Zheng Leong Chua
Zheng Leong Chua
Advanca
Verifierad e-postadress på iiyume.org
Titel
Citeras av
Citeras av
År
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
2016 IEEE Symposium on Security and Privacy (SP), 969-986, 2016
2732016
Preventing page faults from telling your secrets
S Shinde, ZL Chua, V Narayanan, P Saxena
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
1902016
Automatic generation of data-oriented exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th {USENIX} Security Symposium ({USENIX} Security 15), 177-192, 2015
1672015
Neural nets can learn function type signatures from binaries
ZL Chua, S Shen, P Saxena, Z Liang
26th {USENIX} Security Symposium ({USENIX} Security 17), 99-116, 2017
812017
A look at targeted attacks through the lense of an {NGO}
S Le Blond, A Uritesc, C Gilbert, ZL Chua, P Saxena, E Kirda
23rd {USENIX} Security Symposium ({USENIX} Security 14), 543-558, 2014
812014
Preventing your faults from telling your secrets: Defenses against pigeonhole attacks
S Shinde, ZL Chua, V Narayanan, P Saxena
arXiv preprint arXiv:1506.04832, 2015
242015
" The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
232016
One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics.
ZL Chua, Y Wang, T Baluta, P Saxena, Z Liang, P Su
NDSS, 2019
72019
Identifying arbitrary memory access vulnerabilities in privilege-separated software
H Hu, ZL Chua, Z Liang, P Saxena
European Symposium on Research in Computer Security, 312-331, 2015
72015
Understanding Rowhammer attacks through the lens of a unified reference framework
X Lou, F Zhang, ZL Chua, Z Liang, Y Cheng, Y Zhou
arXiv preprint arXiv:1901.03538, 2019
62019
Scalable quantitative verification for deep neural networks
T Baluta, ZL Chua, KS Meel, P Saxena
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
22021
Data-Oriented Programming
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
On the Expressiveness of Non-Control Data Attacks, 2016
22016
Fuzzing program logic deeply hidden in binary program stages
Y Wang, ZL Chua, Y Liu, P Su, Z Liang
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
12019
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation
VLL Thing, ZL Chua
IFIP International Information Security Conference, 217-230, 2013
12013
Enabling practical experimentation in cyber-security training
J Mao, ZL Chua, Z Liang
2017 IEEE Conference on Dependable and Secure Computing, 516-517, 2017
2017
Carvalho 272 Alshammari, Abdulrahman 187 Alsuhaibani, Reem S. 242 Álvarez-García, Miguel Ángel 150
AS Ami, S An, R Ananthanarayanan, S Apel, V Arnaoudova, C Arora, ...
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics
J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–17