default search action
Yueqi Chen 0001
Person information
- affiliation: University of Colorado Boulder, Department of Computer Science, CO, USA
- affiliation (PhD 2022): Pennsylvania State University, College of Information Sciences & Technology, University Park, PA, USA
Other persons with the same name
- Yueqi Chen — disambiguation page
- Yueqi Chen 0002 — Tsinghua Shenzhen International Graduate School, Shenzhen, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j2]Ziqin Liu, Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Yalong Zou, Dongliang Mu, Xinyu Xing:
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs. IEEE Trans. Dependable Secur. Comput. 21(1): 93-109 (2024) - [c13]Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael V. Le, Dang K. Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom:
SeaK: Rethinking the Design of a Secure Allocator for OS Kernel. USENIX Security Symposium 2024 - [i2]Zicheng Wang, Tiejin Chen, Qinrun Dai, Yueqi Chen, Hua Wei, Qingkai Zeng:
When eBPF Meets Machine Learning: On-the-fly OS Kernel Compartmentalization. CoRR abs/2401.05641 (2024) - 2023
- [c12]Zicheng Wang, Yueqi Chen, Qingkai Zeng:
PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel. USENIX Security Symposium 2023: 4193-4210 - [c11]Yuhang Wu, Zhenpeng Lin, Yueqi Chen, Dang K. Le, Dongliang Mu, Xinyu Xing:
Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness. USENIX Security Symposium 2023: 4247-4264 - 2022
- [c10]Dongliang Mu, Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Chensheng Yu, Xinyu Xing, Gang Wang:
An In-depth Analysis of Duplicated Linux Kernel Bug Reports. NDSS 2022 - [c9]Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Dongliang Mu, Chensheng Yu, Xinyu Xing, Kang Li:
GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs. SP 2022: 2078-2095 - [c8]Kyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao:
Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability. USENIX Security Symposium 2022: 71-88 - 2020
- [j1]Shengjian Guo, Yueqi Chen, Jiyong Yu, Meng Wu, Zhiqiang Zuo, Peng Li, Yueqiang Cheng, Huibo Wang:
Exposing cache timing side-channel leaks through out-of-order symbolic execution. Proc. ACM Program. Lang. 4(OOPSLA): 147:1-147:32 (2020) - [c7]Yueqi Chen, Zhenpeng Lin, Xinyu Xing:
A Systematic Study of Elastic Objects in Kernel Exploitation. CCS 2020: 1165-1184 - [c6]Shengjian Guo, Yueqi Chen, Peng Li, Yueqiang Cheng, Huibo Wang, Meng Wu, Zhiqiang Zuo:
SpecuSym: speculative symbolic execution for cache timing leak detection. ICSE 2020: 1235-1247
2010 – 2019
- 2019
- [c5]Yueqi Chen, Xinyu Xing:
SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel. CCS 2019: 1707-1722 - [c4]Dongliang Mu, Wenbo Guo, Alejandro Cuevas, Yueqi Chen, Jinxuan Gai, Xinyu Xing, Bing Mao, Chengyu Song:
RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis. ASE 2019: 924-935 - [c3]Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang:
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports. USENIX Security Symposium 2019: 869-885 - [c2]Wei Wu, Yueqi Chen, Xinyu Xing, Wei Zou:
KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities. USENIX Security Symposium 2019: 1187-1204 - [i1]Shengjian Guo, Yueqi Chen, Peng Li, Yueqiang Cheng, Huibo Wang, Meng Wu, Zhiqiang Zuo:
SpecuSym: Speculative Symbolic Execution for Cache Timing Leak Detection. CoRR abs/1911.00507 (2019) - 2018
- [c1]Wei Wu, Yueqi Chen, Jun Xu, Xinyu Xing, Xiaorui Gong, Wei Zou:
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities. USENIX Security Symposium 2018: 781-797
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint