Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection L Luo, J Ming, D Wu, P Liu, S Zhu 22nd ACM SIGSOFT International Symposium on the Foundations of Software …, 2014 | 269 | 2014 |
iBinHunt: Binary Hunting with Inter-Procedural Control Flow J Ming, M Pan, D Gao 15th Annual International Conference on Information Security and Cryptology …, 2012 | 139 | 2012 |
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking J Ming, D Xu, Y Jiang, D Wu 26th USENIX Security Symposium (USENIX Security’17)., 2017 | 132 | 2017 |
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection L Luo, J Ming, D Wu, P Liu, S Zhu IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017 | 128 | 2017 |
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code J Ming, D Xu, L Wang, D Wu 22nd ACM Conference on Computer and Communications Security (CCS'15), 2015 | 105 | 2015 |
TaintPipe: Pipelined Symbolic Taint Analysis J Ming, DinghaoWu, G Xiao, J Wang, P Liu 24th USENIX Security Symposium (USENIX Security’15), 2015 | 103 | 2015 |
Linear Obfuscation to Combat Symbolic Execution Z Wang, J Ming, C Jia, D Gao 16th European Symposium on Research in Computer Security (ESORICS’11), 2011 | 96 | 2011 |
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping D Xu, J Ming, D Wu 38th IEEE Symposium on Security and Privacy (S&P'17), 2017 | 94 | 2017 |
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost B Cheng*, J Ming*, J Fu, G Peng, T Chen, X Zhang, JY Marion 25th ACM Conference on Computer and Communications Security (CCS'18)., 2018 | 80 | 2018 |
Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation C Cao, L Guan, J Ming, P Liu Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 63 | 2020 |
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method D Xu, J Ming, D Wu 19th Information Security Conference (ISC'16), 2016 | 61 | 2016 |
VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification D Xu, J Ming, Y Fu, D Wu 25th ACM Conference on Computer and Communications Security (CCS'18), 2018 | 60 | 2018 |
StraightTaint: Decoupled Offline Symbolic Taint Analysis J Ming, D Wu, J Wang, G Xiao, P Liu 31st IEEE/ACM International Conference on Automated Software Engineering …, 2016 | 56 | 2016 |
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference J Ming, D Xu, D Wu 30th IFIP TC-11 SEC International Information Security and Privacy …, 2015 | 47 | 2015 |
Windranger: A directed greybox fuzzer driven by deviation basic blocks Z Du, Y Li, Y Liu, B Mao Proceedings of the 44th International Conference on Software Engineering …, 2022 | 45 | 2022 |
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security H Xu, Y Zhou, J Ming, M Lyu Cybersecurity 3, 1-18, 2020 | 45 | 2020 |
Unleashing the hidden power of compiler optimization on binary code difference: An empirical study X Ren, M Ho, J Ming, Y Lei, L Li Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021 | 44 | 2021 |
Impeding Behavior-based Malware Analysis via Replacement Attacks to Malware Specifications J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao Journal of Computer Virology and Hacking Techniques, 2016 | 43 | 2016 |
Deviation-Based Obfuscation-Resilient Program Equivalence Checking with Application to Software Plagiarism Detection J Ming, F Zhang, D Wu, P Liu, S Zhu IEEE Transactions on Reliability 65 (4), 2016 | 41 | 2016 |
BIM Server Requirements to Support the Energy Efficient Building Lifecycle Y Jiang, J Ming, D Wu, J Yen, P Mitra, JI Messner, R Leicht 2012 ASCE International Conference on Computing in Civil Engineering, 2012 | 40 | 2012 |