Search Results - "Liang, Zhenkai"
-
1
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01-05-2016)“…As control-flow hijacking defenses gain adoption, it is important to understand the remaining capabilities of adversaries via memory exploits. Non-control data…”
Get full text
Conference Proceeding Journal Article -
2
Automated identification of sensitive data from implicit user specification
Published in Cybersecurity (Singapore) (29-09-2018)“…The sensitivity of information is dependent on the context of application and user preference. Protecting sensitive data in the cloud era requires identifying…”
Get full text
Journal Article -
3
Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity
Published in IEEE access (01-01-2017)“…Social networks have become one of the most popular platforms for users to interact with each other. Given the huge amount of sensitive data available in…”
Get full text
Journal Article -
4
Phishing page detection via learning classifiers from page layout feature
Published in EURASIP journal on wireless communications and networking (20-02-2019)“…The web technology has become the cornerstone of a wide range of platforms, such as mobile services and smart Internet-of-things (IoT) systems. In such…”
Get full text
Journal Article -
5
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
Published in Computers & security (01-11-2015)“…In this paper, we present a systematic study of browser cache poisoning (BCP) attacks, wherein a network attacker performs a one-time Man-In-The-Middle (MITM)…”
Get full text
Journal Article -
6
I Can See Your Brain: Investigating Home-Use Electroencephalography System Security
Published in IEEE internet of things journal (01-08-2019)“…Health-related Internet of Things (IoT) devices are becoming more popular in recent years. On the one hand, users can access information of their health…”
Get full text
Journal Article -
7
Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android
Published in IEEE transactions on information forensics and security (01-05-2017)“…Android, the most popular mobile OS, has around 78% of the mobile market share. Due to its popularity, it attracts many malware attacks. In fact, people have…”
Get full text
Journal Article -
8
Toward Exposing Timing-Based Probing Attacks in Web Applications
Published in Sensors (Basel, Switzerland) (25-02-2017)“…Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount…”
Get full text
Journal Article -
9
Detecting Malicious Behaviors in JavaScript Applications
Published in IEEE access (01-01-2018)“…JavaScript applications are widely used in a range of scenarios, including Web applications, mobile applications, and server-side applications. On one hand,…”
Get full text
Journal Article -
10
A Framework for Practical Dynamic Software Updating
Published in IEEE transactions on parallel and distributed systems (01-04-2016)“…Dynamic software updating (DSU) enables a program to be patched on the fly without being shutdown. This paper addresses the practicality problem of the recent…”
Get full text
Journal Article -
11
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
Published in IEEE transactions on dependable and secure computing (01-11-2013)“…Buffer overflow attacks still pose a significant threat to the security and availability of today's computer systems. Although there are a number of solutions…”
Get full text
Journal Article -
12
SplitPass: A Mutually Distrusting Two-Party Password Manager
Published in Journal of computer science and technology (2018)“…Using a password manager is known to be more convenient and secure than not using one, on the assumption that the password manager itself is safe. However…”
Get full text
Journal Article -
13
Automatic generation of buffer overflow attack signatures: an approach based on program behavior models
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…Buffer overflows have become the most common target for network-based attacks. They are also the primary mechanism used by worms and other forms of automated…”
Get full text
Conference Proceeding -
14
Towards Fine-Grained Access Control in JavaScript Contexts
Published in 2011 31st International Conference on Distributed Computing Systems (01-06-2011)“…A typical Web 2.0 application usually includes JavaScript from various sources with different trust. It is critical to properly regulate JavaScript's access to…”
Get full text
Conference Proceeding -
15
A Framework to Eliminate Backdoors from Response-Computable Authentication
Published in 2012 IEEE Symposium on Security and Privacy (01-05-2012)“…Response-computable authentication (RCA) is a two-party authentication model widely adopted by authentication systems, where an authentication system…”
Get full text
Conference Proceeding -
16
AGIS: Towards automatic generation of infection signatures
Published in 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN) (01-06-2008)“…An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e.,…”
Get full text
Conference Proceeding -
17
DroidVault: A Trusted Data Vault for Android Devices
Published in 2014 19th International Conference on Engineering of Complex Computer Systems (01-08-2014)“…Mobile OSes and applications form a large, complex and vulnerability-prone software stack. In such an environment, security techniques to strongly protect…”
Get full text
Conference Proceeding -
18
Privilege Leakage and Information Stealing through the Android Task Mechanism
Published in 2017 IEEE Symposium on Privacy-Aware Computing (PAC) (01-08-2017)“…To facilitate apps to collaborate in finish complex jobs, Android allows isolated apps to communicate through explicit interfaces. However, the communication…”
Get full text
Conference Proceeding -
19
Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages
Published in IEEE internet of things journal (15-06-2022)“…Recently, smart voice assistants (VAs) are widely deployed to provide control services via voice commands in IoT systems, e.g., smart home, industrial IoT…”
Get full text
Journal Article -
20
Scrutinizing Implementations of Smart Home Integrations
Published in IEEE transactions on software engineering (01-12-2021)“…A key feature of the booming smart home is the integration of a wide assortment of technologies, including various standards, proprietary communication…”
Get full text
Journal Article