Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chengyu Song
@article{DBLP:journals/dt/KoruyehKSA24, author = {Esmaeil Mohammadian Koruyeh and Khaled N. Khasawneh and Chengyu Song and Nael B. Abu{-}Ghazaleh}, title = {Spectre Returns! Speculation Attacks Using the Return Stack Buffer}, journal = {{IEEE} Des. Test}, volume = {41}, number = {2}, pages = {47--55}, year = {2024}, url = {https://doi.org/10.1109/MDAT.2024.3352537}, doi = {10.1109/MDAT.2024.3352537}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dt/KoruyehKSA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-05212, author = {Xingyu Li and Zheng Zhang and Zhiyun Qian and Trent Jaeger and Chengyu Song}, title = {An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem}, journal = {CoRR}, volume = {abs/2402.05212}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.05212}, doi = {10.48550/ARXIV.2402.05212}, eprinttype = {arXiv}, eprint = {2402.05212}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-05212.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcmi/SongZLZWLSZT23, author = {Chengyu Song and Shan Zhu and Yanyan Liu and Wei Zhang and Zhi Wang and Wangxiao Li and Zhenye Sun and Peng Zhao and Shengzhang Tian}, title = {DCNAS-Net: deformation convolution and neural architecture search detection network for bone marrow oedema}, journal = {{BMC} Medical Imaging}, volume = {23}, number = {1}, pages = {45}, year = {2023}, url = {https://doi.org/10.1186/s12880-023-01003-8}, doi = {10.1186/S12880-023-01003-8}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bmcmi/SongZLZWLSZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcmi/ZhangWBFLLSHLWSLWSZWWSZJTLWXWZM23, author = {Ruyi Zhang and Peng Wang and Yanzhu Bian and Yan Fan and Jianming Li and Xuehui Liu and Jie Shen and Yujing Hu and Xianghe Liao and He Wang and Chengyu Song and Wangxiao Li and Xiaojie Wang and Momo Sun and Jianping Zhang and Miao Wang and Shen Wang and Yiming Shen and Xuemei Zhang and Qiang Jia and Jian Tan and Ning Li and Sen Wang and Lingyun Xu and Weiming Wu and Wei Zhang and Zhaowei Meng}, title = {Establishment and validation of an AI-aid method in the diagnosis of myocardial perfusion imaging}, journal = {{BMC} Medical Imaging}, volume = {23}, number = {1}, pages = {84}, year = {2023}, url = {https://doi.org/10.1186/s12880-023-01037-y}, doi = {10.1186/S12880-023-01037-Y}, timestamp = {Thu, 11 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcmi/ZhangWBFLLSHLWSLWSZWWSZJTLWXWZM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/ShaoSZCC23, author = {Taihua Shao and Chengyu Song and Jianming Zheng and Fei Cai and Honghui Chen}, title = {Exploring Internal and External Interactions for Semi-Structured Multivariate Attributes in Job-Resume Matching}, journal = {Int. J. Intell. Syst.}, volume = {2023}, pages = {1--16}, year = {2023}, url = {https://doi.org/10.1155/2023/2994779}, doi = {10.1155/2023/2994779}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/ShaoSZCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/SongCZ0S23, author = {Chengyu Song and Fei Cai and Jianming Zheng and Xiang Zhao and Taihua Shao}, title = {AugPrompt: Knowledgeable augmented-trigger prompt for few-shot event classification}, journal = {Inf. Process. Manag.}, volume = {60}, number = {4}, pages = {103153}, year = {2023}, url = {https://doi.org/10.1016/j.ipm.2022.103153}, doi = {10.1016/J.IPM.2022.103153}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipm/SongCZ0S23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/WangZCSL23, author = {Siyuan Wang and Jianming Zheng and Fei Cai and Chengyu Song and Xueshan Luo}, title = {MsPrompt: Multi-step prompt learning for debiasing few-shot event detection}, journal = {Inf. Process. Manag.}, volume = {60}, number = {6}, pages = {103509}, year = {2023}, url = {https://doi.org/10.1016/j.ipm.2023.103509}, doi = {10.1016/J.IPM.2023.103509}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipm/WangZCSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/WangCPS23, author = {Yitong Wang and Fei Cai and Zhiqiang Pan and Chengyu Song}, title = {Self-supervised graph learning with target-adaptive masking for session-based recommendation}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {24}, number = {1}, pages = {73--87}, year = {2023}, url = {https://doi.org/10.1631/FITEE.2200137}, doi = {10.1631/FITEE.2200137}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jzusc/WangCPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/SongCWZS23, author = {Chengyu Song and Fei Cai and Mengru Wang and Jianming Zheng and Taihua Shao}, title = {TaxonPrompt: Taxonomy-aware curriculum prompt learning for few-shot event classification}, journal = {Knowl. Based Syst.}, volume = {264}, pages = {110290}, year = {2023}, url = {https://doi.org/10.1016/j.knosys.2023.110290}, doi = {10.1016/J.KNOSYS.2023.110290}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/SongCWZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ChenSY23, author = {Ju Chen and Chengyu Song and Heng Yin}, title = {R-Fuzz at SBFT'2023}, booktitle = {{IEEE/ACM} International Workshop on Search-Based and Fuzz Testing, SBFT@ICSE 2023, Melbourne, Australia, May 14, 2023}, pages = {82--83}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SBFT59156.2023.00027}, doi = {10.1109/SBFT59156.2023.00027}, timestamp = {Wed, 02 Aug 2023 11:15:08 +0200}, biburl = {https://dblp.org/rec/conf/icse/ChenSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wacv/AichLSAKR23, author = {Abhishek Aich and Shasha Li and Chengyu Song and M. Salman Asif and Srikanth V. Krishnamurthy and Amit K. Roy{-}Chowdhury}, title = {Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks}, booktitle = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV} 2023, Waikoloa, HI, USA, January 2-7, 2023}, pages = {1308--1318}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WACV56688.2023.00136}, doi = {10.1109/WACV56688.2023.00136}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wacv/AichLSAKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-09335, author = {Siyuan Wang and Jianming Zheng and Xuejun Hu and Fei Cai and Chengyu Song and Xueshan Luo}, title = {MsPrompt: Multi-step Prompt Learning for Debiasing Few-shot Event Detection}, journal = {CoRR}, volume = {abs/2305.09335}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.09335}, doi = {10.48550/ARXIV.2305.09335}, eprinttype = {arXiv}, eprint = {2305.09335}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-09335.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ir/CaiPSZ22, author = {Fei Cai and Zhiqiang Pan and Chengyu Song and Xin Zhang}, title = {Exploring latent connections in graph neural networks for session-based recommendation}, journal = {Inf. Retr. J.}, volume = {25}, number = {3}, pages = {329--363}, year = {2022}, url = {https://doi.org/10.1007/s10791-022-09412-z}, doi = {10.1007/S10791-022-09412-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ir/CaiPSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/CaiXLYSKRA22, author = {Zikui Cai and Xinxin Xie and Shasha Li and Mingjun Yin and Chengyu Song and Srikanth V. Krishnamurthy and Amit K. Roy{-}Chowdhury and M. Salman Asif}, title = {Context-Aware Transfer Attacks for Object Detection}, booktitle = {Thirty-Sixth {AAAI} Conference on Artificial Intelligence, {AAAI} 2022, Thirty-Fourth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2022, The Twelveth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2022 Virtual Event, February 22 - March 1, 2022}, pages = {149--157}, publisher = {{AAAI} Press}, year = {2022}, url = {https://doi.org/10.1609/aaai.v36i1.19889}, doi = {10.1609/AAAI.V36I1.19889}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaai/CaiXLYSKRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/CaiRBSKRA22, author = {Zikui Cai and Shantanu Rane and Alejandro E. Brito and Chengyu Song and Srikanth V. Krishnamurthy and Amit K. Roy{-}Chowdhury and M. Salman Asif}, title = {Zero-Query Transfer Attacks on Context-Aware Object Detectors}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {15004--15014}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01460}, doi = {10.1109/CVPR52688.2022.01460}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/CaiRBSKRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Zhai0ZCLQSSKJY22, author = {Yizhuo Zhai and Yu Hao and Zheng Zhang and Weiteng Chen and Guoren Li and Zhiyun Qian and Chengyu Song and Manu Sridharan and Srikanth V. Krishnamurthy and Trent Jaeger and Paul L. Yu}, title = {Progressive Scrutiny: Incremental Detection of {UBI} bugs in the Linux Kernel}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-249/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Zhai0ZCLQSSKJY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/AichTGSKA022, author = {Abhishek Aich and Calvin{-}Khang Ta and Akash Gupta and Chengyu Song and Srikanth V. Krishnamurthy and M. Salman Asif and Amit Roy{-}Chowdhury}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {{GAMA:} Generative Adversarial Multi-Object Scene Attacks}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/efbd571f139d26604e53fe2760e2c073-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/AichTGSKA022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/CaiSKRA22, author = {Zikui Cai and Chengyu Song and Srikanth Krishnamurthy and Amit Roy{-}Chowdhury and Salman Asif}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {Blackbox Attacks via Surrogate Ensemble Search}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/23b9d4e18b151ba2108fb3f1efaf8de4-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/CaiSKRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenWSY22, author = {Ju Chen and Jinghan Wang and Chengyu Song and Heng Yin}, title = {{JIGSAW:} Efficient and Scalable Path Constraints Fuzzing}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {18--35}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833796}, doi = {10.1109/SP46214.2022.9833796}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChenWSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiuYCSQY22, author = {Jian Liu and Lin Yi and Weiteng Chen and Chengyu Song and Zhiyun Qian and Qiuping Yi}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {125--142}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/liu-jian}, timestamp = {Sun, 03 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiuYCSQY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenHYZSLYS22, author = {Ju Chen and Wookhyun Han and Mingjun Yin and Haochen Zeng and Chengyu Song and Byoungyoung Lee and Heng Yin and Insik Shin}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {{SYMSAN:} Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2531--2548}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/chen-ju}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChenHYZSLYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wacv/YinLSARK22, author = {Mingjun Yin and Shasha Li and Chengyu Song and M. Salman Asif and Amit K. Roy{-}Chowdhury and Srikanth V. Krishnamurthy}, title = {{ADC:} Adversarial attacks against object Detection that evade Context consistency checks}, booktitle = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV} 2022, Waikoloa, HI, USA, January 3-8, 2022}, pages = {2836--2845}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WACV51458.2022.00289}, doi = {10.1109/WACV51458.2022.00289}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wacv/YinLSARK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-15230, author = {Zikui Cai and Shantanu Rane and Alejandro E. Brito and Chengyu Song and Srikanth V. Krishnamurthy and Amit K. Roy{-}Chowdhury and M. Salman Asif}, title = {Zero-Query Transfer Attacks on Context-Aware Object Detectors}, journal = {CoRR}, volume = {abs/2203.15230}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.15230}, doi = {10.48550/ARXIV.2203.15230}, eprinttype = {arXiv}, eprint = {2203.15230}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-15230.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-03610, author = {Zikui Cai and Chengyu Song and Srikanth V. Krishnamurthy and Amit K. Roy{-}Chowdhury and M. Salman Asif}, title = {Blackbox Attacks via Surrogate Ensemble Search}, journal = {CoRR}, volume = {abs/2208.03610}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.03610}, doi = {10.48550/ARXIV.2208.03610}, eprinttype = {arXiv}, eprint = {2208.03610}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-03610.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-09502, author = {Abhishek Aich and Calvin{-}Khang Ta and Akash Gupta and Chengyu Song and Srikanth V. Krishnamurthy and M. Salman Asif and Amit K. Roy{-}Chowdhury}, title = {{GAMA:} Generative Adversarial Multi-Object Scene Attacks}, journal = {CoRR}, volume = {abs/2209.09502}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.09502}, doi = {10.48550/ARXIV.2209.09502}, eprinttype = {arXiv}, eprint = {2209.09502}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-09502.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-09883, author = {Abhishek Aich and Shasha Li and Chengyu Song and M. Salman Asif and Srikanth V. Krishnamurthy and Amit K. Roy{-}Chowdhury}, title = {Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks}, journal = {CoRR}, volume = {abs/2209.09883}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.09883}, doi = {10.48550/ARXIV.2209.09883}, eprinttype = {arXiv}, eprint = {2209.09883}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-09883.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwe/HuangS21, author = {Mingyi Huang and Chengyu Song}, title = {ARMPatch: {A} Binary Patching Framework for ARM-based IoT Devices}, journal = {J. Web Eng.}, volume = {20}, number = {6}, year = {2021}, url = {https://doi.org/10.13052/jwe1540-9589.2066}, doi = {10.13052/JWE1540-9589.2066}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jwe/HuangS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuXSKL21, author = {Kangjie Lu and Meng Xu and Chengyu Song and Taesoo Kim and Wenke Lee}, title = {Stopping Memory Disclosures via Diversification and Replicated Execution}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {160--173}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2878234}, doi = {10.1109/TDSC.2018.2878234}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LuXSKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/SongCZCP21, author = {Chengyu Song and Fei Cai and Jianming Zheng and Wanyu Chen and Zhiqiang Pan}, editor = {Gianluca Demartini and Guido Zuccon and J. Shane Culpepper and Zi Huang and Hanghang Tong}, title = {Metric Sentiment Learning for Label Representation}, booktitle = {{CIKM} '21: The 30th {ACM} International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1 - 5, 2021}, pages = {1703--1712}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3459637.3482369}, doi = {10.1145/3459637.3482369}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cikm/SongCZCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/YinLCSARK21, author = {Mingjun Yin and Shasha Li and Zikui Cai and Chengyu Song and M. Salman Asif and Amit K. Roy{-}Chowdhury and Srikanth V. Krishnamurthy}, title = {Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes}, booktitle = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2021, Montreal, QC, Canada, October 10-17, 2021}, pages = {7838--7847}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCV48922.2021.00776}, doi = {10.1109/ICCV48922.2021.00776}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/YinLCSARK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangSY21, author = {Jinghan Wang and Chengyu Song and Heng Yin}, title = {Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/reinforcement-learning-based-hierarchical-seed-scheduling-for-greybox-fuzzing/}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/LiAZASRK21, author = {Shasha Li and Abhishek Aich and Shitong Zhu and M. Salman Asif and Chengyu Song and Amit K. Roy{-}Chowdhury and Srikanth V. Krishnamurthy}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {2085--2096}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/103303dd56a731e377d01f6a37badae3-Abstract.html}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/LiAZASRK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-08421, author = {Mingjun Yin and Shasha Li and Zikui Cai and Chengyu Song and M. Salman Asif and Amit K. Roy{-}Chowdhury and Srikanth V. Krishnamurthy}, title = {Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes}, journal = {CoRR}, volume = {abs/2108.08421}, year = {2021}, url = {https://arxiv.org/abs/2108.08421}, eprinttype = {arXiv}, eprint = {2108.08421}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-08421.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-01823, author = {Shasha Li and Abhishek Aich and Shitong Zhu and M. Salman Asif and Chengyu Song and Amit K. Roy{-}Chowdhury and Srikanth V. Krishnamurthy}, title = {Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations}, journal = {CoRR}, volume = {abs/2110.01823}, year = {2021}, url = {https://arxiv.org/abs/2110.01823}, eprinttype = {arXiv}, eprint = {2110.01823}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-01823.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-12321, author = {Mingjun Yin and Shasha Li and Chengyu Song and M. Salman Asif and Amit K. Roy{-}Chowdhury and Srikanth V. Krishnamurthy}, title = {{ADC:} Adversarial attacks against object Detection that evade Context consistency checks}, journal = {CoRR}, volume = {abs/2110.12321}, year = {2021}, url = {https://arxiv.org/abs/2110.12321}, eprinttype = {arXiv}, eprint = {2110.12321}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-12321.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-03223, author = {Zikui Cai and Xinxin Xie and Shasha Li and Mingjun Yin and Chengyu Song and Srikanth V. Krishnamurthy and Amit K. Roy{-}Chowdhury and M. Salman Asif}, title = {Context-Aware Transfer Attacks for Object Detection}, journal = {CoRR}, volume = {abs/2112.03223}, year = {2021}, url = {https://arxiv.org/abs/2112.03223}, eprinttype = {arXiv}, eprint = {2112.03223}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-03223.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/ZhangSYZS020, author = {Pan Zhang and Chengyu Song and Heng Yin and Deqing Zou and Elaine Shi and Hai Jin}, editor = {James R. Larus and Luis Ceze and Karin Strauss}, title = {Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks}, booktitle = {{ASPLOS} '20: Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, March 16-20, 2020}, pages = {1263--1276}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3373376.3378487}, doi = {10.1145/3373376.3378487}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asplos/ZhangSYZS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/LiZPRSKSC20, author = {Shasha Li and Shitong Zhu and Sudipta Paul and Amit K. Roy{-}Chowdhury and Chengyu Song and Srikanth V. Krishnamurthy and Ananthram Swami and Kevin S. Chan}, editor = {Andrea Vedaldi and Horst Bischof and Thomas Brox and Jan{-}Michael Frahm}, title = {Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency}, booktitle = {Computer Vision - {ECCV} 2020 - 16th European Conference, Glasgow, UK, August 23-28, 2020, Proceedings, Part {XXIII}}, series = {Lecture Notes in Computer Science}, volume = {12368}, pages = {396--413}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58592-1\_24}, doi = {10.1007/978-3-030-58592-1\_24}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eccv/LiZPRSKSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/0002Z0QSKCB20, author = {Zhongjie Wang and Shitong Zhu and Yue Cao and Zhiyun Qian and Chengyu Song and Srikanth V. Krishnamurthy and Kevin S. Chan and Tracy D. Braun}, title = {SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/symtcp-eluding-stateful-deep-packet-inspection-with-automated-discrepancy-discovery/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/0002Z0QSKCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BhattacharyyaSK20, author = {Atri Bhattacharyya and Andr{\'{e}}s S{\'{a}}nchez and Esmaeil Mohammadian Koruyeh and Nael B. Abu{-}Ghazaleh and Chengyu Song and Mathias Payer}, editor = {Manuel Egele and Leyla Bilge}, title = {SpecROP: Speculative Exploitation of {ROP} Chains}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {1--16}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/bhattacharyya}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/raid/BhattacharyyaSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/ZhaiHZWSQLKY20, author = {Yizhuo Zhai and Yu Hao and Hang Zhang and Daimeng Wang and Chengyu Song and Zhiyun Qian and Mohsen Lesani and Srikanth V. Krishnamurthy and Paul L. Yu}, editor = {Prem Devanbu and Myra B. Cohen and Thomas Zimmermann}, title = {UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel}, booktitle = {{ESEC/FSE} '20: 28th {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Virtual Event, USA, November 8-13, 2020}, pages = {221--232}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3368089.3409686}, doi = {10.1145/3368089.3409686}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/ZhaiHZWSQLKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/SongSJL20, author = {Suhwan Song and Chengyu Song and Yeongjin Jang and Byoungyoung Lee}, editor = {Prem Devanbu and Myra B. Cohen and Thomas Zimmermann}, title = {CrFuzz: fuzzing multi-purpose programs through input validation}, booktitle = {{ESEC/FSE} '20: 28th {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Virtual Event, USA, November 8-13, 2020}, pages = {690--700}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3368089.3409769}, doi = {10.1145/3368089.3409769}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/SongSJL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KoruyehSKSA20, author = {Esmaeil Mohammadian Koruyeh and Shirin Haji Amin Shirazi and Khaled N. Khasawneh and Chengyu Song and Nael B. Abu{-}Ghazaleh}, title = {SpecCFI: Mitigating Spectre Attacks using {CFI} Informed Speculation}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {39--53}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00033}, doi = {10.1109/SP40000.2020.00033}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/KoruyehSKSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-09763, author = {Shasha Li and Shitong Zhu and Sudipta Paul and Amit K. Roy{-}Chowdhury and Chengyu Song and Srikanth V. Krishnamurthy and Ananthram Swami and Kevin S. Chan}, title = {Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency}, journal = {CoRR}, volume = {abs/2007.09763}, year = {2020}, url = {https://arxiv.org/abs/2007.09763}, eprinttype = {arXiv}, eprint = {2007.09763}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-09763.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-11772, author = {Shasha Li and Karim Khalil and Rameswar Panda and Chengyu Song and Srikanth V. Krishnamurthy and Amit K. Roy{-}Chowdhury and Ananthram Swami}, title = {Measurement-driven Security Analysis of Imperceptible Impersonation Attacks}, journal = {CoRR}, volume = {abs/2008.11772}, year = {2020}, url = {https://arxiv.org/abs/2008.11772}, eprinttype = {arXiv}, eprint = {2008.11772}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-11772.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/00030QSKY19, author = {Yue Cao and Zhongjie Wang and Zhiyun Qian and Chengyu Song and Srikanth V. Krishnamurthy and Paul L. Yu}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Principled Unearthing of {TCP} Side Channel Vulnerabilities}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {211--224}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354250}, doi = {10.1145/3319535.3354250}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/00030QSKY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/KhasawnehKSEPA19, author = {Khaled N. Khasawneh and Esmaeil Mohammadian Koruyeh and Chengyu Song and Dmitry Evtyushkin and Dmitry Ponomarev and Nael B. Abu{-}Ghazaleh}, title = {SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation}, booktitle = {Proceedings of the 56th Annual Design Automation Conference 2019, {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019}, pages = {60}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3316781.3317903}, doi = {10.1145/3316781.3317903}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/KhasawnehKSEPA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/GasparisQSK0Y19, author = {Ioannis Gasparis and Zhiyun Qian and Chengyu Song and Srikanth V. Krishnamurthy and Rajiv Gupta and Paul L. Yu}, title = {Figment: Fine-grained Permission Management for Mobile Apps}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {1405--1413}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737436}, doi = {10.1109/INFOCOM.2019.8737436}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/GasparisQSK0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/MuGCCGXMS19, author = {Dongliang Mu and Wenbo Guo and Alejandro Cuevas and Yueqi Chen and Jinxuan Gai and Xinyu Xing and Bing Mao and Chengyu Song}, title = {{RENN:} Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis}, booktitle = {34th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2019, San Diego, CA, USA, November 11-15, 2019}, pages = {924--935}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ASE.2019.00090}, doi = {10.1109/ASE.2019.00090}, timestamp = {Mon, 16 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/MuGCCGXMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiNPSKRS19, author = {Shasha Li and Ajaya Neupane and Sujoy Paul and Chengyu Song and Srikanth V. Krishnamurthy and Amit K. Roy{-}Chowdhury and Ananthram Swami}, title = {Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/stealthy-adversarial-perturbations-against-real-time-video-classification-systems/}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LiNPSKRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangDSYS19, author = {Jinghan Wang and Yue Duan and Wei Song and Heng Yin and Chengyu Song}, title = {Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {1--15}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/wang}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/WangDSYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhengDYSZS19, author = {Yaowen Zheng and Ali Davanian and Heng Yin and Chengyu Song and Hongsong Zhu and Limin Sun}, editor = {Nadia Heninger and Patrick Traynor}, title = {{FIRM-AFL:} High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1099--1114}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/zheng}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhengDYSZS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-09532, author = {Wookhyun Han and Md. Lutfor Rahman and Yuxuan Chen and Chengyu Song and Byoungyoung Lee and Insik Shin}, title = {SynFuzz: Efficient Concolic Execution via Branch Condition Synthesis}, journal = {CoRR}, volume = {abs/1905.09532}, year = {2019}, url = {http://arxiv.org/abs/1905.09532}, eprinttype = {arXiv}, eprint = {1905.09532}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-09532.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-01345, author = {Esmaeil Mohammadian Koruyeh and Shirin Haji Amin Shirazi and Khaled N. Khasawneh and Chengyu Song and Nael B. Abu{-}Ghazaleh}, title = {{SPECCFI:} Mitigating Spectre Attacks using {CFI} Informed Speculation}, journal = {CoRR}, volume = {abs/1906.01345}, year = {2019}, url = {http://arxiv.org/abs/1906.01345}, eprinttype = {arXiv}, eprint = {1906.01345}, timestamp = {Thu, 13 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-01345.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RahmanNS18, author = {Md. Lutfor Rahman and Ajaya Neupane and Chengyu Song}, title = {{IAC:} On the Feasibility of Utilizing Neural Signals for Access Control}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {641--652}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274713}, doi = {10.1145/3274694.3274713}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RahmanNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GasparisAQSK0C18, author = {Ioannis Gasparis and Azeem Aqil and Zhiyun Qian and Chengyu Song and Srikanth V. Krishnamurthy and Rajiv Gupta and Edward Colbert}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Droid {M+:} Developer Support for Imbibing Android's New Permission Model}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {765--776}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196533}, doi = {10.1145/3196494.3196533}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GasparisAQSK0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/NguyenSQKCM18, author = {Dang Tu Nguyen and Chengyu Song and Zhiyun Qian and Srikanth V. Krishnamurthy and Edward J. M. Colbert and Patrick D. McDaniel}, editor = {Xenofontas A. Dimitropoulos and Alberto Dainotti and Laurent Vanbever and Theophilus Benson}, title = {IotSan: fortifying the safety of IoT systems}, booktitle = {Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2018, Heraklion, Greece, December 04-07, 2018}, pages = {191--203}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3281411.3281440}, doi = {10.1145/3281411.3281440}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/conext/NguyenSQKCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HanJLSS18, author = {Wookhyun Han and Byunggill Joe and Byoungyoung Lee and Chengyu Song and Insik Shin}, title = {Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_05A-5\_Han\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/HanJLSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/RahmanBNPS18, author = {Md. Lutfor Rahman and Sharmistha Bardhan and Ajaya Neupane and Evangelos E. Papalexakis and Chengyu Song}, editor = {Ulf Brefeld and Edward Curry and Elizabeth Daly and Brian MacNamee and Alice Marascu and Fabio Pinelli and Michele Berlingerio and Neil Hurley}, title = {Learning Tensor-Based Representations from Brain-Computer Interface Data for Cybersecurity}, booktitle = {Machine Learning and Knowledge Discovery in Databases - European Conference, {ECML} {PKDD} 2018, Dublin, Ireland, September 10-14, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11053}, pages = {389--404}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10997-4\_24}, doi = {10.1007/978-3-030-10997-4\_24}, timestamp = {Fri, 09 Apr 2021 18:44:22 +0200}, biburl = {https://dblp.org/rec/conf/pkdd/RahmanBNPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/KoruyehKSA18, author = {Esmaeil Mohammadian Koruyeh and Khaled N. Khasawneh and Chengyu Song and Nael B. Abu{-}Ghazaleh}, editor = {Christian Rossow and Yves Younan}, title = {Spectre Returns! Speculation Attacks using the Return Stack Buffer}, booktitle = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore, MD, USA, August 13-14, 2018}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/woot18/presentation/koruyeh}, timestamp = {Mon, 01 Feb 2021 08:41:54 +0100}, biburl = {https://dblp.org/rec/conf/woot/KoruyehKSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-05179, author = {Khaled N. Khasawneh and Esmaeil Mohammadian Koruyeh and Chengyu Song and Dmitry Evtyushkin and Dmitry Ponomarev and Nael B. Abu{-}Ghazaleh}, title = {SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation}, journal = {CoRR}, volume = {abs/1806.05179}, year = {2018}, url = {http://arxiv.org/abs/1806.05179}, eprinttype = {arXiv}, eprint = {1806.05179}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-05179.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-00458, author = {Shasha Li and Ajaya Neupane and Sujoy Paul and Chengyu Song and Srikanth V. Krishnamurthy and Amit K. Roy{-}Chowdhury and Ananthram Swami}, title = {Adversarial Perturbations Against Real-Time Video Classification Systems}, journal = {CoRR}, volume = {abs/1807.00458}, year = {2018}, url = {http://arxiv.org/abs/1807.00458}, eprinttype = {arXiv}, eprint = {1807.00458}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-00458.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-07940, author = {Esmaeil Mohammadian Koruyeh and Khaled N. Khasawneh and Chengyu Song and Nael B. Abu{-}Ghazaleh}, title = {Spectre Returns! Speculation Attacks using the Return Stack Buffer}, journal = {CoRR}, volume = {abs/1807.07940}, year = {2018}, url = {http://arxiv.org/abs/1807.07940}, eprinttype = {arXiv}, eprint = {1807.07940}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-07940.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-09038, author = {Ketan Bhardwaj and Ming{-}Wei Shih and Ada Gavrilovska and Taesoo Kim and Chengyu Song}, title = {{SPX:} Preserving End-to-End Security for Edge Computing}, journal = {CoRR}, volume = {abs/1809.09038}, year = {2018}, url = {http://arxiv.org/abs/1809.09038}, eprinttype = {arXiv}, eprint = {1809.09038}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-09038.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-09551, author = {Dang Tu Nguyen and Chengyu Song and Zhiyun Qian and Srikanth V. Krishnamurthy and Edward J. M. Colbert and Patrick D. McDaniel}, title = {IoTSan: Fortifying the Safety of IoT Systems}, journal = {CoRR}, volume = {abs/1810.09551}, year = {2018}, url = {http://arxiv.org/abs/1810.09551}, eprinttype = {arXiv}, eprint = {1810.09551}, timestamp = {Wed, 31 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-09551.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/WangCQSK17, author = {Zhongjie Wang and Yue Cao and Zhiyun Qian and Chengyu Song and Srikanth V. Krishnamurthy}, editor = {Steve Uhlig and Olaf Maennel}, title = {Your state is not mine: a closer look at evading stateful internet censorship}, booktitle = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017, London, United Kingdom, November 1-3, 2017}, pages = {114--127}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3131365.3131374}, doi = {10.1145/3131365.3131374}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/WangCQSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DingQSHKL17, author = {Ren Ding and Chenxiong Qian and Chengyu Song and William Harris and Taesoo Kim and Wenke Lee}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Efficient Protection of Path-Sensitive Control Security}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {131--148}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ding}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/DingQSHKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GasparisQSK17, author = {Ioannis Gasparis and Zhiyun Qian and Chengyu Song and Srikanth V. Krishnamurthy}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Detecting Android Root Exploits by Learning from Root Providers}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1129--1144}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/gasparis}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GasparisQSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Song16, author = {Chengyu Song}, title = {Preventing exploits against memory corruption vulnerabilities}, school = {Georgia Institute of Technology, Atlanta, GA, {USA}}, year = {2016}, url = {https://hdl.handle.net/1853/55651}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Song16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/XuSJSLZDJLQLK16, author = {Meng Xu and Chengyu Song and Yang Ji and Ming{-}Wei Shih and Kangjie Lu and Cong Zheng and Ruian Duan and Yeongjin Jang and Byoungyoung Lee and Chenxiong Qian and Sangho Lee and Taesoo Kim}, title = {Toward Engineering a Secure Android Ecosystem: {A} Survey of Existing Techniques}, journal = {{ACM} Comput. Surv.}, volume = {49}, number = {2}, pages = {38:1--38:47}, year = {2016}, url = {https://doi.org/10.1145/2963145}, doi = {10.1145/2963145}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/XuSJSLZDJLQLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuSKL16, author = {Kangjie Lu and Chengyu Song and Taesoo Kim and Wenke Lee}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {920--932}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978366}, doi = {10.1145/2976749.2978366}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuSKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SongLLHKL16, author = {Chengyu Song and Byoungyoung Lee and Kangjie Lu and William Harris and Taesoo Kim and Wenke Lee}, title = {Enforcing Kernel Security Invariants with Data Flow Integrity}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/enforcing-kernal-security-invariants-data-flow-integrity.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/SongLLHKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhangSCPLDS16, author = {Chao Zhang and Dawn Song and Scott A. Carr and Mathias Payer and Tongxin Li and Yu Ding and Chengyu Song}, title = {VTrust: Regaining Trust on Virtual Calls}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/vtrust-regaining-trust-virtual-calls.pdf}, timestamp = {Tue, 16 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhangSCPLDS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SongMAYLKLP16, author = {Chengyu Song and Hyungon Moon and Monjur Alam and Insu Yun and Byoungyoung Lee and Taesoo Kim and Wenke Lee and Yunheung Paek}, title = {{HDFI:} Hardware-Assisted Data-Flow Isolation}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {1--17}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.9}, doi = {10.1109/SP.2016.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SongMAYLKLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuSLCKL15, author = {Kangjie Lu and Chengyu Song and Byoungyoung Lee and Simon P. Chung and Taesoo Kim and Wenke Lee}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {280--291}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813694}, doi = {10.1145/2810103.2813694}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuSLCKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangNCSCS15, author = {Chao Zhang and Mehrdad Niknami and Kevin Zhijie Chen and Chengyu Song and Zhaofeng Chen and Dawn Song}, title = {JITScope: Protecting web users from control-flow hijacking attacks}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {567--575}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218424}, doi = {10.1109/INFOCOM.2015.7218424}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangNCSCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LeeSJWKLL15, author = {Byoungyoung Lee and Chengyu Song and Yeongjin Jang and Tielei Wang and Taesoo Kim and Long Lu and Wenke Lee}, title = {Preventing Use-after-free with Dangling Pointers Nullification}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/preventing-use-after-free-dangling-pointers-nullification}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LeeSJWKLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SongZWLM15, author = {Chengyu Song and Chao Zhang and Tielei Wang and Wenke Lee and David Melski}, title = {Exploiting and Protecting Dynamic Code Generation}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/exploiting-and-protecting-dynamic-code-generation}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SongZWLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhangSCCS15, author = {Chao Zhang and Chengyu Song and Kevin Zhijie Chen and Zhaofeng Chen and Dawn Song}, title = {VTint: Protecting Virtual Function Tables' Integrity}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/vtint-protecting-virtual-function-tables-integrity}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhangSCCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/MinKLSK15, author = {Changwoo Min and Sanidhya Kashyap and Byoungyoung Lee and Chengyu Song and Taesoo Kim}, editor = {Ethan L. Miller and Steven Hand}, title = {Cross-checking semantic correctness: the case of finding file system bugs}, booktitle = {Proceedings of the 25th Symposium on Operating Systems Principles, {SOSP} 2015, Monterey, CA, USA, October 4-7, 2015}, pages = {361--377}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2815400.2815422}, doi = {10.1145/2815400.2815422}, timestamp = {Tue, 20 Dec 2022 17:33:10 +0100}, biburl = {https://dblp.org/rec/conf/sosp/MinKLSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LeeSKL15, author = {Byoungyoung Lee and Chengyu Song and Taesoo Kim and Wenke Lee}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Type Casting Verification: Stopping an Emerging Attack Vector}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {81--96}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/lee}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/LeeSKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JangSCWL14, author = {Yeongjin Jang and Chengyu Song and Simon P. Chung and Tielei Wang and Wenke Lee}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {A11y Attacks: Exploiting Accessibility in Operating Systems}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {103--115}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660295}, doi = {10.1145/2660267.2660295}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JangSCWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/WangSL14, author = {Tielei Wang and Chengyu Song and Wenke Lee}, editor = {Sven Dietrich}, title = {Diagnosis and Emergency Patch Generation for Integer Overflow Exploits}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {255--275}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_14}, doi = {10.1007/978-3-319-08509-8\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/WangSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LauCSJLB14, author = {Billy Lau and Simon P. Chung and Chengyu Song and Yeongjin Jang and Wenke Lee and Alexandra Boldyreva}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Mimesis Aegis: {A} Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {33--48}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/lau}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/LauCSJLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SongRL12, author = {Chengyu Song and Paul Royal and Wenke Lee}, editor = {Patrick Traynor}, title = {Impeding Automated Malware Analysis with Environment-sensitive Malware}, booktitle = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue, WA, USA, August 7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/hotsec12/workshop-program/presentation/song}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/SongRL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/CoDHKNCGMLSBHM11, author = {Michele Co and Jack W. Davidson and Jason D. Hiser and John C. Knight and Anh Nguyen{-}Tuong and David Cok and Denis Gopan and David Melski and Wenke Lee and Chengyu Song and Thomas Bracewell and David Hyde and Brian Mastropietro}, editor = {Jan J{\"{u}}rjens and Seok{-}Won Lee and Mattia Monga}, title = {{PEASOUP:} preventing exploits against software of uncertain provenance (position paper)}, booktitle = {Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, {SESS} 2011, Waikiki, Honolulu, HI, USA, May 22, 2011}, pages = {43--49}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1988630.1988639}, doi = {10.1145/1988630.1988639}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/CoDHKNCGMLSBHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SongZHY10, author = {Chengyu Song and Jianwei Zhuge and Xinhui Han and Zhiyuan Ye}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Preventing drive-by download via inter-module communication monitoring}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {124--134}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755705}, doi = {10.1145/1755688.1755705}, timestamp = {Fri, 03 Jun 2022 12:02:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SongZHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/09/ZhugeHSGHZ09, author = {Jianwei Zhuge and Thorsten Holz and Chengyu Song and Jinpeng Guo and Xinhui Han and Wei Zou}, editor = {M. Eric Johnson}, title = {Studying Malicious Websites and the Underground Economy on the Chinese Web}, booktitle = {Managing Information Risk and the Economics of Security}, pages = {225--244}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-09762-6\_11}, doi = {10.1007/978-0-387-09762-6\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/09/ZhugeHSGHZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/ZhugeHSGHZ08, author = {Jianwei Zhuge and Thorsten Holz and Chengyu Song and Jinpeng Guo and Xinhui Han and Wei Zou}, title = {Studying Malicious Websites and the Underground Economy on the Chinese Web}, booktitle = {7th Annual Workshop on the Economics of Information Security, {WEIS} 2008, Dartmouth College, Hanover, NH, USA, June 25-28, 2008}, year = {2008}, url = {http://weis2008.econinfosec.org/papers/Holz.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:45 +0200}, biburl = {https://dblp.org/rec/conf/weis/ZhugeHSGHZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhugeHHSZ07, author = {Jianwei Zhuge and Thorsten Holz and Xinhui Han and Chengyu Song and Wei Zou}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {Collecting Autonomous Spreading Malware Using High-Interaction Honeypots}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {438--451}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_34}, doi = {10.1007/978-3-540-77048-0\_34}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhugeHHSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.