DROP: Detecting return-oriented programming malicious code P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie Information Systems Security: 5th International Conference, ICISS 2009 …, 2009 | 288 | 2009 |
Understanding the reproducibility of crowd-reported security vulnerabilities D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang 27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018 | 117 | 2018 |
Detecting code reuse in android applications using component-based control flow graph X Sun, Y Zhongyang, Z Xin, B Mao, L Xie ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014 | 93 | 2014 |
Role-based access control model for CSCW systems C Li, Y Zhan, B Mao, L Xie RUAN JIAN XUE BAO 11 (7), 931-937, 2000 | 80* | 2000 |
AutoPaG: towards automated software patch generation with source code root cause identification and repair Z Lin, X Jiang, D Xu, B Mao, L Xie Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 79 | 2007 |
Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask C Pang, R Yu, Y Chen, E Koskinen, G Portokalidis, B Mao, J Xu 2021 IEEE symposium on security and privacy (SP), 833-851, 2021 | 78 | 2021 |
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware Y Zhongyang, Z Xin, B Mao, L Xie Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 72 | 2013 |
JITDefender: A defense against JIT spraying attacks P Chen, Y Fang, B Mao, L Xie Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011 | 64 | 2011 |
Automatic construction of jump-oriented programming shellcode (on the x86) P Chen, X Xing, B Mao, L Xie, X Shen, X Yin Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 61 | 2011 |
Postmortem program analysis with {Hardware-Enhanced}{Post-Crash} artifacts J Xu, D Mu, X Xing, P Liu, P Chen, B Mao 26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017 | 56 | 2017 |
A practical approach for adaptive data structure layout randomization P Chen, J Xu, Z Lin, D Xu, B Mao, P Liu Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 51 | 2015 |
System call redirection: A practical approach to meeting real-world virtual machine introspection needs R Wu, P Chen, P Liu, B Mao 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 51 | 2014 |
Ptrix: Efficient hardware-assisted fuzzing for cots binary Y Chen, D Mu, J Xu, Z Sun, W Shen, X Xing, L Lu, B Mao Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 50 | 2019 |
Efficient detection of the return-oriented programming malicious code P Chen, X Xing, H Han, B Mao, L Xie Information Systems Security: 6th International Conference, ICISS 2010 …, 2010 | 49 | 2010 |
Textlogger: inferring longer inputs on touch screen using motion sensors D Ping, X Sun, B Mao Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015 | 48 | 2015 |
Brick: A binary tool for run-time detecting and locating integer-based vulnerability P Chen, Y Wang, Z Xin, B Mao, L Xie 2009 International Conference on Availability, Reliability and Security, 208-215, 2009 | 48 | 2009 |
Windranger: A directed greybox fuzzer driven by deviation basic blocks Z Du, Y Li, Y Liu, B Mao Proceedings of the 44th International Conference on Software Engineering …, 2022 | 44 | 2022 |
Impeding behavior-based malware analysis via replacement attacks to malware specifications J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao Journal of Computer Virology and Hacking Techniques 13, 193-207, 2017 | 42 | 2017 |
Detect android malware variants using component based topology graph T Shen, Y Zhongyang, Z Xin, B Mao, H Huang 2014 IEEE 13th international conference on trust, security and privacy in …, 2014 | 40 | 2014 |
JITSafe: a framework against Just‐in‐time spraying attacks P Chen, R Wu, B Mao IET Information Security 7 (4), 283-292, 2013 | 39 | 2013 |