DROP: Detecting return-oriented programming malicious code P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie Information Systems Security: 5th International Conference, ICISS 2009 …, 2009 | 279 | 2009 |
JITDefender: A defense against JIT spraying attacks P Chen, Y Fang, B Mao, L Xie Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011 | 65 | 2011 |
Automatic construction of jump-oriented programming shellcode (on the x86) P Chen, X Xing, B Mao, L Xie, X Shen, X Yin Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 56 | 2011 |
System call redirection: A practical approach to meeting real-world virtual machine introspection needs R Wu, P Chen, P Liu, B Mao 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 49 | 2014 |
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump J Xu, D Mu, P Chen, X Xing, P Wang, P Liu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 48 | 2016 |
Efficient detection of the return-oriented programming malicious code P Chen, X Xing, H Han, B Mao, L Xie Information Systems Security: 6th International Conference, ICISS 2010 …, 2010 | 46 | 2010 |
Brick: A binary tool for run-time detecting and locating integer-based vulnerability P Chen, Y Wang, Z Xin, B Mao, L Xie 2009 International Conference on Availability, Reliability and Security, 208-215, 2009 | 44 | 2009 |
A Practical Approach for Adaptive Data Structure Layout Randomization PL Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao ESORICS'15, 2015 | 43* | 2015 |
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. J Xu, D Mu, X Xing, P Liu, P Chen, B Mao USENIX Security Symposium, 17-32, 2017 | 41 | 2017 |
JITSafe: a framework against Just-in-time spraying attacks P Chen, R Wu, B Mao Information Security, IET 7 (4), 283 - 292, 2013 | 41 | 2013 |
IntFinder: Automatically detecting integer bugs in x86 binary program P Chen, H Han, Y Wang, X Shen, X Yin, B Mao, L Xie Information and Communications Security, 336-345, 2009 | 32 | 2009 |
Return-Oriented Rootkit without Returns (on the x86). P Chen, X Xing, B Mao, L Xie ICICS, 340-354, 2010 | 26 | 2010 |
Dancing with wolves: Towards practical event-driven vmm monitoring L Deng, P Liu, J Xu, P Chen, Q Zeng Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017 | 24 | 2017 |
RIM: A Method to Defend from JIT Spraying Attack R Wu, P Chen, B Mao, L Xie Availability, Reliability and Security (ARES), 143 - 148, 2012 | 20 | 2012 |
Traffic controller: A practical approach to block network covert timing channel Y Wang, P Chen, Y Ge, B Mao, L Xie 2009 International Conference on Availability, Reliability and Security, 349-354, 2009 | 17 | 2009 |
What you see is not what you get! thwarting just-in-time rop with chameleon P Chen, J Xu, Z Hu, X Xing, M Zhu, B Mao, P Liu 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 11 | 2017 |
Method and apparatus for handling bugs K Chen, J Tao, B Chen, P Chen US Patent App. 14/568,738, 2015 | 11 | 2015 |
RandHyp: Preventing Attacks via Xen Hypercall Interface F Wang, P Chen, B Mao, L Xie SEC 2012, 138-149, 2012 | 11 | 2012 |
Semantics-preserving reinforcement learning attack against graph neural networks for malware detection L Zhang, P Liu, Y Choi, P Chen IEEE Transactions on Dependable and Secure Computing, 2022 | 10 | 2022 |
Detecting integer bugs based on static and dynamic program analysis P Chen, H Han, X SHEN, XC Yin, B Mao, L Xie ACTA ELECTONICA SINICA 38 (8), 1741, 2010 | 9 | 2010 |