Follow
Jiang Ming
Title
Cited by
Cited by
Year
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection
L Luo, J Ming, D Wu, P Liu, S Zhu
22nd ACM SIGSOFT International Symposium on the Foundations of Software …, 2014
2192014
iBinHunt: Binary Hunting with Inter-Procedural Control Flow
J Ming, M Pan, D Gao
15th Annual International Conference on Information Security and Cryptology …, 2012
1152012
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
J Ming, D Xu, Y Jiang, D Wu
26th USENIX Security Symposium (USENIX Security’17)., 2017
892017
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
882017
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping
D Xu, J Ming, D Wu
38th IEEE Symposium on Security and Privacy (S&P'17), 2017
812017
Linear Obfuscation to Combat Symbolic Execution
Z Wang, J Ming, C Jia, D Gao
16th European Symposium on Research in Computer Security (ESORICS’11), 2011
812011
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
J Ming, D Xu, L Wang, D Wu
22nd ACM Conference on Computer and Communications Security (CCS'15), 2015
792015
TaintPipe: Pipelined Symbolic Taint Analysis
J Ming, DinghaoWu, G Xiao, J Wang, P Liu
24th USENIX Security Symposium (USENIX Security’15), 2015
772015
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost
B Cheng*, J Ming*, J Fu, G Peng, T Chen, X Zhang, JY Marion
25th ACM Conference on Computer and Communications Security (CCS'18)., 2018
492018
VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification
D Xu, J Ming, Y Fu, D Wu
25th ACM Conference on Computer and Communications Security (CCS'18), 2018
472018
StraightTaint: Decoupled Offline Symbolic Taint Analysis
J Ming, D Wu, J Wang, G Xiao, P Liu
31st IEEE/ACM International Conference on Automated Software Engineering …, 2016
462016
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
D Xu, J Ming, D Wu
19th Information Security Conference (ISC'16), 2016
452016
BIM Server Requirements to Support the Energy Efficient Building Lifecycle
Y Jiang, J Ming, D Wu, J Yen, P Mitra, JI Messner, R Leicht
2012 ASCE International Conference on Computing in Civil Engineering, 2012
422012
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference
J Ming, D Xu, D Wu
30th IFIP TC-11 SEC International Information Security and Privacy …, 2015
382015
Deviation-Based Obfuscation-Resilient Program Equivalence Checking with Application to Software Plagiarism Detection
J Ming, F Zhang, D Wu, P Liu, S Zhu
IEEE Transactions on Reliability 65 (4), 2016
352016
Impeding Behavior-based Malware Analysis via Replacement Attacks to Malware Specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
Journal of Computer Virology and Hacking Techniques, 2016
312016
Translingual Obfuscation
P Wang, S Wang, J Ming, Y Jiang, D Wu.
1st IEEE European Symposium on Security and Privacy (Euro S&P'16), 2016
292016
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
13th International Conference on Applied Cryptography and Network Security …, 2015
222015
" Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps
L Shi, J Fu, Z Guo, J Ming
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
202019
Automatic Building Information Model Query Generation
Y Jiang, N Yu, J Ming, S Lee, J DeGraw, J Yen, JI Messner, D Wu
Journal of Information Technology in Construction (ITCon) 20, 518-535, 2015
202015
The system can't perform the operation now. Try again later.
Articles 1–20