Follow
Zheng Leong Chua
Zheng Leong Chua
Advanca
Verified email at iiyume.org
Title
Cited by
Cited by
Year
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
2016 IEEE Symposium on Security and Privacy (SP), 969-986, 2016
4942016
Preventing page faults from telling your secrets
S Shinde, ZL Chua, V Narayanan, P Saxena
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
3022016
Automatic Generation of {Data-Oriented} Exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th USENIX Security Symposium (USENIX Security 15), 177-192, 2015
2422015
Neural nets can learn function type signatures from binaries
ZL Chua, S Shen, P Saxena, Z Liang
26th USENIX Security Symposium (USENIX Security 17), 99-116, 2017
1812017
A look at targeted attacks through the lense of an {NGO}
S Le Blond, A Uritesc, C Gilbert, ZL Chua, P Saxena, E Kirda
23rd USENIX Security Symposium (USENIX Security 14), 543-558, 2014
1042014
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.
J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao
NDSS, 2021
662021
Scalable quantitative verification for deep neural networks
T Baluta, ZL Chua, KS Meel, P Saxena
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
512021
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records
J Zengy, X Wang, J Liu, Y Chen, Z Liang, TS Chua, ZL Chua
2022 IEEE Symposium on Security and Privacy (SP), 489-506, 2022
482022
One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics.
ZL Chua, Y Wang, T Baluta, P Saxena, Z Liang, P Su
NDSS, 2019
392019
" The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
352016
Identifying arbitrary memory access vulnerabilities in privilege-separated software
H Hu, ZL Chua, Z Liang, P Saxena
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
132015
Understanding Rowhammer attacks through the lens of a unified reference framework
X Lou, F Zhang, ZL Chua, Z Liang, Y Cheng, Y Zhou
arXiv preprint arXiv:1901.03538, 2019
102019
{FlowMatrix}:{GPU-Assisted}{Information-Flow} Analysis through {Matrix-Based} Representation
K Ji, J Zeng, Y Jiang, Z Liang, ZL Chua, P Saxena, A Roychoudhury
31st USENIX Security Symposium (USENIX Security 22), 2567-2584, 2022
42022
Smartphone volatile memory acquisition for security analysis and forensics investigation
VLL Thing, ZL Chua
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
42013
Enabling practical experimentation in cyber-security training
J Mao, ZL Chua, Z Liang
2017 IEEE Conference on Dependable and Secure Computing, 516-517, 2017
22017
Data-Oriented Programming
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
On the Expressiveness of Non-Control Data Attacks, 2016
22016
Fuzzing program logic deeply hidden in binary program stages
Y Wang, ZL Chua, Y Liu, P Su, Z Liang
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
12019
Preventing your faults from telling your secrets: Defenses against pigeonhole attacks
S Shinde, ZL Chua, V Narayanan, P Saxena
arXiv preprint arXiv:1506.04832, 2015
2015
2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)| 978-1-6654-1219-3/20/$31.00© 2021 IEEE| DOI: 10.1109/ICSE …
Z Abedjan, P Abrahamsson, S Abualhaija, I Abughararh, B Adams, ...
Poster: WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics
J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao
The system can't perform the operation now. Try again later.
Articles 1–20