Control Flow Integrity for COTS Binaries. M Zhang, R Sekar USENIX Security Symposium (USENIX Security 13), 337-352, 2013 | 776* | 2013 |
Function as a service (FaaS) system enhancements MR Haghighat, K Doshi, AJ Herdrich, A Mohan, RR Iyer, M Sun, K Bhuyan, ... US Patent 11,922,220, 2024 | 114 | 2024 |
A Platform For Secure Static Binary Instrumentation M Zhang, R Qiao, N Hasabnis, R Sekar ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environment …, 2014 | 101 | 2014 |
A robust and efficient defense against use-after-free exploits via concurrent pointer sweeping D Liu, M Zhang, H Wang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 53 | 2018 |
Sgxelide: enabling enclave code secrecy via self-modification E Bauman, H Wang, M Zhang, Z Lin Proceedings of the 2018 International Symposium on Code Generation and …, 2018 | 42 | 2018 |
Encoded inline capabilities M LeMay, DM Durham, ME Kounavis, BE Huntley, V Shanbhogue, ... US Patent 10,860,709, 2020 | 39 | 2020 |
A Principled Approach for ROP Defense R Qiao, M Zhang, R Sekar Annual Computer Security Applications Conference (ACSAC), 2015 | 35 | 2015 |
Systems and methods for increasing security on computing systems that launch application containers D Marino, P Efstathopoulos, M Zhang US Patent 9,729,579, 2017 | 32 | 2017 |
Crypto-enforced capabilities for isolation M LeMay, DD Durham, M Zhang, V Shanbhogue US Patent 10,706,164, 2020 | 29 | 2020 |
POSTER: Semi-supervised classification for dynamic android malware detection L Chen, M Zhang, CY Yang, R Sahita Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 27 | 2017 |
Protecting cots binaries from disclosure-guided code reuse attacks M Zhang, M Polychronakis, R Sekar Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 24 | 2017 |
Harbormaster: Policy Enforcement for Containers M Zhang, D Marino, P Efstathopoulos International Conference on Cloud Computing Technology and Science (CloudCom), 2015 | 24 | 2015 |
Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency D Liu, X Gao, M Zhang, H Wang, A Stavrou | 19 | 2017 |
Technologies for untrusted code execution with processor sandbox support M Zhang, M Sun, RL Sahita, C Zhang, X Li US Patent 11,055,401, 2021 | 13 | 2021 |
Network traffic analysis using refined bayesian reasoning to detect flooding and port scan attacks D Liu, M Zhang, T Li International Conference on Advanced Computer Theory and Engineering, 2008 …, 2008 | 12 | 2008 |
eXecutable-Only-Memory-Switch (XOM-Switch): Hiding Your Code From Advanced Code Reuse Attacks in One Shot M Zhang, R Sahita, D Liu Black Hat Asia, 2018 | 10 | 2018 |
Securing untrusted code using memory protection key and control flow integrity M Zhang, R Sahita US Patent 10,810,305, 2020 | 9 | 2020 |
Malicious object detection in a runtime environment M Zhang, X Li, RL Sahita, A Subramanian, AS Kanhere, CY Yang, Y Gai US Patent 10,552,609, 2020 | 6 | 2020 |
Apparatuses, methods, and systems for instructions to compartmentalize code R Sahita, D Gupta, V Shanbhogue, D Hansen, JW Brandt, J Nuzman, ... US Patent 11,029,957, 2021 | 4 | 2021 |
Technologies to defeat secure enclave side-channel attacks using fault-oriented programming M Zhang, RL Sahita US Patent 10,579,791, 2020 | 4 | 2020 |