Search Results - "Liang, Zhenkai"

Refine Results
  1. 1

    Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks by Hong Hu, Shinde, Shweta, Adrian, Sendroiu, Zheng Leong Chua, Saxena, Prateek, Zhenkai Liang

    “…As control-flow hijacking defenses gain adoption, it is important to understand the remaining capabilities of adversaries via memory exploits. Non-control data…”
    Get full text
    Conference Proceeding Journal Article
  2. 2

    Automated identification of sensitive data from implicit user specification by Yang, Ziqi, Liang, Zhenkai

    Published in Cybersecurity (Singapore) (29-09-2018)
    “…The sensitivity of information is dependent on the context of application and user preference. Protecting sensitive data in the cloud era requires identifying…”
    Get full text
    Journal Article
  3. 3

    Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity by Mao, Jian, Tian, Wenqian, Li, Pei, Wei, Tao, Liang, Zhenkai

    Published in IEEE access (01-01-2017)
    “…Social networks have become one of the most popular platforms for users to interact with each other. Given the huge amount of sensitive data available in…”
    Get full text
    Journal Article
  4. 4

    Phishing page detection via learning classifiers from page layout feature by Mao, Jian, Bian, Jingdong, Tian, Wenqian, Zhu, Shishi, Wei, Tao, Li, Aili, Liang, Zhenkai

    “…The web technology has become the cornerstone of a wide range of platforms, such as mobile services and smart Internet-of-things (IoT) systems. In such…”
    Get full text
    Journal Article
  5. 5

    Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning by Jia, Yaoqi, Chen, Yue, Dong, Xinshu, Saxena, Prateek, Mao, Jian, Liang, Zhenkai

    Published in Computers & security (01-11-2015)
    “…In this paper, we present a systematic study of browser cache poisoning (BCP) attacks, wherein a network attacker performs a one-time Man-In-The-Middle (MITM)…”
    Get full text
    Journal Article
  6. 6

    I Can See Your Brain: Investigating Home-Use Electroencephalography System Security by Xiao, Yinhao, Jia, Yizhen, Cheng, Xiuzhen, Yu, Jiguo, Liang, Zhenkai, Tian, Zhi

    Published in IEEE internet of things journal (01-08-2019)
    “…Health-related Internet of Things (IoT) devices are becoming more popular in recent years. On the one hand, users can access information of their health…”
    Get full text
    Journal Article
  7. 7

    Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android by Mingshen Sun, Xiaolei Li, Lui, John C. S., Ma, Richard T. B., Zhenkai Liang

    “…Android, the most popular mobile OS, has around 78% of the mobile market share. Due to its popularity, it attracts many malware attacks. In fact, people have…”
    Get full text
    Journal Article
  8. 8

    Toward Exposing Timing-Based Probing Attacks in Web Applications by Mao, Jian, Chen, Yue, Shi, Futian, Jia, Yaoqi, Liang, Zhenkai

    Published in Sensors (Basel, Switzerland) (25-02-2017)
    “…Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount…”
    Get full text
    Journal Article
  9. 9

    Detecting Malicious Behaviors in JavaScript Applications by Mao, Jian, Bian, Jingdong, Bai, Guangdong, Wang, Ruilong, Chen, Yue, Xiao, Yinhao, Liang, Zhenkai

    Published in IEEE access (01-01-2018)
    “…JavaScript applications are widely used in a range of scenarios, including Web applications, mobile applications, and server-side applications. On one hand,…”
    Get full text
    Journal Article
  10. 10

    A Framework for Practical Dynamic Software Updating by Chen, Gang, Jin, Hai, Zou, Deqing, Liang, Zhenkai, Zhou, Bing Bing, Wang, Hao

    “…Dynamic software updating (DSU) enables a program to be patched on the fly without being shutdown. This paper addresses the practicality problem of the recent…”
    Get full text
    Journal Article
  11. 11

    SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities by Chen, Gang, Jin, Hai, Zou, Deqing, Zhou, Bing Bing, Liang, Zhenkai, Zheng, Weide, Shi, Xuanhua

    “…Buffer overflow attacks still pose a significant threat to the security and availability of today's computer systems. Although there are a number of solutions…”
    Get full text
    Journal Article
  12. 12

    SplitPass: A Mutually Distrusting Two-Party Password Manager by Liu, Yu-Tao, Du, Dong, Xia, Yu-Bin, Chen, Hai-Bo, Zang, Bin-Yu, Liang, Zhenkai

    “…Using a password manager is known to be more convenient and secure than not using one, on the assumption that the password manager itself is safe. However…”
    Get full text
    Journal Article
  13. 13

    Automatic generation of buffer overflow attack signatures: an approach based on program behavior models by Zhenkai Liang, Sekar, R.

    “…Buffer overflows have become the most common target for network-based attacks. They are also the primary mechanism used by worms and other forms of automated…”
    Get full text
    Conference Proceeding
  14. 14

    Towards Fine-Grained Access Control in JavaScript Contexts by Patil, K., Xinshu Dong, Xiaolei Li, Zhenkai Liang, Xuxian Jiang

    “…A typical Web 2.0 application usually includes JavaScript from various sources with different trust. It is critical to properly regulate JavaScript's access to…”
    Get full text
    Conference Proceeding
  15. 15

    A Framework to Eliminate Backdoors from Response-Computable Authentication by Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Zhenkai Liang, Wei Zou

    “…Response-computable authentication (RCA) is a two-party authentication model widely adopted by authentication systems, where an authentication system…”
    Get full text
    Conference Proceeding
  16. 16

    AGIS: Towards automatic generation of infection signatures by Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Reiter, M.K.

    “…An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e.,…”
    Get full text
    Conference Proceeding
  17. 17

    DroidVault: A Trusted Data Vault for Android Devices by Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, Saxena, Prateek

    “…Mobile OSes and applications form a large, complex and vulnerability-prone software stack. In such an environment, security techniques to strongly protect…”
    Get full text
    Conference Proceeding
  18. 18

    Privilege Leakage and Information Stealing through the Android Task Mechanism by Yinhao Xiao, Guangdong Bai, Jian Mao, Zhenkai Liang, Wei Cheng

    “…To facilitate apps to collaborate in finish complex jobs, Android allows isolated apps to communicate through explicit interfaces. However, the communication…”
    Get full text
    Conference Proceeding
  19. 19

    Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages by Mao, Jian, Liu, Ziwen, Lin, Qixiao, Liang, Zhenkai

    Published in IEEE internet of things journal (15-06-2022)
    “…Recently, smart voice assistants (VAs) are widely deployed to provide control services via voice commands in IoT systems, e.g., smart home, industrial IoT…”
    Get full text
    Journal Article
  20. 20

    Scrutinizing Implementations of Smart Home Integrations by Mahadewa, Kulani, Wang, Kailong, Bai, Guangdong, Shi, Ling, Liu, Yan, Dong, Jin Song, Liang, Zhenkai

    Published in IEEE transactions on software engineering (01-12-2021)
    “…A key feature of the booming smart home is the integration of a wide assortment of technologies, including various standards, proprietary communication…”
    Get full text
    Journal Article