongyan Xu},
  title        = {Convicting exploitable software vulnerabilities: An efficient input
                  provenance based approach},
  booktitle    = {The 38th Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2008, June 24-27, 2008, Anchorage, Alaska,
                  USA, Proceedings},
  pages        = {247--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/DSN.2008.4630093},
  doi          = {10.1109/DSN.2008.4630093},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LinZX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/LinHLSB08,
  author       = {Zhiqiang Lin and
                  Michael W. Hoffman and
                  Walter D. Leon{-}Salas and
                  Nathan Schemm and
                  Sina Balkir},
  title        = {A {CMOS} image sensor with focal plane {SPIHT} image compression},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2008), 18-21
                  May 2008, Sheraton Seattle Hotel, Seattle, Washington, {USA}},
  pages        = {2134--2137},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISCAS.2008.4541872},
  doi          = {10.1109/ISCAS.2008.4541872},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/LinHLSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LinJXZ08,
  author       = {Zhiqiang Lin and
                  Xuxian Jiang and
                  Dongyan Xu and
                  Xiangyu Zhang},
  title        = {Automatic Protocol Format Reverse Engineering through Context-Aware
                  Monitored Execution},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/automatic-protocol-format-reverse-engineering-through-context-aware-monitored-execution/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LinJXZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/LinZ08,
  author       = {Zhiqiang Lin and
                  Xiangyu Zhang},
  editor       = {Mary Jean Harrold and
                  Gail C. Murphy},
  title        = {Deriving input syntactic structure from execution},
  booktitle    = {Proceedings of the 16th {ACM} {SIGSOFT} International Symposium on
                  Foundations of Software Engineering, 2008, Atlanta, Georgia, USA,
                  November 9-14, 2008},
  pages        = {83--93},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1453101.1453114},
  doi          = {10.1145/1453101.1453114},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/LinZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/LinHLSB07,
  author       = {Zhiqiang Lin and
                  Michael W. Hoffman and
                  Walter D. Leon{-}Salas and
                  Nathan Schemm and
                  Sina Balkir},
  title        = {A {CMOS} Front-End for a Lossy Image Compression Sensor},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20
                  May 2007, New Orleans, Louisiana, {USA}},
  pages        = {2838--2841},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISCAS.2007.378763},
  doi          = {10.1109/ISCAS.2007.378763},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/LinHLSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LinMX06,
  author       = {Zhiqiang Lin and
                  Bing Mao and
                  Li Xie},
  title        = {A Practical Framework for Dynamically Immunizing Software Security
                  Vulnerabilities},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {348--357},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.11},
  doi          = {10.1109/ARES.2006.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LinMX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/LinHLSB06,
  author       = {Zhiqiang Lin and
                  Michael W. Hoffman and
                  Walter D. Leon{-}Salas and
                  Nathan Schemm and
                  Sina Balkir},
  title        = {Effects of charge-based computation non-idealities on {CMOS} image
                  compression sensors},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24
                  May 2006, Island of Kos, Greece},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCAS.2006.1693801},
  doi          = {10.1109/ISCAS.2006.1693801},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/LinHLSB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LinXLMX06,
  author       = {Zhiqiang Lin and
                  Nai Xia and
                  Guole Li and
                  Bing Mao and
                  Li Xie},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Transparent Run-Time Prevention of Format-String Attacks Via Dynamic
                  Taint and Flexible Validation},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_2},
  doi          = {10.1007/11836810\_2},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LinXLMX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/WangMX05,
  author       = {Zhiqiang Lin and
                  Chao Wang and
                  Bing Mao and
                  Li Xie},
  title        = {A policy flexible architecture for secure operating system},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {39},
  number       = {3},
  pages        = {24--33},
  year         = {2005},
  url          = {https://doi.org/10.1145/1075395.1075397},
  doi          = {10.1145/1075395.1075397},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/WangMX05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/LinHLSB05,
  author       = {Zhiqiang Lin and
                  Michael W. Hoffman and
                  Walter D. Leon{-}Salas and
                  Nathan Schemm and
                  Sina Balkir},
  title        = {A {CMOS} image sensor for focal plane decomposition},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2005), 23-26
                  May 2005, Kobe, Japan},
  pages        = {5322--5325},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISCAS.2005.1465837},
  doi          = {10.1109/ISCAS.2005.1465837},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/LinHLSB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics