Zheng Leong Chua
Zheng Leong Chua
Verified email at
Cited by
Cited by
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
2016 IEEE Symposium on Security and Privacy (SP), 969-986, 2016
Preventing page faults from telling your secrets
S Shinde, ZL Chua, V Narayanan, P Saxena
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Automatic Generation of {Data-Oriented} Exploits
H Hu, ZL Chua, S Adrian, P Saxena, Z Liang
24th USENIX Security Symposium (USENIX Security 15), 177-192, 2015
Neural nets can learn function type signatures from binaries
ZL Chua, S Shen, P Saxena, Z Liang
26th USENIX Security Symposium (USENIX Security 17), 99-116, 2017
A look at targeted attacks through the lense of an {NGO}
S Le Blond, A Uritesc, C Gilbert, ZL Chua, P Saxena, E Kirda
23rd USENIX Security Symposium (USENIX Security 14), 543-558, 2014
" The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Preventing your faults from telling your secrets: Defenses against pigeonhole attacks
S Shinde, ZL Chua, V Narayanan, P Saxena
arXiv preprint arXiv:1506.04832, 2015
One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics.
ZL Chua, Y Wang, T Baluta, P Saxena, Z Liang, P Su
NDSS, 2019
Scalable quantitative verification for deep neural networks
T Baluta, ZL Chua, KS Meel, P Saxena
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
Watson: Abstracting behaviors from audit logs via aggregation of contextual semantics
J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao
Proceedings of the 28th Annual Network and Distributed System Security …, 2021
Understanding Rowhammer attacks through the lens of a unified reference framework
X Lou, F Zhang, ZL Chua, Z Liang, Y Cheng, Y Zhou
arXiv preprint arXiv:1901.03538, 2019
Identifying arbitrary memory access vulnerabilities in privilege-separated software
H Hu, ZL Chua, Z Liang, P Saxena
European Symposium on Research in Computer Security, 312-331, 2015
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records
J Zeng, X Wang, J Liu, Y Chen, Z Liang, TS Chua, ZL Chua
2022 IEEE Symposium on Security and Privacy (SP), 1567-1567, 2022
Smartphone volatile memory acquisition for security analysis and forensics investigation
VLL Thing, ZL Chua
IFIP International Information Security Conference, 217-230, 2013
Enabling practical experimentation in cyber-security training
J Mao, ZL Chua, Z Liang
2017 IEEE Conference on Dependable and Secure Computing, 516-517, 2017
Data-Oriented Programming
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
On the Expressiveness of Non-Control Data Attacks, 2016
Fuzzing program logic deeply hidden in binary program stages
Y Wang, ZL Chua, Y Liu, P Su, Z Liang
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
Shweta Shinde
S Shinde, S Wang, P Yuan, A Hobor, A Roychoudhury, P Saxena, D Lee, ...
Proceedings of the 29th USENIX Security Symposium (USENIX), 2020
Poster: WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics
J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao
The system can't perform the operation now. Try again later.
Articles 1–19