Follow
Ping Chen
Ping Chen
Verified email at ist.psu.edu - Homepage
Title
Cited by
Cited by
Year
DROP: Detecting return-oriented programming malicious code
P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
2792009
JITDefender: A defense against JIT spraying attacks
P Chen, Y Fang, B Mao, L Xie
Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011
652011
Automatic construction of jump-oriented programming shellcode (on the x86)
P Chen, X Xing, B Mao, L Xie, X Shen, X Yin
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
562011
System call redirection: A practical approach to meeting real-world virtual machine introspection needs
R Wu, P Chen, P Liu, B Mao
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
492014
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
482016
Efficient detection of the return-oriented programming malicious code
P Chen, X Xing, H Han, B Mao, L Xie
Information Systems Security: 6th International Conference, ICISS 2010 …, 2010
462010
Brick: A binary tool for run-time detecting and locating integer-based vulnerability
P Chen, Y Wang, Z Xin, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 208-215, 2009
442009
A Practical Approach for Adaptive Data Structure Layout Randomization
PL Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao
ESORICS'15, 2015
43*2015
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
USENIX Security Symposium, 17-32, 2017
412017
JITSafe: a framework against Just-in-time spraying attacks
P Chen, R Wu, B Mao
Information Security, IET 7 (4), 283 - 292, 2013
412013
IntFinder: Automatically detecting integer bugs in x86 binary program
P Chen, H Han, Y Wang, X Shen, X Yin, B Mao, L Xie
Information and Communications Security, 336-345, 2009
322009
Return-Oriented Rootkit without Returns (on the x86).
P Chen, X Xing, B Mao, L Xie
ICICS, 340-354, 2010
262010
Dancing with wolves: Towards practical event-driven vmm monitoring
L Deng, P Liu, J Xu, P Chen, Q Zeng
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017
242017
RIM: A Method to Defend from JIT Spraying Attack
R Wu, P Chen, B Mao, L Xie
Availability, Reliability and Security (ARES), 143 - 148, 2012
202012
Traffic controller: A practical approach to block network covert timing channel
Y Wang, P Chen, Y Ge, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 349-354, 2009
172009
What you see is not what you get! thwarting just-in-time rop with chameleon
P Chen, J Xu, Z Hu, X Xing, M Zhu, B Mao, P Liu
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
112017
Method and apparatus for handling bugs
K Chen, J Tao, B Chen, P Chen
US Patent App. 14/568,738, 2015
112015
RandHyp: Preventing Attacks via Xen Hypercall Interface
F Wang, P Chen, B Mao, L Xie
SEC 2012, 138-149, 2012
112012
Semantics-preserving reinforcement learning attack against graph neural networks for malware detection
L Zhang, P Liu, Y Choi, P Chen
IEEE Transactions on Dependable and Secure Computing, 2022
102022
Detecting integer bugs based on static and dynamic program analysis
P Chen, H Han, X SHEN, XC Yin, B Mao, L Xie
ACTA ELECTONICA SINICA 38 (8), 1741, 2010
92010
The system can't perform the operation now. Try again later.
Articles 1–20