Follow
Purui Su
Purui Su
Verified email at iscas.ac.cn
Title
Cited by
Cited by
Year
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
3312018
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su
NDSS, 2020
1102020
Binary code continent: Finer-grained control flow integrity for stripped binaries
M Wang, H Yin, AV Bhaskar, P Su, D Feng
Proceedings of the 31st annual computer security applications conference …, 2015
512015
A typical noisy covert channel in the IP protocol
H Qu, P Su, D Feng
38th Annual 2004 International Carnahan Conference on Security Technology …, 2004
502004
基于语义的恶意代码行为特征提取及检测方法
王蕊, 冯登国, 杨轶, 苏璞睿
软件学报 23 (2), 378-393, 2012
432012
Notes on packet marking for IP traceback
DQ Li, PR Su, DG Feng
Journal of Software 15 (2), 250-258, 2004
422004
One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics.
ZL Chua, Y Wang, T Baluta, P Saxena, Z Liang, P Su
NDSS, 2019
402019
Towards efficient heap overflow discovery
X Jia, C Zhang, P Su, Y Yang, H Huang, D Feng
26th USENIX Security Symposium (USENIX Security 17), 989-1006, 2017
402017
Capability-based security enforcement in named data networking
Q Li, PPC Lee, P Zhang, P Su, L He, K Ren
IEEE/ACM Transactions on Networking 25 (5), 2719-2730, 2017
382017
Automatic polymorphic exploit generation for software vulnerabilities
M Wang, P Su, Q Li, L Ying, Y Yang, D Feng
Security and Privacy in Communication Networks: 9th International ICST …, 2013
362013
Detecting concurrency memory corruption vulnerabilities
Y Cai, B Zhu, R Meng, H Yun, L He, P Su, B Liang
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
352019
IP 追踪中的自适应包标记
李德全, 徐一丁, 苏璞睿, 冯登国
电子学报 32 (8), 1334-1337, 2004
332004
Software and cyber security-a survey
刘剑, 苏璞睿, 杨珉, 和亮, 张源, 朱雪阳, 林惠民
Journal of Software 29 (1), 42-68, 2017
292017
Bind your phone number with caution: automated user profiling through address book matching on smartphone
Y Cheng, L Ying, S Jiao, P Su, D Feng
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
292013
P2P 信任模型中基于行为相似度的共谋团体识别模型
苗光胜, 冯登国, 苏璞睿
通信学报, 9-20, 2009
282009
CloudSEC: A cloud architecture for composing collaborative security services
J Xu, J Yan, L He, P Su, D Feng
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
272010
移动社交应用的用户隐私泄漏问题研究
程瑶, 应凌云, 焦四辈, 苏璞睿, 冯登国
计算机学报 37 (001), 87-100, 2014
252014
基于攻击能力增长的网络安全分析模型
张海霞, 苏璞睿, 冯登国
计算机研究与发展 44 (12), 2012-2019, 2007
232007
Semantics-based malware behavior signature extraction and detection method
王蕊, 冯登国, 杨轶, 苏璞睿
Journal of Software 23 (2), 378-393, 2012
222012
恶意软件网络协议的语法和行为语义分析方法
应凌云, 杨轶, 冯登国, 苏璞睿
软件学报 22 (7), 1676-1689, 2011
212011
The system can't perform the operation now. Try again later.
Articles 1–20