$Id: pub.t2t, v1.0, last updated %%mtime(%c) Exp $ %! Target: %! Options: --toc --css-sugar --encoding=iso-8859-1 %! Style: tech.css %! PreProc: %! PostProc: %! include: ''ps.js'' Note: these publication materials are presented to ensure a timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each paper's copyright (e.g., ACM/IEEE/USENIX/ISOC Copyright Policy). --------------------------------------------------------------------------- ===Publications=== || Venue | Paper Details | || 2024 || | **OOPSLA** | "Cocoon: Static Information Flow Control in Rust". Ada Lamba, Max Taylor, Vincent Beardsley, Jacob Bambeck, Michael D. Bond, and Zhiqiang Lin. In //Proceedings of the ACM on Programming Languages (OOPSLA-edition)//. October 2024. [[PDF file/OOPSLA24.pdf]][[Bibtex bib/oopsla24.bib]] | | **ASIACCS** | "Root Free Attacks: Exploiting Mobile Platform’s Super Apps From Desktop". Chao Wang, Yue Zhang, and Zhiqiang Lin. In //Proceedings of the 19th ACM Asia Conference on Computer and Communications Security//, July 2024. [[PDF file/ASIACCS24.pdf]][[Slides file/ASIACCS24-slides.pdf]][[Bibtex bib/asiaccs24.bib]] | | **ASPLOS** | "FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation". Ali Ahad, Gang Wang, Chung Hwan Kim, Suman Jana, Zhiqiang Lin, Yonghwi Kwon. In //Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems//. March 2024. [[PDF file/ASPLOS24.pdf]][[Bibtex bib/asplos24.bib]] | | **NDSS** | "5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service". Haohuang Wen, Phillip Porras, Vinod Yegneswaran, Ashish Gehani, and Zhiqiang Lin. In //Network and Distributed System Security Symposium//. March 2024. [[PDF file/NDSS24.pdf]][[Bibtex bib/NDSS24.bib]] | || 2023 || | **Arxiv** | "Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models". Xin Jin, Jonathan Larson, Weiwei Yang, and Zhiqiang Lin. In //arxiv//. December 2023. [[PDF https://arxiv.org/abs/2312.09601]] | | **CCS** | "Uncovering and Exploiting Hidden APIs in Mobile Super Apps". Chao Wang, Yue Zhang, and Zhiqiang Lin. In //Proceedings of the 30th ACM Conference on Computer and Communications Security//. November 2023. [[PDF file/CCS23a.pdf]][[Slides file/CCS23a-slides.pdf]][[Bibtex bib/ccs23a.bib]] | | **CCS** | "Don’t Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs". Yue Zhang, Yuqing Yang, and Zhiqiang Lin. In //Proceedings of the 30th ACM Conference on Computer and Communications Security//. November 2023. [[PDF file/CCS23b.pdf]][[Slides file/CCS23b-slides.pdf]][[Bibtex bib/ccs23b.bib]] | | **RAID** | "Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating". Md Sakib Anwar, Chaoshun Zuo, Carter Yagemann, and Zhiqiang Lin. In //Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses//, October 2023. [[PDF file/RAID23a.pdf]][[Slides file/RAID23a-slides.pdf]][[Bibtex bib/raid23a.bib]] | | **RAID** | "Renewable Just-In-Time Control-Flow Integrity". Erick Barman, Kevin Hamlin, Juan Duan, and Zhiqiang Lin. In //Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses//, October 2023. [[PDF file/RAID23b.pdf]][[Slides file/RAID23b-slides.pdf]][[Bibtex bib/raid23b.bib]] | | **SMARTSP** | "ADC-Bank: Detecting Acoustic Out-of-Band Signal Injection on Inertial Sensors".Jianyi Zhang, Yuchen Wang, Yazhou Tu, Sara Rampazzi, Zhiqiang Lin, Insup Lee, and Xiali Hei.. In //Proceedings of The inaugural EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles//, October 2023. [[PDF file/SMARTSP.pdf]] | | **USENIX-SEC** | "Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries". Haohuang Wen, and Zhiqiang Lin. In //Proceedings of the 32nd USENIX Security Symposium//, August 2023. [[PDF file/SEC23a.pdf]][[Slides /file/sec23a_slides.pdf]][[Bibtex bib/sec23a.bib]] | | **USENIX-SEC** | "Controlled Data Races in Enclaves: Attacks and Detection". Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang. In //Proceedings of the 32nd USENIX Security Symposium//, August 2023. [[PDF file/SEC23b.pdf]][[Slides /file/sec23b_slides.pdf]][[Bibtex bib/sec23b.bib]] | | **USENIX-SEC** | "One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat". Chao Wang, Yue Zhang, and Zhiqiang Lin. In //Proceedings of the 32nd USENIX Security Symposium//, August 2023. [[PDF file/SEC23c.pdf]][[Slides /file/sec23c_slides.pdf]][[Bibtex bib/sec23c.bib]] | | **USENIX-SEC** | "Reusable Enclaves for Confidential Serverless Computing". Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, Yinqian Zhang, and Zhiqiang Lin. In //Proceedings of the 32nd USENIX Security Symposium//, August 2023. [[PDF file/SEC23d.pdf]][[Slides /file/sec23d_slides.pdf]][[Bibtex bib/sec23d.bib]] | | **USENIX-SEC** | "Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract". Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, and Kaiyuan Zhang. In //Proceedings of the 32nd USENIX Security Symposium//, August 2023. [[PDF file/SEC23e.pdf]][[Slides /file/sec23e_slides.pdf]][[Bibtex bib/sec23e.bib]] | | **USENIX-SEC** | "A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games". Chaoshun Zuo, Chao Wang, and Zhiqiang Lin. In //Proceedings of the 32nd USENIX Security Symposium//, August 2023. [[PDF file/SEC23f.pdf]][[Slides /file/sec23f_slides.pdf]][[Bibtex bib/sec23f.bib]] | | **ASIACCS** | "Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide". Pallavi Sivakumaran, Chaoshun Zuo, Zhiqiang Lin, and Jorge Blasco. In //Proceedings of the 18th ACM Asia Conference on Computer and Communications Security//, July 2023. [[PDF file/ASIACCS23.pdf]][[Slides file/ASIACCS23.pdf]][[Bibtex bib/asiaccs23.bib]] | | **DIMVA** | "PWRLEAK: Exploiting Power Reporting Interface for Side-channel Attacks on AMD SEV". Wubing Wang, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin. In //Proceedings of the 20th Conference on Detection of Intrusions and Malware & Vulnerability Assessment//. July 2023. [[PDF file/DIMVA23.pdf]][[Bibtex bib/dimva23.bib]] | | **SIGMETRICS** | "Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding". Haoran Lu, Qingchuan Zhao, Yongliang Chen, Xiaojing Liao, and Zhiqiang Lin. In //Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)//. June 2023. [[PDF file/SIGMETRICS23.pdf]][[Bibtex bib/sigmetrics23.bib]] | | **ICSE** | "TaintMini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis". Chao Wang, Ronny Ko, Yue Zhang, Allen Yuqing Yang, and Zhiqiang Lin. In //Proceedings of 45th ACM/IEEE International Conference on Software Engineering//, May 2023. [[PDF file/ICSE23a.pdf]][[Bibtex bib/icse23a.bib]] | | **ICSE** | "Demystifying Exploitable Bugs in Smart Contracts". Zhuo Zhang, Brian Zhang, Wen Xu, and Zhiqiang Lin. In //Proceedings of 45th ACM/IEEE International Conference on Software Engineering//, May 2023. [[PDF file/ICSE23b.pdf]][[Bibtex bib/icse23b.bib]] | | **NDSS** | "Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing". Mohit K. Jangid, Yue Zhang and Zhiqiang Lin. In //Proceedings of the 30th ISOC Network and Distributed System Security Symposium//, San Diego, CA, April 2023. [[PDF file/NDSS23a.pdf]][[Slides file/NDSS23a-slides.pdf]][[Bibtex bib/ndss23a.bib]] | | **NDSS** | "Thwarting Smartphone SMS Attacks at the Radio Interface Layer". Haohuang Wen, Phil Porras, Vinod Yegneswaran, and Zhiqiang Lin. In //Proceedings of the 30th ISOC Network and Distributed System Security Symposium//, San Diego, CA, April 2023. [[PDF file/NDSS23b.pdf]][[Slides file/NDSS23b-slides.pdf]][[Bibtex bib/ndss23b.bib]] | || 2022 || | **EmgWireless** | "A Fine-Grained Telemetry Stream for Security Services in 5G Open Radio Access Networks". Haohuang Wen, Phillip Porras, Vinod Yegneswaran, and Zhiqiang Lin. In //Proceedings of the 1st Workshop on Emerging Topics in Wireless//. December 2022. [[PDF file/EW22.pdf]][[Slides file/EW22-slides.pdf]][[Bibtex bib/ew22.bib]] | | **CCS** | "When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure". Yue Zhang, and Zhiqiang Lin. In //Proceedings of the 29th ACM Conference on Computer and Communications Security//. November 2022. [[PDF file/CCS22a.pdf]][[Slides file/CCS22a-slides.pdf]][[Bibtex bib/ccs22a.bib]] (//**Best Paper Award Honorable Mention**//) | | | **CCS** | "Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection". Allen Y. Yang, Yue Zhang, Zhiqiang Lin. In //Proceedings of the 29th ACM Conference on Computer and Communications Security//. November 2022. [[PDF file/CCS22b.pdf]][[Slides file/CCS22b-slides.pdf]][[Bibtex bib/ccs22b.bib]] | | **CCS** | "Detecting and Measuring Misconfigured Manifest in Android Apps". Allen Y. Yang, Mohamed Elsabagh, Chaoshun Zuo, Ryan Johnson, Angelos Stavrou, and Zhiqiang Lin. In //Proceedings of the 29th ACM Conference on Computer and Communications Security//. November 2022. [[PDF file/CCS22c.pdf]][[Slides file/CCS22c-slides.pdf]][[Bibtex bib/ccs22c.bib]] | | **CCS** | "SymLM: Predicating Function Name in Stripped Binaries through Context-Sensitive Execution-Aware Code Embeddings". Xin Jin, Kexin Pei, Jun Y. Wong, and Zhiqiang Lin. In //Proceedings of the 29th ACM Conference on Computer and Communications Security//. November 2022. [[PDF file/CCS22d.pdf]][[Slides file/CCS22d-slides.pdf]][[Bibtex bib/ccs22d.bib]] | | **CCS** | "Understanding IoT Security from a Market-Scale Perspective". Xin Jin, Sunil Manandhar, Kaushal Kafle, Zhiqiang Lin, and Adwait Nadkarni. In //Proceedings of the 29th ACM Conference on Computer and Communications Security//. November 2022. [[PDF file/CCS22e.pdf]][[Slides file/CCS22e-slides.pdf]][[Bibtex bib/ccs22e.bib]] | | **RAID** | "What You See is Not What You Get: Revealing Hidden Memory Mapping for Peripheral Modeling". Jun Y. Wong, Haohuang Wen, and Zhiqiang Lin. In //Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses//, October 2022. [[PDF file/RAID22.pdf]][[Slides file/RAID22-slides.pdf]][[Bibtex bib/raid22.bib]] | | **USENIX-SEC** | "Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Mobile Games". Chaoshun Zuo, and Zhiqiang Lin. In //Proceedings of the 31st USENIX Security Symposium//, August 2022. [[PDF file/SEC22.pdf]][[Slides file/sec22_slides.pdf]][[Bibtex bib/sec22.bib]] | | **PETS** | "Replay (Far) Away: Exploiting and Fixing Google/Apple Exposure Notification Contact Tracing". Christopher Ellis , Haohuang Wen, Zhiqiang Lin, and Anish Arora. In //Proceedings of the 29th Privacy Enhancing Technologies Symposium//, July 2022. [[PDF file/PET22.pdf]][[Slides file/PET22-slide.pdf]][[Bibtex bib/pet22.bib]] | | **ASIACCS** | "PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals". Qingchuan Zhao, Chaoshun Zuo, Jorge Blasco, and Zhiqiang Lin. In //Proceedings of the 17th ACM Asia Conference on Computer and Communications Security//, June 2022. [[PDF file/ASIACCS22.pdf]][[Slides file/ASIACCS22.pdf]][[Bibtex bib/asiaccs22.bib]] | | **S&P** | "vSGX: Virtualizing SGX Enclaves on AMD SEV". Shixuan Zhao, Mengyuan Li, Yinqian Zhang, and Zhiqiang Lin. In //Proceedings of the 43rd IEEE Symposium on Security and Privacy//, San Fransisco, CA, May 2022. [[PDF file/SP22.pdf]][[Slides file/sp22-slides.pdf]][[Bibtex bib/oakland22.bib]] | | **AutoSec** | "Towards A TEE-based V2V Protocol For Connected And Autonomous Vehicles". Mohit Jangid, and Zhiqiang Lin. In //Proceedings of the Automotive and Autonomous Vehicle Security (AutoSec) Workshop 2022//, San Diego, CA, April 2022. [[PDF file/AutoSec2022.pdf]][[Slides https://www.usenix.org/system/files/sec22_slides.pdf]][[Bibtex bib/autosec22.bib]] | | **NDSS** | "Multi-Certificate Attacks Against Proof-of-Elapsed-Time and Their Countermeasures". Huibo Wang, Guoxing Chen, Yinqian Zhang, and Zhiqiang Lin. In //Proceedings of the 29th ISOC Network and Distributed System Security Symposium//, San Diego, CA, April 2022. [[PDF file/NDSS22.pdf]][[Slides file/NDSS22-slides.pdf]][[Bibtex bib/ndss22.bib]] | | **TC** | "vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS.". Yutao Tang, Zhengrui Qin, Yue Li, Zhiqiang Lin, Shanhe Yi, Fengyuan Xu, and Qun Li. In //IEEE Transactions on Computers//, February 2022. [[PDF file/TC22.pdf]][[Bibtex bib/tc22.bib]] | || 2021 || | **CCS** | "CROSSLINE: Breaking 'Security-by-Crash' based Memory Isolation in AMD SEV". Mengyuan Li, Yinqian Zhang, Zhiqiang Lin. In //Proceedings of the 28th ACM Conference on Computer and Communications Security//. November 2021. [[PDF file/CCS21.pdf]][[Slides file/CCS21-slides.pdf]][[Bibtex bib/ccs21.bib]] (//**Best Paper Award Runner-up**//) | | **RAID** | "iTOP: Automating Counterfeit Object Oriented Programming Attacks". Paul Muntean, Richard Viehoever, Zhiqiang Lin, Gang Tan, Jens Grossklags, and Claudia Eckert. In //Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses//, October 2021. [[PDF file/RAID21.pdf]][[Slides file/RAID21-slides.pdf]][[Bibtex bib/raid21.bib]] | | **USENIX-SEC** | "SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting". Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang. In //Proceedings of the 30th USENIX Security Symposium//, August 2021. [[PDF file/SEC21a.pdf]][[Slides https://www.usenix.org/system/files/sec21b_slides.pdf]][[Bibtex bib/sec21a.bib]] | | **USENIX-SEC** | "Automatic Policy Generation for Inter-Service Access Control of Microservices". Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, and Jim Hao Chen. In //Proceedings of the 30th USENIX Security Symposium//, August 2021. [[PDF file/SEC21a.pdf]][[Slides https://www.usenix.org/system/files/sec21a_slides.pdf]][[Bibtex bib/sec21b.bib]] | | **USENIX-SEC** | "Towards Formal Verification of State Continuity for Enclave Programs". Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin. In //Proceedings of the 30th USENIX Security Symposium//, August 2021. [[PDF file/SEC21c.pdf]][[Slides https://www.usenix.org/system/files/sec21c_slides.pdf]][[Bibtex bib/sec21c.bib]] | | **DIMVA** | "SPECULARIZER: Detecting Speculative ExecutionAttacks via Performance Tracing". Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin. In //Proceedings of theThe 18th Conference on Detection of Intrusions and Malware & Vulnerability Assessment//. July 2021. [[PDF file/DIMVA21.pdf]][[Bibtex bib/dimva21.bib]] | | **SIGMETRICS** | "A Measurement Study of Wechat Mini-Apps". Yue Zhang, Bayan Turkistani, Allen Yuqing Yang, Chaoshun Zuo, and Zhiqiang Lin. In //Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)//. June 2021. [[PDF file/SIGMETRICS21.pdf]][[Bibtex bib/sigmetrics21.bib]] | | **HCC-Journal** | "WLAN-Log-Based Superspreader Detection in the COVID-19 Pandemic". Cheng Zhang, Yunze Pan, Yunqi Zhang, Adam C Champion, Zhaohui Shen, Dong Xuan, Zhiqiang Lin, Ness B Shroff. In //Journal of High Confidence Computing//. [[PDF file/HCC21.pdf]][[Bibtex bib/hcc21.bib]] | || 2020 || | **ITU-Journal** | "A Blueprint For Effective Pandemic Mitigation". Rahul Singh, Wenbo Ren, Fang Liu, Dong Xuan, Zhiqiang Lin, Ness B Shroff. In //ITU Journal on Future and Evolving Technologies//, Volume 1 (2020), Issue 1, 15 December 2020. [[PDF file/ITU20.pdf]][[Bibtex bib/itu20.bib]] | | **ACSAC** | "ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings". Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, and Claudia Eckert. In //Proceedings of the 35th Annual Computer Security Applications Conference//, December 2020. [[PDF file/ACSAC20.pdf]][[Bibtex bib/acsac20.bib]] | | **CCS** | "FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities from Bare-Metal Firmware". Haohuang Wen, Zhiqiang Lin, and Yinqian Zhang. In //Proceedings of the 27th ACM Conference on Computer and Communications Security//. November 2020. [[PDF file/CCS20.pdf]][[Slides file/CCS20-slides.pdf]][[Bibtex bib/ccs20.bib]] | | **SECURECOMM** | "A Study of the Privacy of COVID-19 Contact Tracing Apps''. Haohuang Wen, Qingchuan Zhao, Zhiqiang Lin, Dong Xuan, Ness Shroff. In //Proceedings of the 16th International Conference on Security and Privacy in Communication Networks// (Late Track). October 2020. [[PDF file/SECURECOMM20a.pdf]][[Bibtex bib/securecomm20a.bib]] | | **SECURECOMM** | "On the Accuracy of Measured Proximity of Bluetooth-based Contact Tracing Apps'' (short paper). Qingchuan Zhao, Haohuang Wen, Zhiqiang Lin, Dong Xuan, Ness Shroff. In //Proceedings of the 16th International Conference on Security and Privacy in Communication Networks// (Late Track). October 2020. [[PDF file/SECURECOMM20b.pdf]][[Bibtex bib/securecomm20b.bib]] | | **SECURECOMM** | "On the Effectiveness of Behavior-based Ransomware Detection''. Jaehyun Han, Zhiqiang Lin, and Donald Porter. In //Proceedings of the 16th International Conference on Security and Privacy in Communication Networks//. October 2020. [[PDF file/SECURECOMM20c.pdf]][[Bibtex bib/securecomm20c.bib]] | | **USENIX-SEC** | "Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface (in Automotive IoT)", Haohuang Wen, Qi Alfred Chen, and Zhiqiang Lin. In //Proceedings of the 29th USENIX Security Symposium//, Boston, MA. August 2020. [[PDF file/SEC20a.pdf]][[Slides https://www.usenix.org/system/files/sec20_slides_wen.pdf]][[Bibtex bib/sec20a.bib]] | | **USENIX-SEC** | "FirmScope: Automatic Uncovering of Privilege-Escalation Vulnerabilitiesin Pre-Installed Apps in Android Firmware". Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, and Zhiqiang Lin. In //Proceedings of the 29th USENIX Security Symposium//, Boston, MA. August 2020. [[PDF file/SEC20b.pdf]][[Slides https://www.usenix.org/system/files/sec20_slides_elsabagh.pdf]][[Bibtex bib/sec20b.bib]] | | **USENIX-SEC** | "SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants", Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin In //Proceedings of the 29th USENIX Security Symposium//, Boston, MA. August 2020. [[PDF file/SEC20c.pdf]][[Slides https://www.usenix.org/system/files/sec20_slides_quinonez.pdf]][[Bibtex bib/sec20c.bib]] | | **USENIX-SEC** | "Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks", Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, and Xinwen Fu. In //Proceedings of the 29th USENIX Security Symposium//, Boston, MA. August 2020. [[PDF file/SEC20d.pdf]][[Slides https://www.usenix.org/system/files/sec20_slides_zhang-yue_final.pdf]][[Bibtex bib/sec20d.bib]] | | **USENIX-SEC** | "TXSPECTOR: Uncovering Attacks in Ethereum from Transactions", Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, and Zhiqiang Lin. In //Proceedings of the 29th USENIX Security Symposium//, Boston, MA. August 2020. [[PDF file/SEC20e.pdf]][[Slides https://www.usenix.org/system/files/sec20_slides_zhang-mengya.pdf]][[Bibtex bib/sec20e.bib]] | | **S&P** | "Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps". Qingchuan Zhao, Chaoshun Zuo, Dolan-Gavitt Brendan, Giancarlo Pellegrino, and Zhiqiang Lin. In //Proceedings of the 41st IEEE Symposium on Security and Privacy//, San Fransisco, CA, May 2020. [[PDF file/SP20.pdf]][[Slides file/sp20-slides.pdf]][[Bibtex bib/oakland20.bib]] | | **NDSS** | "Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps". Haohuang Wen, Qingchuan Zhao, Qi Alfred Chen, and Zhiqiang Lin. In //Proceedings of the 27th ISOC Network and Distributed System Security Symposium//, San Diego, CA, February 2020. [[PDF file/NDSS20.pdf]][[Slides file/NDSS20-slides.pdf]][[Bibtex bib/ndss20.bib]] | || 2019 || | **ACSAC** | "Analyzing Control Flow Integrity with LLVM-CFI". Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, and Claudia Eckert. In //Proceedings of the 35th Annual Computer Security Applications Conference//, December 2019. (60/266=22.6%) [[PDF file/ACSAC19.pdf]][[Bibtex bib/acsac19.bib]] | | **CCS** | "Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps". Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, and Yinqian Zhang. In //Proceedings of the 26th ACM Conference on Computer and Communications Security//, London, UK. November 2019. [[PDF file/CCS19a.pdf]][[Slides file/CCS19a-slides.pdf]][[Bibtex bib/ccs19a.bib]] | | **CCS** | "Towards Memory Safe Enclave Programming with Rust-SGX". Huibo Wang, Pei Wang, Yu Ding, Mingshen Sun, Yiming Jing, Ran Duan, Long Li, Yulong Zhang, Tao Wei, and Zhiqiang Lin. In //Proceedings of the 26th ACM Conference on Computer and Communications Security//, London, UK. November 2019. [[PDF file/CCS19b.pdf]][[Slides file/CCS19b-slides.pdf]][[Bibtex bib/ccs19b.bib]] | | **RAID** | "Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries". Wubing Wang, Yinqian Zhang, and Zhiqiang Lin. In //Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses//, September 2019. [[PDF file/RAID19.pdf]][[Slides file/RAID19-slides.pdf]][[Bibtex bib/raid19.bib]] | | **USENIX-SEC** | "The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends", Omar Alrawi*, Chaoshun Zuo*, Ruian Duan, Ranjita Kasturi, Zhiqiang Lin, Brendan Saltaformaggio. (*authors contributed equally) In //Proceedings of the 2019 USENIX Security Symposium//, Santa Clara. August 2019. [[PDF file/SEC19a.pdf]][[Slides file/SEC19a-slides.pdf]][[Bibtex bib/sec19a.bib]] | | **USENIX-SEC** | "CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software", Xiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, and Zhiqiang Lin. In //Proceedings of the 2019 USENIX Security Symposium//, Santa Clara. August 2019. [[PDF file/SEC19b.pdf]][[Slides file/SEC19b-slides.pdf]][[Bibtex bib/sec19b.bib]] | | **USENIX-SEC** | "Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization", Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin. In //Proceedings of the 2019 USENIX Security Symposium//, Santa Clara. August 2019. [[PDF file/SEC19c.pdf]][[Bibtex bib/sec19c.bib]] | | **ASIACCS** | "Running Language Interpreters Inside SGX: A Lightweight Legacy-Compatible Script Code Hardening Approach" (short paper). Huibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, Yinqian Zhang. In //Proceedings of the 14th ACM Asia Conference on Computer and Communications Security//, July 2019. [[PDF file/ASIACCS19.pdf]][[Slides file/ASIACCS19.pdf]][[Bibtex bib/asiaccs19.bib]] | | **DSN** | "Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users". Jiongyi Chen, Chaoshun Zuo, Wenrui Diao, Shuaike Dong, Qingchuan Zhao, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, and Kehuan Zhang. In //Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks//. June 2019 [[PDF file/DSN19.pdf]][[Bibtex bib/dsn19.bib]] | | **EUROS&P** | "Stealing Intel Secrets from SGX Enclaves via Speculative Execution". Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H. Lai. In //Proceedings of the 4th IEEE European Symposium on Security and Privacy//, June 2019. [[PDF file/EUROSP19.pdf]][[Bibtex bib/eurosp19.bib]] | | **ICSE** | "Probabilistic Disassembly". Kenneth Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang, Xiangyu Zhang, and Zhiqiang Lin. In //Proceedings of 41st ACM/IEEE International Conference on Software Engineering//, May 2019. [[PDF file/ICSE19.pdf]][[Bibtex bib/icse19.bib]] | | **S&P** | "Why Does Your Data Leak? Uncovering the Data Leakage in Cloud From Mobile Apps". Chaoshun Zuo, Zhiqiang Lin, and Yinqian Zhang. In //Proceedings of the 40th IEEE Symposium on Security and Privacy//, San Fransisco, CA, May 2019. [[PDF file/SP19.pdf]][[Slides file/sp19-Slides.pdf]][[Bibtex bib/oakland19.bib]] | | **NDSS** | "Geo-locating Drivers: A Study of Sensitive Data Leakagein Ride-Hailing Services". Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, and Zhiqiang Lin. In //Proceedings of the 26th ISOC Network and Distributed System Security Symposium//, San Diego, CA, February 2019. [[PDF file/NDSS19.pdf]][[Slides file/NDSS19-slides.pdf]][[Bibtex bib/ndss19.bib]] | || 2018 || | **ACSAC** | "A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites". Bo Lu, Xiaokuan Zhang, Ziman Ling, Yinqian Zhang, and Zhiqiang Lin. In //Proceedings of the 34th Annual Computer Security Applications Conference//, December 2018. (60/299=20.1%) [[PDF file/ACSAC18.pdf]][[Bibtex bib/acsac18.bib]] | | **CCS** | "K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces". Juanru Li, Zhiqiang Lin. Juan Caballer, Yuanyuan Zhang, Dawu Gu. In //Proceedings of the 25th ACM Conference on Computer and Communications Security//, Toronto. November 2018. (134/770=17.4%) [[PDF file/CCS18.pdf]][[Slides file/CCS18-slides.pdf]][[Bibtex bib/ccs18.bib]] | | **FEAST** | "Towards Interface-Driven COTS Binary Hardening".  Xiaoyang Xu, Wenhao Wang, Kevin W. Hamlen, and Zhiqiang Lin. In //Proceedings of the 3rd Workshop on Forming an Ecosystem Around Software Transformation//, October 2018. [[PDF file/FEAST18.pdf]][[Bibtex bib/feast18.bib]] | | **RAID** | "{tauCFI}: Type-Assisted Control Flow Integrity for x86-64 Binaries". Paul Muntean, Matthias Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags ,and Claudia Eckert. In //Proceedings of the 21st International Symposium on Research in Attacks, Intrusions and Defenses//, September 2018. [[PDF file/RAID18.pdf]][[Slides file/RAID18-slides.pdf]][[Bibtex bib/raid18.bib]] | | **USENIX-SEC** | "Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors", Yazhou Tu, Zhiqiang Lin, Insup Lee and Xiali Hei. In //Proceedings of the 2018 USENIX Security Symposium//, Baltimore, MD. August 2018. [[PDF file/SEC18a.pdf]][[Bibtex bib/sec18a.bib]] | | **USENIX-SEC** | "Guarder: A Tunable Secure Allocator", Sam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, and Tongping Liu. In //Proceedings of the 2018 USENIX Security Symposium//, Baltimore, MD. August 2018. [[PDF file/SEC18b.pdf]][[Bibtex bib/sec18b.bib]] | | **ASIACCS** | "BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering" (short paper). Vishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan, and Kevin Hamlen. In //Proceedings of the 13th ACM Asia Conference on Computer and Communications Security//, June 2018. [[PDF file/ASIACCS18.pdf]][[Slides file/ASIACCS18.pdf]][[Bibtex bib/asiaccs18.bib]] | | **CGO** | "SGX-Elide: Enabling Enclave Code Secrecy via Self-Modification". Erick Bauman, Huibo Wang, Mingwei Zhang, and Zhiqiang Lin. In //Proceedings of International Symposium on Code Generation and Optimization//, Vienna, Austria, February 2018. [[PDF file/CGO18.pdf]][[Slides file/CGO18-slides.pdf]][[Bibtex bib/cgo18.bib]] | | **NDSS** | "Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics". Erick Bauman, Zhiqiang Lin, and Kevin Hamlen. In //Proceedings of the 25th ISOC Network and Distributed System Security Symposium//, San Diego, CA, February 2018. [[PDF file/NDSS18a.pdf]][[Slides file/NDSS18a-slides.pdf]][[Bibtex bib/ndss18a.bib]] | | **NDSS** | "IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing". Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, Kehuan Zhang. In //Proceedings of the 25th ISOC Network and Distributed System Security Symposium//, San Diego, CA, February 2018. [[PDF file/NDSS18b.pdf]][[Slides file/NDSS18b-slides.pdf]][[Bibtex bib/ndss18b.bib]] | | **SIGCSE** | "Using Virtual Machine Introspection for Kernel Security Education". Manish Bhatt, Irfan Ahmed, and Zhiqiang Lin. In //Proceedings of The 49th ACM Technical Symposium on Computer Science Education//, Baltimore, MD, February 2018. [[PDF file/SIGCSE18.pdf]][[Slides file/SIGCSE18-slides.pdf]][[Bibtex bib/sigcse18.bib]] | || 2017 || | **CCS** | "AuthScope: Towards Automatic Discovery of Vulnerable Authorizations in Online Services". Chaoshun Zuo, Qingchuan Zhao, and Zhiqiang Lin. In //Proceedings of the 24th ACM Conference on Computer and Communications Security//, Dallas, Texas. November 2017. (151/843=17.9%) [[PDF file/CCS17a.pdf]][[Slides file/CCS17a-slides.pdf]][[Bibtex bib/ccs17a.bib]] | | **CCS** | "SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors". Fahad Shaon, Murat Kantarcioglu, Zhiqiang Lin, and Latifur Khan. In //Proceedings of the 24th ACM Conference on Computer and Communications Security//, Dallas, Texas. November 2017. (151/843=17.9%) [[PDF file/CCS17b.pdf]][[Slides file/CCS17b-slides.pdf]][[Bibtex bib/ccs17b.bib]] | | **CCS** | "FreeGuard: A Faster Secure Heap Allocator". Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, and Tongping Liu. In //Proceedings of the 24th ACM Conference on Computer and Communications Security//, Dallas, Texas. November 2017. (151/843=17.9%) [[PDF file/CCS17c.pdf]][[Slides file/CCS17c.pptx]][[Bibtex bib/ccs17c.bib]] | | **RAID** | "Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults". Yangchun Fu, Erick Bauman, Raul Quinonez, and Zhiqiang Lin. In //Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses//, Atlanta, Georgia. September 2017 (21/106 = 19.8%). [[PDF file/RAID17.pdf]][[Slides file/RAID17-slides.pdf]][[Bibtex bib/raid17.bib]] | | **ESORICS** | "Securing Data Analytics on SGX With Randomization". Swarup Chandra, Vishal Karande, Zhiqiang Lin, Latifur Khan, Murat Kantarcioglu, and Bhavani Thuraisingham. In //Proceedings of the 22nd European Symposium on Research in Computer Security//, Oslo, Norway. September, 2017. [[PDF file/ESORICS17.pdf]][[Bibtex bib/esorics17.bib]] | | **APSYS** | "Building a Security OS With Software Defined Infrastructure". Guofei Gu, Hongxin Hu, Eric Keller, Zhiqiang Lin, Donald E. Porter. In //The 8th ACM SIGOPS Asia-Pacific Workshop on Systems//, Mumbai, India. September, 2017. [[PDF file/APSYS17.pdf]][[Bibtex bib/apsys17.bib]] | | **WWW** | "Exposing Server URLs of Mobile Apps With Selective Symbolic Execution". Chaoshun Zuo, and Zhiqiang Lin. In //Proceedings of the 26th World Wide Web Conference//, Perth, Australia. April 2017. (164/966=17%) [[PDF file/WWW17.pdf]][[Slides file/www17-Slides.pdf]][[Bibtex bib/www17.bib]] | | **ASIACCS** | "SGX-Log: Securing System Logs With SGX". Vishal Karande, Erick Buaman, Zhiqiang Lin, and Latifur Khan. In //Proceedings of the 12th ACM Asia Conference on Computer and Communications Security//, Abu Dhabi. April 2017. [[PDF file/ASIACCS17.pdf]][[Slides file/ASIACCS17.pptx]][[Bibtex bib/asiaccs17.bib]] | | **CODASPY** | "PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace". Yufei Gu, Qingchuan Zhao, Yinqian Zhang, and Zhiqiang Lin. In //Proceedings of the 7th ACM Conference on Data and Application Security and Privacy//, Scottsdale, Arizona. March 2017. [[PDF file/CODASPY17.pdf]][[Slides file/CODASPY17-slides.pdf]][[Bibtex bib/codaspy17.bib]] | || 2016 || | **ACSAC** | "Adaptive Encrypted Traffic Fingerprinting With Bi-Directional Dependence". Khaled Al Naami, Swarup Chandra, Ahmad Mustafa, Latifur Khan, Zhiqiang Lin, Kevin Hamlen, and Bhavani Thuraisingham. In //Proceedings of the 32nd Annual Computer Security Applications Conference//, Los Angelos, CA, December 2016. (48/210=22.8%) [[PDF file/ACSAC16.pdf]][[Bibtex bib/acsac16.bib]] | | **SYSTEX** | "A Case for Protecting Computer Games With SGX". Erick Bauman, and Zhiqiang Lin. In //Proceedings of the 1st Workshop on System Software for Trusted Execution//, Trento, Italy. December 2016. [[PDF file/SYSTEX16.pdf]][[Slides file/SYSTEX16-slides.pdf]][[Bibtex bib/systex16.bib]] | | **RAID** | "Detecting Stack Layout Corruptions with Robust Stack Unwinding". Yangchun Fu, Jungwhan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang. In //Proceedings of the 19th International Symposium on Research in Attacks, Intrusions and Defenses//, Paris, France. September 2016 (21/81 = 25.9%). [[PDF file/RAID16b.pdf]][[Bibtex bib/raid16b.bib]] | | **RAID** | "Automatic Uncovering of Tap Points From Kernel Executions". Junyuan Zeng, Yangchun Fu, and Zhiqiang Lin. In //Proceedings of the 19th International Symposium on Research in Attacks, Intrusions and Defenses//, Paris, France. September 2016 (21/81 = 25.9%). [[PDF file/RAID16a.pdf]][[Slides file/RAID16-slides.pdf]][[Bibtex bib/raid16a.bib]] | | **CSUR-Journal** | "Type Inference on Executables'', Juan Caballero and Zhiqiang Lin. in //ACM Computing Surveys//, 2016. [[PDF file/CSUR16.pdf]][Bibtex bib/csur16.bib]] | | **CODASPY** | "Derandomizing Kernel Address Space Layout for Introspection and Forensics". Yufei Gu, and Zhiqiang Lin. in //Proceedings of the 6th ACM Conference on Data and Application Security and Privacy//, New Orleans, LA, March 2016. [[PDF file/CODASPY16.pdf]][[Slides file/CODASPY16-slides.pdf]][[Bibtex bib/codaspy16.bib]] | | **NDSS** | "Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services"(or ''How to brute-force user's password when given a mobile app''). Chaoshun Zuo, Wubing Wang, Rui Wang, and Zhiqiang Lin. in //Proceedings of the 23rd ISOC Network and Distributed System Security Symposium//, San Diego, CA, February 2016 (60/389 = 15.4%). [[PDF file/NDSS16.pdf]][[Slides file/NDSS16-slides.pdf]][[Bibtex bib/ndss16.bib]] | || 2015 || | **RAID** | "Towards Automatic Inference of Kernel Object Semantics from Binary Code". Junyuan Zeng and Zhiqiang Lin. In //Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses//, Kyoto, Japan. November 2015 (28/147 = 19%). [[PDF file/RAID15.pdf]][[Slides file/RAID15-slides.pdf]][[Bibtex bib/raid15.bib]] | | **ESEC/FSE** | "Automatically Deriving Pointer Reference Expressions From Executions For Memory Dump Analysis". Yangchun Fu, Zhiqiang Lin, and David Brumley. In //Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering//. BERGAMO, ITALY, September 2015. [[PDF file/FSE15.pdf]][[Bibtex bib/fse15.bib]][[Slides file/FSE15-Slides.pdf]] | | **CSUR-Journal** | "A Survey on Hypervisor Based Monitoring: Approaches, Applications, and Evolutions'', Erick Bauman, Gbadebo Ayoade, and Zhiqiang Lin. In //ACM Computing Surveys//, August 2015. [[PDF file/CSUR15.pdf]][Bibtex bib/csur15.bib]] | | **ESORICS** | "A Practical Approach for Adaptive Data Structure Layout Randomization". Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao and Peng Liu. In //Proceedings of the 20th European Symposium on Research in Computer Security//, Vienna, Austria, September, 2015. [[PDF file/ESORICS15.pdf]][[Bibtex bib/esorics15.bib]] | | **USENIX-SEC** | "You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps". Jin Chen, Haibo Chen, Erick Bauman, Zhiqiang Lin, Binyu Zang, Haibing Guan. In //Proceedings of the 2015 USENIX Security Symposium//, Washington DC. August 2015 (67/426 = 15.7%). [[PDF file/SEC15.pdf]][[Bibtex bib/sec15.bib]] | | **DSN** | "Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization". Seung Hun Kim, Lei Xu, Ziyi Liu, Zhiqiang Lin, Won Woo Ro, and Weidong Shi . In //Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks//, Rio De Janeiro, Brazil. June 2015 [[PDF file/DSN15.pdf]][[Bibtex bib/dsn15.bib]] | | **ISPEC** | "Half a Century of Practice: Who Is Still Storing Plaintext Passwords?'' Erick Bauman, Yafeng Lu, and Zhiqiang Lin. In //Proceedings of the 11th International Conference on Information Security Practice and Experience//, Beijing, China. May 2015 [[PDF file/ISPEC15.pdf]][[Bibtex bib/ispec15.bib]] | | **VEE** | "PEMU: A Pin Highly Compatible Out-of-VM Dynamic Binary Instrumentation Framework". Junyuan Zeng, Yangchun Fu, and Zhiqiang Lin. In //Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments//, Istanbul, Turkey, March 2013 [[PDF file/VEE15.pdf]][[Slides file/vee-15.pdf]][[Bibtex bib/vee15.bib]] | || 2014 || | **ACSAC** | "MACE: High-Coverage and Robust Memory Analysis For Commodity Operating Systems". Qian Feng, Aravind Prakash, Heng Yin, and Zhiqiang Lin. In //Proceedings of the 30th Annual Computer Security Applications Conference//, New Orleans, Louisiana, December 2014. (19%) [[PDF file/ACSAC14.pdf]][[Bibtex bib/acsac14.bib]] | | **TDSC-Journal** | "On the Trustworthiness of Memory Analysis---An Empirical Study from the Perspective of Binary Execution", Aravind Prakash, Eknath Venkataramani, Heng Yin, and Zhiqiang Lin. //IEEE Transactions on Dependable and Secure Computing (TDSC)//, October 2014. [[PDF http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6942280]][[Bibtex bib/tdsc14.bib]] | | **SECURECOMM** | "A Systematic Study of the Covert-Channel Attacks in Smartphones'' (short paper). Swarup Chandra, Zhiqiang Lin, Ashish Kundu and Latifur Khan. In //Proceedings of the 10th International Conference on Security and Privacy in Communication Networks//, Beijing, China. September 2014. [[PDF file/securecomm14.pdf]][[Bibtex bib/securecomm14.bib]] | | **ESORICS** | "SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification". David Urbina, Yufei Gu, Juan Caballero, and Zhiqiang Lin. In //Proceedings of the 19th European Symposium on Research in Computer Security//, Wroclaw, Poland, September, 2014 (58/234 = 24.8%). [[PDF file/ESORICS14.pdf]][[Slides file/ESORICS14-slides.pdf]][[Bibtex bib/esorics14.bib]] | | **RAID** | "GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment". Zhaoyan Xu, Jialong Zhang, Guofei Gu, and Zhiqiang Lin. In //Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses//, Gothenburg, Sweden. September 2014 (22/113 = 19.5%). [[PDF file/RAID14.pdf]][[Slides file/RAID14-slides.pdf]][[Bibtex bib/raid14.bib]] | | **USENIX-SEC** | "Preventing Cryptographic Key Leakage in Cloud Virtual Machines". Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, and Huseyin Ulusoy. In //Proceedings of the 2014 USENIX Security Symposium//, San Diego, CA, August 2014 (67/350 = 19%). [[PDF file/SEC14a.pdf]][[Slides file/SEC14a-slides.pdf]][[Bibtex bib/sec14a.bib]] | | **USENIX-SEC** | "X-Force: Force-Executing Binary Programs for Security Applications". Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, and Zhendong Su. In //Proceedings of the 2014 USENIX Security Symposium//, San Diego, CA, August 2014 (67/350 = 19%). [[PDF file/SEC14b.pdf]][[Slides file/SEC14b-slides.pdf]][[Bibtex bib/sec14b.bib]] | | **TCC-Journal** | "Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting". Yufei Gu, Yangchun Fu, Aravind Prakash, Zhiqiang Lin, and Heng Yin. //IEEE Transactions on Cloud Computing//. July 2014. [[PDF http://www.computer.org/csdl/trans/cc/preprint/06853383-abs.html]][[Bibtex bib/tcc14.bib]] | | **USENIX-ATC** | "HyperShell: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management". Yangchun Fu, Junyuan Zeng, and Zhiqiang Lin. In //Proceedings of the 2014 USENIX Annual Technical Conference//, Philadephia, PA, June 2014 (36/205 = 14.9%). [[PDF file/ATC14.pdf]][[Slides file/ATC14-slides.pdf]][[Bibtex bib/atc14.bib]] | | **DATE** | "Programmable Decoder and Shadow Threads: Tolerate Remote Code Injection Exploits with Diversified Redundancy". Ziyi Liu, Weidong Shi, Shouhuai Xu, and Zhiqiang Lin. In //Proceedings of the 2014 Design, Automation and Test in Europe//, Dresden, Germany, March 2014 (206/1090 = 23.1%). [[PDF file/DATE14.pdf]][[Bibtex bib/date14.bib]] | | **NDSS** | "Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in Virtual Machine Introspection via Decoupled Execution and Training Memoization". Alireza Saberi, Yangchun Fu, and Zhiqiang Lin. in //Proceedings of the 21st ISOC Network and Distributed System Security Symposium//, San Diego, CA, February 2014 (55/295 = 18.6%). [[PDF file/NDSS14a.pdf]][[Slides file/NDSS14a-slides.pdf]][[Bibtex bib/ndss14a.bib]] | | **NDSS** | "SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps". David Sounthiraraj, Justin Sahs, Garrett Greenwood, Zhiqiang Lin, and Latifur Khan. In //Proceedings of the 21st ISOC Network and Distributed System Security Symposium//, San Diego, CA, February 2014 (55/295 = 18.6%). [[PDF file/NDSS14b.pdf]][[Slides file/NDSS14b-slides.pdf]][[Bibtex bib/ndss14b.bib]] | | **TIFS** | "Data-Centric OS Kernel Malware Characterization". Junghwan Rhee, Ryan Riley, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu. //IEEE Transactions on Information Forensics and Security//, Volume 9 Issue 1, January 2014. [[PDF http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6671356]][[Bibtex bib/tifs14.bib]] | || 2013 || | **VMTJ-Journal** | "Toward Guest OS Writable Virtual Machine Introspection". Zhiqiang Lin. //VMware Technical Journal//, 2(2), December 2013. [[PDF file/VMTJ13.pdf]][[HTML http://labs.vmware.com/vmtj/toward-guest-os-writable-virtual-machine-introspection]][[Bibtex bib/vmtj13.bib]] | | **ACSAC** | "Subverting System Authentication with Context-Aware, Reactive Virtual Machine Introspection". Yangchun Fu, Zhiqiang Lin, and Kevin Hamlen. In //Proceedings of the 29th Annual Computer Security Applications Conference//, New Orleans, Louisiana, December 2013. (19%) [[PDF file/ACSAC13.pdf]][[Slides file/ACSAC13-slides.pdf]][[Bibtex bib/acsac13.bib]] | | **CCS** | "Obfuscation-resilient Binary Code Reuse through Trace-oriented Programming". Junyuan Zeng, Yangchun Fu, Kenneth Miller, Zhiqiang Lin, Xiangyu Zhang, and Dongyan Xu. In //Proceedings of the 20th ACM Conference on Computer and Communications Security//, Berlin, Germany, November 2013. (105/530=19.8%) [[PDF file/CCS13.pdf]][[Slides file/CCS13-slides.pptx]][[Bibtex bib/ccs13.bib]] | | **TISSEC** | "Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection". Yangchun Fu, and Zhiqiang Lin. In ACM Transactions on Information and System Security (TISSEC), Volume 16 Issue 2, September 2013. [[PDF http://dl.acm.org/citation.cfm?id=2516951]][[Bibtex bib/tissec13.bib]] | | **ISCA** | "CPU Transparent Protection of OS Kernel and Hypervisor Integrity with Programmable DRAM". Ziyi Liu, Jonghyuk Lee, Junyuan Zeng, Yuanfeng Wen, Zhiqiang Lin, and Weidong Shi. In //Proceedings of the 40th International Symposium on Computer Architecture//, Tel-Aviv, Israel. June 2013. (56/282=19.9%) [[PDF file/ISCA13.pdf]]][[Bibtex bib/isca13.bib]] | | **ICDCS** | "AUTOVAC: Towards Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization". Zhaoyan Xu, Jialong Zhang, Guofei Gu, and Zhiqiang Lin. In //Proceedings of the 33rd International Conference on Distributed Computing Systems//, Philadelphia, USA. July 2013. (61/464=13%) [[PDF file/ICDCS13.pdf]][[Bibtex bib/icdcs13.bib]] | | **DSN** | "Manipulating Semantic Values in Kernel Data Structures: Attack Assessments and Implications". Aravind Prakash, Eknath Venkataramani, Heng Yin, and Zhiqiang Lin. In //Proceedings of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-PDS)//, Budapest, Hungary, June 2013 [[PDF file/DSN13.pdf]][[Bibtex bib/dsn13.bib]] | | **VEE** | "Exterior: Using a Dual-VM Based External Shell for Guest-OS Introspection, Configuration, and Recovery". Yangchun Fu, and Zhiqiang Lin. In //Proceedings of the 9th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments//, Houston, TX, March 2013 [[PDF file/VEE13.pdf]][[Slides file/VEE13-Slides.pdf]][[Bibtex bib/vee13.bib]] | || 2012 || | **ACSAC** | "Securing Untrusted Code via Compiler-Agnostic Binary Rewriting". Richard Wartel, Vishwath Mohan, Kevin Hamlen, and Zhiqiang Lin. In //Proceedings of the 28th Annual Computer Security Applications Conference//, Orlando, FL, December 2012. (44/231=19%) [[PDF file/ACSAC12.pdf]][[Slides file/ACSAC12.pptx]][[Bibtex bib/acsac12.bib]] (//**Outstanding Student Paper Award**//) | | **SOCC** | "OS-Sommelier: Memory-Only Operating System Fingerprinting in the Cloud". Yufei Gu, Yangchun Fu, Aravind Prakash, Zhiqiang Lin, and Heng Yin. In //Proceedings of the 3rd ACM Symposium on Cloud Computing//, San Jose, CA, October 2012. ((21+4)/165=15.3%) [[PDF file/SOCC12.pdf]][[Slides file/socc12-slides.pdf]][[Bibtex bib/socc12.bib]] | | **CCS** | "Binary Stirring: Self-randomizing Instruction Addresses of Legacy x86 Binary Code". Richard Wartel, Vishwath Mohan, Kevin Hamlen, and Zhiqiang Lin. In //Proceedings of the 19th ACM Conference on Computer and Communications Security//, Raleigh, NC, October 2012. (80/423=18.9%) [[PDF file/CCS12.pdf]][[Slides file/CCS12.pptx]][[Bibtex bib/ccs12.bib]] (This paper wins the //2nd place in the NYU-Poly AT&T Best Applied Security Paper// of the Year [2012 http://www.poly.edu/csaw2012/csaw-research]) | | **DFRWS** | "Bin-Carver: Automatic Recovery of Binary Executable Files". Scott Hand, Zhiqiang Lin, Guofei Gu, and Bhavani Thuraisingham. In //Proceedings of the 12th Annual Digital Forensics Research Conference//, Washington DC, August 2012 (14/47=29.8%). [[PDF file/DFRWS12.pdf]][[Slides file/BinCarver.pdf]][[Bibtex bib/dfrws12.bib]] | | **S&P** | "Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection". Yangchun Fu, and Zhiqiang Lin. In //Proceedings of the 33rd IEEE Symposium on Security and Privacy//, San Fransisco, CA, May 2012 (40/307=13%). [[PDF file/SP12.pdf]][[Slides file/sp12-Slides.pdf]][[Slides-Handout file/sp12-handout.pdf]][[Demo http://www.youtube.com/watch?v=RY4xGfONgYg]][[Bibtex bib/oakland12.bib]] | | **NDSS** | "DIMSUM: Discovering Semantic Data of Interest from Un-mappable Memory with Confidence". Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, and Dongyan Xu. In //Proceedings of the 19th ISOC Network and Distributed System Security Symposium//, San Diego, CA, February 2012 (46/258 = 17.8%). [[PDF http://www.internetsociety.org/sites/default/files/10_1.pdf]][[Slides http://www.internetsociety.org/sites/default/files/P10_1.pdf]][[Bibtex bib/ndss12.bib]] | || 2011 and Before || | **AsiaCCS** | "Characterizing Kernel Malware Behavior with Kernel Data Access Patterns". Junghwan Rhee, Zhiqiang Lin, and Dongyan Xu. In //Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security//, Hong Kong, March 2011 (35/217 = 16.1%).[[PDF http://friends.cs.purdue.edu/pubs/ASIACCS11.pdf]] [[Bibtex bib/asiaccs11.bib]] | | **NDSS** | "SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures". Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, and Xuxian Jiang. In //Proceedings of the 18th Network and Distributed System Security Symposium//, San Diego, CA, February 2011 (28/139 = 20.1%). [[Abstract ndss11.html]][[PDF file/SigGraph_NDSS11.pdf]][[Bibtex bib/ndss11.bib]][[Demo file/SigGraph.avi]][[Slides file/NDSS11.ppt]] | | **ISSTA** | "Strict Control Dependence and its Effect on Dynamic Information Flow Analyses". Tao Bao, Yunhui Zheng, Zhiqiang Lin, Xiangyu Zhang and Dongyan Xu. In //Proceedings of the 2010 International Symposium on Software Testing and Analysis//,Trento, Italy. July 2010 (24/105 = 23%). [[Bibtex bib/issta10.bib]][[PDF file/issta10.pdf]] | | **DSN** | "Reuse-Oriented Camouflaging Trojan: Vulnerability Detection and Attack Construction". Zhiqiang Lin, Xiangyu Zhang, and Dongyan Xu. In //Proceedings of the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-DCCS)//, Chicago, IL, June 2010 (39/168=23.2%). [[Abstract dsn10.html]][[PDF file/DCCS10.pdf]][[Bibtex bib/dsn10.bib]][[Slides file/DCCS10.ppt]] | | **NDSS** | "Automatic Reverse Engineering of Data Structures from Binary Execution. Zhiqiang Lin, Xiangyu Zhang, and Dongyan Xu. //In Proceedings of the 17th Network and Distributed System Security Symposium//, San Diego, CA, February 2010 (24/156=15.4%). [[Abstract ndss10.html]][[PDF file/Rewards_NDSS10.pdf]][[Bibtex bib/ndss10.bib]][[Slides file/NDSS10.ppt]][[Demo file/rewards_demo.tar.gz]] (Note that this paper wins the //1st place in the Poster Competition of [2010 CERIAS Annual Information Security Symposium http://www.cerias.purdue.edu/site/symposium2010]//) | | **TSE-Journal** | "Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications". Zhiqiang Lin, Xiangyu Zhang, and Dongyan Xu. //IEEE Transactions on Software Engineering//. 36(5), 2010. [[PDF http://www.computer.org/portal/web/csdl/doi/10.1109/TSE.2009.54]][[Bibtex bib/tse10.bib]] | | **DIMVA** | "Polymorphing Software by Randomizing Data Structure Layout". Zhiqiang Lin, Ryan Riley, and Dongyan Xu. In //Proceedings of the 6th SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment//. Milan, Italy, July 2009 ((10+3)/44=29.5%). [[Abstract dimva09.html]][[PDF file/DIMVA09.pdf]][[Bibtex bib/dimva09.bib]][[Code dimva09.html]] | | **NDSS** | "IntScope: Automatically Detecting Integer Overflow Vulnerability In X86 Binary Using Symbolic Execution". Tielei Wang, Tao Wei, Zhiqiang Lin, and Wei Zou. In //Proceedings of the 16th Network and Distributed System Security Symposium//, San Diego, CA, February 2009 (20/171=11.7%). [[Abstract ndss09.html]][[PDF file/IntScope_NDSS09.pdf]][[Bibtex bib/ndss09.bib]] | | **FSE** | "Deriving Input Syntactic Structure From Execution". Zhiqiang Lin, and Xiangyu Zhang. In //Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering//. Atlanta, Georgia, USA, November 2008 (31/152=20.5%). [[Abstract fse08.html]][[PDF file/FSE08.pdf]][[Bibtex bib/fse08.bib]][[Slides file/FSE08.ppt]] | | **DSN** | "Convicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach". Zhiqiang Lin, Xiangyu Zhang, and Dongyan Xu. In //Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-DCCS)//, Anchorage, Alaska, USA, June 2008 (34/149=23%). [[Abstract dsn08.html]][[PDF file/DSN08.pdf]][[Bibtex bib/dsn08.bib]][[Slides file/DSN08.ppt]] | | **NDSS** | "Automatic Protocol Format Reverse Engineering Through Context-Aware Monitored Execution". Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, and Xiangyu Zhang. In //Proceedings of the 15th Network and Distributed System Security Symposium//,San Diego, CA, February 2008 (21/118=17.8%) [[Abstract ndss08.html]][[PDF file/AutoFormat_NDSS08.pdf]][[Bibtex bib/ndss08.bib]][[Slides file/NDSS08.ppt]] | | **AsiaCCS** | "AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair". Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Bing Mao, and Li Xie. In //Proceedings of ACM Symposium on InformAtion, Computer and Communications Security//, Singapore, March 2007 (Acceptance ratio: 33/188=17.6%). [[PDF file/AutoPaG.pdf]][[Bibtex bib/autopag_asiaccs07.bib]][[Slides file/ASIACCS07_AutoPaG.ppt]] | | **ISC** | "Transparent Run-Time Prevention of Format-String Attacks via Dynamic Taint and Flexible Validation". Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, and Li Xie. In //Proceedings of the 9th Information Security Conference//. Greece. Sept, 2006 (Acceptance ratio: 38/188=20.2%). [[PDF file/ISC06.pdf]][[Bibtex bib/isc06.bib]][[Code file/LibFormat.tar.gz]] | | **ARES** | "A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities". Zhiqiang Lin, Bing Mao, and Li Xie. In //Proceedings of the First International Conference on Availability, Reliability and Security//. Austria. April, 2006. [[PDF http://www.computer.org/portal/web/csdl/doi/10.1109/ARES.2006.11]][[Bibtex bib/ares06.bib]] | | **IAW** | "LibsafeXP: A Practical and Transparent Tool for Run-time Buffer Overflow Preventions". Zhiqiang Lin, Bing Mao, and Li Xie. In //Proceedings of the 7th Annual IEEE Information Assurance Workshop//. West Point, NY. USA. June, 2006. [[PDF file/IAW06.pdf]][[Bibtex bib/iaw06.bib]][[Slides file/LibsafeXP.pdf]][[Code file/LibsafeXP.tar.gz]] | %!include: ''iff.js'' --------------------------------------------------------------------------- [HOME index.html] [SOURCE %%infile]