BibTeX records: Chengyu Song

download as .bib file

@article{DBLP:journals/dt/KoruyehKSA24,
  author       = {Esmaeil Mohammadian Koruyeh and
                  Khaled N. Khasawneh and
                  Chengyu Song and
                  Nael B. Abu{-}Ghazaleh},
  title        = {Spectre Returns! Speculation Attacks Using the Return Stack Buffer},
  journal      = {{IEEE} Des. Test},
  volume       = {41},
  number       = {2},
  pages        = {47--55},
  year         = {2024},
  url          = {https://doi.org/10.1109/MDAT.2024.3352537},
  doi          = {10.1109/MDAT.2024.3352537},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dt/KoruyehKSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-05212,
  author       = {Xingyu Li and
                  Zheng Zhang and
                  Zhiyun Qian and
                  Trent Jaeger and
                  Chengyu Song},
  title        = {An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem},
  journal      = {CoRR},
  volume       = {abs/2402.05212},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.05212},
  doi          = {10.48550/ARXIV.2402.05212},
  eprinttype    = {arXiv},
  eprint       = {2402.05212},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-05212.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcmi/SongZLZWLSZT23,
  author       = {Chengyu Song and
                  Shan Zhu and
                  Yanyan Liu and
                  Wei Zhang and
                  Zhi Wang and
                  Wangxiao Li and
                  Zhenye Sun and
                  Peng Zhao and
                  Shengzhang Tian},
  title        = {DCNAS-Net: deformation convolution and neural architecture search
                  detection network for bone marrow oedema},
  journal      = {{BMC} Medical Imaging},
  volume       = {23},
  number       = {1},
  pages        = {45},
  year         = {2023},
  url          = {https://doi.org/10.1186/s12880-023-01003-8},
  doi          = {10.1186/S12880-023-01003-8},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bmcmi/SongZLZWLSZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcmi/ZhangWBFLLSHLWSLWSZWWSZJTLWXWZM23,
  author       = {Ruyi Zhang and
                  Peng Wang and
                  Yanzhu Bian and
                  Yan Fan and
                  Jianming Li and
                  Xuehui Liu and
                  Jie Shen and
                  Yujing Hu and
                  Xianghe Liao and
                  He Wang and
                  Chengyu Song and
                  Wangxiao Li and
                  Xiaojie Wang and
                  Momo Sun and
                  Jianping Zhang and
                  Miao Wang and
                  Shen Wang and
                  Yiming Shen and
                  Xuemei Zhang and
                  Qiang Jia and
                  Jian Tan and
                  Ning Li and
                  Sen Wang and
                  Lingyun Xu and
                  Weiming Wu and
                  Wei Zhang and
                  Zhaowei Meng},
  title        = {Establishment and validation of an AI-aid method in the diagnosis
                  of myocardial perfusion imaging},
  journal      = {{BMC} Medical Imaging},
  volume       = {23},
  number       = {1},
  pages        = {84},
  year         = {2023},
  url          = {https://doi.org/10.1186/s12880-023-01037-y},
  doi          = {10.1186/S12880-023-01037-Y},
  timestamp    = {Thu, 11 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcmi/ZhangWBFLLSHLWSLWSZWWSZJTLWXWZM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/ShaoSZCC23,
  author       = {Taihua Shao and
                  Chengyu Song and
                  Jianming Zheng and
                  Fei Cai and
                  Honghui Chen},
  title        = {Exploring Internal and External Interactions for Semi-Structured Multivariate
                  Attributes in Job-Resume Matching},
  journal      = {Int. J. Intell. Syst.},
  volume       = {2023},
  pages        = {1--16},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/2994779},
  doi          = {10.1155/2023/2994779},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/ShaoSZCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/SongCZ0S23,
  author       = {Chengyu Song and
                  Fei Cai and
                  Jianming Zheng and
                  Xiang Zhao and
                  Taihua Shao},
  title        = {AugPrompt: Knowledgeable augmented-trigger prompt for few-shot event
                  classification},
  journal      = {Inf. Process. Manag.},
  volume       = {60},
  number       = {4},
  pages        = {103153},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ipm.2022.103153},
  doi          = {10.1016/J.IPM.2022.103153},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipm/SongCZ0S23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/WangZCSL23,
  author       = {Siyuan Wang and
                  Jianming Zheng and
                  Fei Cai and
                  Chengyu Song and
                  Xueshan Luo},
  title        = {MsPrompt: Multi-step prompt learning for debiasing few-shot event
                  detection},
  journal      = {Inf. Process. Manag.},
  volume       = {60},
  number       = {6},
  pages        = {103509},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ipm.2023.103509},
  doi          = {10.1016/J.IPM.2023.103509},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipm/WangZCSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/WangCPS23,
  author       = {Yitong Wang and
                  Fei Cai and
                  Zhiqiang Pan and
                  Chengyu Song},
  title        = {Self-supervised graph learning with target-adaptive masking for session-based
                  recommendation},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {24},
  number       = {1},
  pages        = {73--87},
  year         = {2023},
  url          = {https://doi.org/10.1631/FITEE.2200137},
  doi          = {10.1631/FITEE.2200137},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jzusc/WangCPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/SongCWZS23,
  author       = {Chengyu Song and
                  Fei Cai and
                  Mengru Wang and
                  Jianming Zheng and
                  Taihua Shao},
  title        = {TaxonPrompt: Taxonomy-aware curriculum prompt learning for few-shot
                  event classification},
  journal      = {Knowl. Based Syst.},
  volume       = {264},
  pages        = {110290},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.knosys.2023.110290},
  doi          = {10.1016/J.KNOSYS.2023.110290},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/SongCWZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ChenSY23,
  author       = {Ju Chen and
                  Chengyu Song and
                  Heng Yin},
  title        = {R-Fuzz at SBFT'2023},
  booktitle    = {{IEEE/ACM} International Workshop on Search-Based and Fuzz Testing,
                  SBFT@ICSE 2023, Melbourne, Australia, May 14, 2023},
  pages        = {82--83},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SBFT59156.2023.00027},
  doi          = {10.1109/SBFT59156.2023.00027},
  timestamp    = {Wed, 02 Aug 2023 11:15:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/ChenSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wacv/AichLSAKR23,
  author       = {Abhishek Aich and
                  Shasha Li and
                  Chengyu Song and
                  M. Salman Asif and
                  Srikanth V. Krishnamurthy and
                  Amit K. Roy{-}Chowdhury},
  title        = {Leveraging Local Patch Differences in Multi-Object Scenes for Generative
                  Adversarial Attacks},
  booktitle    = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV}
                  2023, Waikoloa, HI, USA, January 2-7, 2023},
  pages        = {1308--1318},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WACV56688.2023.00136},
  doi          = {10.1109/WACV56688.2023.00136},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wacv/AichLSAKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-09335,
  author       = {Siyuan Wang and
                  Jianming Zheng and
                  Xuejun Hu and
                  Fei Cai and
                  Chengyu Song and
                  Xueshan Luo},
  title        = {MsPrompt: Multi-step Prompt Learning for Debiasing Few-shot Event
                  Detection},
  journal      = {CoRR},
  volume       = {abs/2305.09335},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.09335},
  doi          = {10.48550/ARXIV.2305.09335},
  eprinttype    = {arXiv},
  eprint       = {2305.09335},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-09335.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ir/CaiPSZ22,
  author       = {Fei Cai and
                  Zhiqiang Pan and
                  Chengyu Song and
                  Xin Zhang},
  title        = {Exploring latent connections in graph neural networks for session-based
                  recommendation},
  journal      = {Inf. Retr. J.},
  volume       = {25},
  number       = {3},
  pages        = {329--363},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10791-022-09412-z},
  doi          = {10.1007/S10791-022-09412-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ir/CaiPSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/CaiXLYSKRA22,
  author       = {Zikui Cai and
                  Xinxin Xie and
                  Shasha Li and
                  Mingjun Yin and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Amit K. Roy{-}Chowdhury and
                  M. Salman Asif},
  title        = {Context-Aware Transfer Attacks for Object Detection},
  booktitle    = {Thirty-Sixth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2022, Thirty-Fourth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2022, The Twelveth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2022 Virtual Event, February 22
                  - March 1, 2022},
  pages        = {149--157},
  publisher    = {{AAAI} Press},
  year         = {2022},
  url          = {https://doi.org/10.1609/aaai.v36i1.19889},
  doi          = {10.1609/AAAI.V36I1.19889},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aaai/CaiXLYSKRA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/CaiRBSKRA22,
  author       = {Zikui Cai and
                  Shantanu Rane and
                  Alejandro E. Brito and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Amit K. Roy{-}Chowdhury and
                  M. Salman Asif},
  title        = {Zero-Query Transfer Attacks on Context-Aware Object Detectors},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022},
  pages        = {15004--15014},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CVPR52688.2022.01460},
  doi          = {10.1109/CVPR52688.2022.01460},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/CaiRBSKRA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Zhai0ZCLQSSKJY22,
  author       = {Yizhuo Zhai and
                  Yu Hao and
                  Zheng Zhang and
                  Weiteng Chen and
                  Guoren Li and
                  Zhiyun Qian and
                  Chengyu Song and
                  Manu Sridharan and
                  Srikanth V. Krishnamurthy and
                  Trent Jaeger and
                  Paul L. Yu},
  title        = {Progressive Scrutiny: Incremental Detection of {UBI} bugs in the Linux
                  Kernel},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-249/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Zhai0ZCLQSSKJY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/AichTGSKA022,
  author       = {Abhishek Aich and
                  Calvin{-}Khang Ta and
                  Akash Gupta and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  M. Salman Asif and
                  Amit Roy{-}Chowdhury},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {{GAMA:} Generative Adversarial Multi-Object Scene Attacks},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/efbd571f139d26604e53fe2760e2c073-Abstract-Conference.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/AichTGSKA022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/CaiSKRA22,
  author       = {Zikui Cai and
                  Chengyu Song and
                  Srikanth Krishnamurthy and
                  Amit Roy{-}Chowdhury and
                  Salman Asif},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {Blackbox Attacks via Surrogate Ensemble Search},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/23b9d4e18b151ba2108fb3f1efaf8de4-Abstract-Conference.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/CaiSKRA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenWSY22,
  author       = {Ju Chen and
                  Jinghan Wang and
                  Chengyu Song and
                  Heng Yin},
  title        = {{JIGSAW:} Efficient and Scalable Path Constraints Fuzzing},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {18--35},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833796},
  doi          = {10.1109/SP46214.2022.9833796},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ChenWSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiuYCSQY22,
  author       = {Jian Liu and
                  Lin Yi and
                  Weiteng Chen and
                  Chengyu Song and
                  Zhiyun Qian and
                  Qiuping Yi},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {LinKRID: Vetting Imbalance Reference Counting in Linux kernel with
                  Symbolic Execution},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {125--142},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/liu-jian},
  timestamp    = {Sun, 03 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiuYCSQY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenHYZSLYS22,
  author       = {Ju Chen and
                  Wookhyun Han and
                  Mingjun Yin and
                  Haochen Zeng and
                  Chengyu Song and
                  Byoungyoung Lee and
                  Heng Yin and
                  Insik Shin},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {{SYMSAN:} Time and Space Efficient Concolic Execution via Dynamic
                  Data-flow Analysis},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2531--2548},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/chen-ju},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChenHYZSLYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wacv/YinLSARK22,
  author       = {Mingjun Yin and
                  Shasha Li and
                  Chengyu Song and
                  M. Salman Asif and
                  Amit K. Roy{-}Chowdhury and
                  Srikanth V. Krishnamurthy},
  title        = {{ADC:} Adversarial attacks against object Detection that evade Context
                  consistency checks},
  booktitle    = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV}
                  2022, Waikoloa, HI, USA, January 3-8, 2022},
  pages        = {2836--2845},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WACV51458.2022.00289},
  doi          = {10.1109/WACV51458.2022.00289},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wacv/YinLSARK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-15230,
  author       = {Zikui Cai and
                  Shantanu Rane and
                  Alejandro E. Brito and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Amit K. Roy{-}Chowdhury and
                  M. Salman Asif},
  title        = {Zero-Query Transfer Attacks on Context-Aware Object Detectors},
  journal      = {CoRR},
  volume       = {abs/2203.15230},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.15230},
  doi          = {10.48550/ARXIV.2203.15230},
  eprinttype    = {arXiv},
  eprint       = {2203.15230},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-15230.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-03610,
  author       = {Zikui Cai and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Amit K. Roy{-}Chowdhury and
                  M. Salman Asif},
  title        = {Blackbox Attacks via Surrogate Ensemble Search},
  journal      = {CoRR},
  volume       = {abs/2208.03610},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.03610},
  doi          = {10.48550/ARXIV.2208.03610},
  eprinttype    = {arXiv},
  eprint       = {2208.03610},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-03610.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-09502,
  author       = {Abhishek Aich and
                  Calvin{-}Khang Ta and
                  Akash Gupta and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  M. Salman Asif and
                  Amit K. Roy{-}Chowdhury},
  title        = {{GAMA:} Generative Adversarial Multi-Object Scene Attacks},
  journal      = {CoRR},
  volume       = {abs/2209.09502},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.09502},
  doi          = {10.48550/ARXIV.2209.09502},
  eprinttype    = {arXiv},
  eprint       = {2209.09502},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-09502.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-09883,
  author       = {Abhishek Aich and
                  Shasha Li and
                  Chengyu Song and
                  M. Salman Asif and
                  Srikanth V. Krishnamurthy and
                  Amit K. Roy{-}Chowdhury},
  title        = {Leveraging Local Patch Differences in Multi-Object Scenes for Generative
                  Adversarial Attacks},
  journal      = {CoRR},
  volume       = {abs/2209.09883},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.09883},
  doi          = {10.48550/ARXIV.2209.09883},
  eprinttype    = {arXiv},
  eprint       = {2209.09883},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-09883.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwe/HuangS21,
  author       = {Mingyi Huang and
                  Chengyu Song},
  title        = {ARMPatch: {A} Binary Patching Framework for ARM-based IoT Devices},
  journal      = {J. Web Eng.},
  volume       = {20},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.13052/jwe1540-9589.2066},
  doi          = {10.13052/JWE1540-9589.2066},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jwe/HuangS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuXSKL21,
  author       = {Kangjie Lu and
                  Meng Xu and
                  Chengyu Song and
                  Taesoo Kim and
                  Wenke Lee},
  title        = {Stopping Memory Disclosures via Diversification and Replicated Execution},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {1},
  pages        = {160--173},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2018.2878234},
  doi          = {10.1109/TDSC.2018.2878234},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuXSKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/SongCZCP21,
  author       = {Chengyu Song and
                  Fei Cai and
                  Jianming Zheng and
                  Wanyu Chen and
                  Zhiqiang Pan},
  editor       = {Gianluca Demartini and
                  Guido Zuccon and
                  J. Shane Culpepper and
                  Zi Huang and
                  Hanghang Tong},
  title        = {Metric Sentiment Learning for Label Representation},
  booktitle    = {{CIKM} '21: The 30th {ACM} International Conference on Information
                  and Knowledge Management, Virtual Event, Queensland, Australia, November
                  1 - 5, 2021},
  pages        = {1703--1712},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3459637.3482369},
  doi          = {10.1145/3459637.3482369},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cikm/SongCZCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/YinLCSARK21,
  author       = {Mingjun Yin and
                  Shasha Li and
                  Zikui Cai and
                  Chengyu Song and
                  M. Salman Asif and
                  Amit K. Roy{-}Chowdhury and
                  Srikanth V. Krishnamurthy},
  title        = {Exploiting Multi-Object Relationships for Detecting Adversarial Attacks
                  in Complex Scenes},
  booktitle    = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV}
                  2021, Montreal, QC, Canada, October 10-17, 2021},
  pages        = {7838--7847},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCV48922.2021.00776},
  doi          = {10.1109/ICCV48922.2021.00776},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccv/YinLCSARK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangSY21,
  author       = {Jinghan Wang and
                  Chengyu Song and
                  Heng Yin},
  title        = {Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox
                  Fuzzing},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/reinforcement-learning-based-hierarchical-seed-scheduling-for-greybox-fuzzing/},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WangSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/LiAZASRK21,
  author       = {Shasha Li and
                  Abhishek Aich and
                  Shitong Zhu and
                  M. Salman Asif and
                  Chengyu Song and
                  Amit K. Roy{-}Chowdhury and
                  Srikanth V. Krishnamurthy},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {Adversarial Attacks on Black Box Video Classifiers: Leveraging the
                  Power of Geometric Transformations},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {2085--2096},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/103303dd56a731e377d01f6a37badae3-Abstract.html},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/LiAZASRK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-08421,
  author       = {Mingjun Yin and
                  Shasha Li and
                  Zikui Cai and
                  Chengyu Song and
                  M. Salman Asif and
                  Amit K. Roy{-}Chowdhury and
                  Srikanth V. Krishnamurthy},
  title        = {Exploiting Multi-Object Relationships for Detecting Adversarial Attacks
                  in Complex Scenes},
  journal      = {CoRR},
  volume       = {abs/2108.08421},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.08421},
  eprinttype    = {arXiv},
  eprint       = {2108.08421},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-08421.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-01823,
  author       = {Shasha Li and
                  Abhishek Aich and
                  Shitong Zhu and
                  M. Salman Asif and
                  Chengyu Song and
                  Amit K. Roy{-}Chowdhury and
                  Srikanth V. Krishnamurthy},
  title        = {Adversarial Attacks on Black Box Video Classifiers: Leveraging the
                  Power of Geometric Transformations},
  journal      = {CoRR},
  volume       = {abs/2110.01823},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.01823},
  eprinttype    = {arXiv},
  eprint       = {2110.01823},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-01823.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-12321,
  author       = {Mingjun Yin and
                  Shasha Li and
                  Chengyu Song and
                  M. Salman Asif and
                  Amit K. Roy{-}Chowdhury and
                  Srikanth V. Krishnamurthy},
  title        = {{ADC:} Adversarial attacks against object Detection that evade Context
                  consistency checks},
  journal      = {CoRR},
  volume       = {abs/2110.12321},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.12321},
  eprinttype    = {arXiv},
  eprint       = {2110.12321},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-12321.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-03223,
  author       = {Zikui Cai and
                  Xinxin Xie and
                  Shasha Li and
                  Mingjun Yin and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Amit K. Roy{-}Chowdhury and
                  M. Salman Asif},
  title        = {Context-Aware Transfer Attacks for Object Detection},
  journal      = {CoRR},
  volume       = {abs/2112.03223},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.03223},
  eprinttype    = {arXiv},
  eprint       = {2112.03223},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-03223.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/ZhangSYZS020,
  author       = {Pan Zhang and
                  Chengyu Song and
                  Heng Yin and
                  Deqing Zou and
                  Elaine Shi and
                  Hai Jin},
  editor       = {James R. Larus and
                  Luis Ceze and
                  Karin Strauss},
  title        = {Klotski: Efficient Obfuscated Execution against Controlled-Channel
                  Attacks},
  booktitle    = {{ASPLOS} '20: Architectural Support for Programming Languages and
                  Operating Systems, Lausanne, Switzerland, March 16-20, 2020},
  pages        = {1263--1276},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3373376.3378487},
  doi          = {10.1145/3373376.3378487},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asplos/ZhangSYZS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eccv/LiZPRSKSC20,
  author       = {Shasha Li and
                  Shitong Zhu and
                  Sudipta Paul and
                  Amit K. Roy{-}Chowdhury and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Ananthram Swami and
                  Kevin S. Chan},
  editor       = {Andrea Vedaldi and
                  Horst Bischof and
                  Thomas Brox and
                  Jan{-}Michael Frahm},
  title        = {Connecting the Dots: Detecting Adversarial Perturbations Using Context
                  Inconsistency},
  booktitle    = {Computer Vision - {ECCV} 2020 - 16th European Conference, Glasgow,
                  UK, August 23-28, 2020, Proceedings, Part {XXIII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12368},
  pages        = {396--413},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58592-1\_24},
  doi          = {10.1007/978-3-030-58592-1\_24},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eccv/LiZPRSKSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/0002Z0QSKCB20,
  author       = {Zhongjie Wang and
                  Shitong Zhu and
                  Yue Cao and
                  Zhiyun Qian and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Kevin S. Chan and
                  Tracy D. Braun},
  title        = {SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy
                  Discovery},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/symtcp-eluding-stateful-deep-packet-inspection-with-automated-discrepancy-discovery/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/0002Z0QSKCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BhattacharyyaSK20,
  author       = {Atri Bhattacharyya and
                  Andr{\'{e}}s S{\'{a}}nchez and
                  Esmaeil Mohammadian Koruyeh and
                  Nael B. Abu{-}Ghazaleh and
                  Chengyu Song and
                  Mathias Payer},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {SpecROP: Speculative Exploitation of {ROP} Chains},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {1--16},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/bhattacharyya},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BhattacharyyaSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ZhaiHZWSQLKY20,
  author       = {Yizhuo Zhai and
                  Yu Hao and
                  Hang Zhang and
                  Daimeng Wang and
                  Chengyu Song and
                  Zhiyun Qian and
                  Mohsen Lesani and
                  Srikanth V. Krishnamurthy and
                  Paul L. Yu},
  editor       = {Prem Devanbu and
                  Myra B. Cohen and
                  Thomas Zimmermann},
  title        = {UBITect: a precise and scalable method to detect use-before-initialization
                  bugs in Linux kernel},
  booktitle    = {{ESEC/FSE} '20: 28th {ACM} Joint European Software Engineering Conference
                  and Symposium on the Foundations of Software Engineering, Virtual
                  Event, USA, November 8-13, 2020},
  pages        = {221--232},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3368089.3409686},
  doi          = {10.1145/3368089.3409686},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ZhaiHZWSQLKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/SongSJL20,
  author       = {Suhwan Song and
                  Chengyu Song and
                  Yeongjin Jang and
                  Byoungyoung Lee},
  editor       = {Prem Devanbu and
                  Myra B. Cohen and
                  Thomas Zimmermann},
  title        = {CrFuzz: fuzzing multi-purpose programs through input validation},
  booktitle    = {{ESEC/FSE} '20: 28th {ACM} Joint European Software Engineering Conference
                  and Symposium on the Foundations of Software Engineering, Virtual
                  Event, USA, November 8-13, 2020},
  pages        = {690--700},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3368089.3409769},
  doi          = {10.1145/3368089.3409769},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/SongSJL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KoruyehSKSA20,
  author       = {Esmaeil Mohammadian Koruyeh and
                  Shirin Haji Amin Shirazi and
                  Khaled N. Khasawneh and
                  Chengyu Song and
                  Nael B. Abu{-}Ghazaleh},
  title        = {SpecCFI: Mitigating Spectre Attacks using {CFI} Informed Speculation},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {39--53},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00033},
  doi          = {10.1109/SP40000.2020.00033},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KoruyehSKSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-09763,
  author       = {Shasha Li and
                  Shitong Zhu and
                  Sudipta Paul and
                  Amit K. Roy{-}Chowdhury and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Ananthram Swami and
                  Kevin S. Chan},
  title        = {Connecting the Dots: Detecting Adversarial Perturbations Using Context
                  Inconsistency},
  journal      = {CoRR},
  volume       = {abs/2007.09763},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.09763},
  eprinttype    = {arXiv},
  eprint       = {2007.09763},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-09763.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-11772,
  author       = {Shasha Li and
                  Karim Khalil and
                  Rameswar Panda and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Amit K. Roy{-}Chowdhury and
                  Ananthram Swami},
  title        = {Measurement-driven Security Analysis of Imperceptible Impersonation
                  Attacks},
  journal      = {CoRR},
  volume       = {abs/2008.11772},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.11772},
  eprinttype    = {arXiv},
  eprint       = {2008.11772},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-11772.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/00030QSKY19,
  author       = {Yue Cao and
                  Zhongjie Wang and
                  Zhiyun Qian and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Paul L. Yu},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Principled Unearthing of {TCP} Side Channel Vulnerabilities},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {211--224},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354250},
  doi          = {10.1145/3319535.3354250},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/00030QSKY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/KhasawnehKSEPA19,
  author       = {Khaled N. Khasawneh and
                  Esmaeil Mohammadian Koruyeh and
                  Chengyu Song and
                  Dmitry Evtyushkin and
                  Dmitry Ponomarev and
                  Nael B. Abu{-}Ghazaleh},
  title        = {SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation},
  booktitle    = {Proceedings of the 56th Annual Design Automation Conference 2019,
                  {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019},
  pages        = {60},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3316781.3317903},
  doi          = {10.1145/3316781.3317903},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/KhasawnehKSEPA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/GasparisQSK0Y19,
  author       = {Ioannis Gasparis and
                  Zhiyun Qian and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Rajiv Gupta and
                  Paul L. Yu},
  title        = {Figment: Fine-grained Permission Management for Mobile Apps},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {1405--1413},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737436},
  doi          = {10.1109/INFOCOM.2019.8737436},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/GasparisQSK0Y19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/MuGCCGXMS19,
  author       = {Dongliang Mu and
                  Wenbo Guo and
                  Alejandro Cuevas and
                  Yueqi Chen and
                  Jinxuan Gai and
                  Xinyu Xing and
                  Bing Mao and
                  Chengyu Song},
  title        = {{RENN:} Efficient Reverse Execution with Neural-Network-Assisted Alias
                  Analysis},
  booktitle    = {34th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2019, San Diego, CA, USA, November 11-15, 2019},
  pages        = {924--935},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ASE.2019.00090},
  doi          = {10.1109/ASE.2019.00090},
  timestamp    = {Mon, 16 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/MuGCCGXMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiNPSKRS19,
  author       = {Shasha Li and
                  Ajaya Neupane and
                  Sujoy Paul and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Amit K. Roy{-}Chowdhury and
                  Ananthram Swami},
  title        = {Stealthy Adversarial Perturbations Against Real-Time Video Classification
                  Systems},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/stealthy-adversarial-perturbations-against-real-time-video-classification-systems/},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LiNPSKRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangDSYS19,
  author       = {Jinghan Wang and
                  Yue Duan and
                  Wei Song and
                  Heng Yin and
                  Chengyu Song},
  title        = {Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics
                  in Greybox Fuzzing},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {1--15},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/wang},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WangDSYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhengDYSZS19,
  author       = {Yaowen Zheng and
                  Ali Davanian and
                  Heng Yin and
                  Chengyu Song and
                  Hongsong Zhu and
                  Limin Sun},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {{FIRM-AFL:} High-Throughput Greybox Fuzzing of IoT Firmware via Augmented
                  Process Emulation},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1099--1114},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/zheng},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhengDYSZS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-09532,
  author       = {Wookhyun Han and
                  Md. Lutfor Rahman and
                  Yuxuan Chen and
                  Chengyu Song and
                  Byoungyoung Lee and
                  Insik Shin},
  title        = {SynFuzz: Efficient Concolic Execution via Branch Condition Synthesis},
  journal      = {CoRR},
  volume       = {abs/1905.09532},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.09532},
  eprinttype    = {arXiv},
  eprint       = {1905.09532},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-09532.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-01345,
  author       = {Esmaeil Mohammadian Koruyeh and
                  Shirin Haji Amin Shirazi and
                  Khaled N. Khasawneh and
                  Chengyu Song and
                  Nael B. Abu{-}Ghazaleh},
  title        = {{SPECCFI:} Mitigating Spectre Attacks using {CFI} Informed Speculation},
  journal      = {CoRR},
  volume       = {abs/1906.01345},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.01345},
  eprinttype    = {arXiv},
  eprint       = {1906.01345},
  timestamp    = {Thu, 13 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-01345.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RahmanNS18,
  author       = {Md. Lutfor Rahman and
                  Ajaya Neupane and
                  Chengyu Song},
  title        = {{IAC:} On the Feasibility of Utilizing Neural Signals for Access Control},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {641--652},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274713},
  doi          = {10.1145/3274694.3274713},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RahmanNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GasparisAQSK0C18,
  author       = {Ioannis Gasparis and
                  Azeem Aqil and
                  Zhiyun Qian and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Rajiv Gupta and
                  Edward Colbert},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Droid {M+:} Developer Support for Imbibing Android's New Permission
                  Model},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {765--776},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196533},
  doi          = {10.1145/3196494.3196533},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GasparisAQSK0C18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/NguyenSQKCM18,
  author       = {Dang Tu Nguyen and
                  Chengyu Song and
                  Zhiyun Qian and
                  Srikanth V. Krishnamurthy and
                  Edward J. M. Colbert and
                  Patrick D. McDaniel},
  editor       = {Xenofontas A. Dimitropoulos and
                  Alberto Dainotti and
                  Laurent Vanbever and
                  Theophilus Benson},
  title        = {IotSan: fortifying the safety of IoT systems},
  booktitle    = {Proceedings of the 14th International Conference on emerging Networking
                  EXperiments and Technologies, CoNEXT 2018, Heraklion, Greece, December
                  04-07, 2018},
  pages        = {191--203},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3281411.3281440},
  doi          = {10.1145/3281411.3281440},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conext/NguyenSQKCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HanJLSS18,
  author       = {Wookhyun Han and
                  Byunggill Joe and
                  Byoungyoung Lee and
                  Chengyu Song and
                  Insik Shin},
  title        = {Enhancing Memory Error Detection for Large-Scale Applications and
                  Fuzz Testing},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_05A-5\_Han\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/HanJLSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkdd/RahmanBNPS18,
  author       = {Md. Lutfor Rahman and
                  Sharmistha Bardhan and
                  Ajaya Neupane and
                  Evangelos E. Papalexakis and
                  Chengyu Song},
  editor       = {Ulf Brefeld and
                  Edward Curry and
                  Elizabeth Daly and
                  Brian MacNamee and
                  Alice Marascu and
                  Fabio Pinelli and
                  Michele Berlingerio and
                  Neil Hurley},
  title        = {Learning Tensor-Based Representations from Brain-Computer Interface
                  Data for Cybersecurity},
  booktitle    = {Machine Learning and Knowledge Discovery in Databases - European Conference,
                  {ECML} {PKDD} 2018, Dublin, Ireland, September 10-14, 2018, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11053},
  pages        = {389--404},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10997-4\_24},
  doi          = {10.1007/978-3-030-10997-4\_24},
  timestamp    = {Fri, 09 Apr 2021 18:44:22 +0200},
  biburl       = {https://dblp.org/rec/conf/pkdd/RahmanBNPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/KoruyehKSA18,
  author       = {Esmaeil Mohammadian Koruyeh and
                  Khaled N. Khasawneh and
                  Chengyu Song and
                  Nael B. Abu{-}Ghazaleh},
  editor       = {Christian Rossow and
                  Yves Younan},
  title        = {Spectre Returns! Speculation Attacks using the Return Stack Buffer},
  booktitle    = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore,
                  MD, USA, August 13-14, 2018},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/woot18/presentation/koruyeh},
  timestamp    = {Mon, 01 Feb 2021 08:41:54 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/KoruyehKSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-05179,
  author       = {Khaled N. Khasawneh and
                  Esmaeil Mohammadian Koruyeh and
                  Chengyu Song and
                  Dmitry Evtyushkin and
                  Dmitry Ponomarev and
                  Nael B. Abu{-}Ghazaleh},
  title        = {SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation},
  journal      = {CoRR},
  volume       = {abs/1806.05179},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.05179},
  eprinttype    = {arXiv},
  eprint       = {1806.05179},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-05179.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-00458,
  author       = {Shasha Li and
                  Ajaya Neupane and
                  Sujoy Paul and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Amit K. Roy{-}Chowdhury and
                  Ananthram Swami},
  title        = {Adversarial Perturbations Against Real-Time Video Classification Systems},
  journal      = {CoRR},
  volume       = {abs/1807.00458},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.00458},
  eprinttype    = {arXiv},
  eprint       = {1807.00458},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-00458.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-07940,
  author       = {Esmaeil Mohammadian Koruyeh and
                  Khaled N. Khasawneh and
                  Chengyu Song and
                  Nael B. Abu{-}Ghazaleh},
  title        = {Spectre Returns! Speculation Attacks using the Return Stack Buffer},
  journal      = {CoRR},
  volume       = {abs/1807.07940},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.07940},
  eprinttype    = {arXiv},
  eprint       = {1807.07940},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-07940.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-09038,
  author       = {Ketan Bhardwaj and
                  Ming{-}Wei Shih and
                  Ada Gavrilovska and
                  Taesoo Kim and
                  Chengyu Song},
  title        = {{SPX:} Preserving End-to-End Security for Edge Computing},
  journal      = {CoRR},
  volume       = {abs/1809.09038},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.09038},
  eprinttype    = {arXiv},
  eprint       = {1809.09038},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-09038.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-09551,
  author       = {Dang Tu Nguyen and
                  Chengyu Song and
                  Zhiyun Qian and
                  Srikanth V. Krishnamurthy and
                  Edward J. M. Colbert and
                  Patrick D. McDaniel},
  title        = {IoTSan: Fortifying the Safety of IoT Systems},
  journal      = {CoRR},
  volume       = {abs/1810.09551},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.09551},
  eprinttype    = {arXiv},
  eprint       = {1810.09551},
  timestamp    = {Wed, 31 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-09551.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/WangCQSK17,
  author       = {Zhongjie Wang and
                  Yue Cao and
                  Zhiyun Qian and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy},
  editor       = {Steve Uhlig and
                  Olaf Maennel},
  title        = {Your state is not mine: a closer look at evading stateful internet
                  censorship},
  booktitle    = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017,
                  London, United Kingdom, November 1-3, 2017},
  pages        = {114--127},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3131365.3131374},
  doi          = {10.1145/3131365.3131374},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/WangCQSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DingQSHKL17,
  author       = {Ren Ding and
                  Chenxiong Qian and
                  Chengyu Song and
                  William Harris and
                  Taesoo Kim and
                  Wenke Lee},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Efficient Protection of Path-Sensitive Control Security},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {131--148},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ding},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/DingQSHKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GasparisQSK17,
  author       = {Ioannis Gasparis and
                  Zhiyun Qian and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Detecting Android Root Exploits by Learning from Root Providers},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1129--1144},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/gasparis},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GasparisQSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Song16,
  author       = {Chengyu Song},
  title        = {Preventing exploits against memory corruption vulnerabilities},
  school       = {Georgia Institute of Technology, Atlanta, GA, {USA}},
  year         = {2016},
  url          = {https://hdl.handle.net/1853/55651},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Song16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/XuSJSLZDJLQLK16,
  author       = {Meng Xu and
                  Chengyu Song and
                  Yang Ji and
                  Ming{-}Wei Shih and
                  Kangjie Lu and
                  Cong Zheng and
                  Ruian Duan and
                  Yeongjin Jang and
                  Byoungyoung Lee and
                  Chenxiong Qian and
                  Sangho Lee and
                  Taesoo Kim},
  title        = {Toward Engineering a Secure Android Ecosystem: {A} Survey of Existing
                  Techniques},
  journal      = {{ACM} Comput. Surv.},
  volume       = {49},
  number       = {2},
  pages        = {38:1--38:47},
  year         = {2016},
  url          = {https://doi.org/10.1145/2963145},
  doi          = {10.1145/2963145},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/XuSJSLZDJLQLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuSKL16,
  author       = {Kangjie Lu and
                  Chengyu Song and
                  Taesoo Kim and
                  Wenke Lee},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {920--932},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978366},
  doi          = {10.1145/2976749.2978366},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuSKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SongLLHKL16,
  author       = {Chengyu Song and
                  Byoungyoung Lee and
                  Kangjie Lu and
                  William Harris and
                  Taesoo Kim and
                  Wenke Lee},
  title        = {Enforcing Kernel Security Invariants with Data Flow Integrity},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/enforcing-kernal-security-invariants-data-flow-integrity.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/SongLLHKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhangSCPLDS16,
  author       = {Chao Zhang and
                  Dawn Song and
                  Scott A. Carr and
                  Mathias Payer and
                  Tongxin Li and
                  Yu Ding and
                  Chengyu Song},
  title        = {VTrust: Regaining Trust on Virtual Calls},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/vtrust-regaining-trust-virtual-calls.pdf},
  timestamp    = {Tue, 16 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhangSCPLDS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SongMAYLKLP16,
  author       = {Chengyu Song and
                  Hyungon Moon and
                  Monjur Alam and
                  Insu Yun and
                  Byoungyoung Lee and
                  Taesoo Kim and
                  Wenke Lee and
                  Yunheung Paek},
  title        = {{HDFI:} Hardware-Assisted Data-Flow Isolation},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {1--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.9},
  doi          = {10.1109/SP.2016.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SongMAYLKLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuSLCKL15,
  author       = {Kangjie Lu and
                  Chengyu Song and
                  Byoungyoung Lee and
                  Simon P. Chung and
                  Taesoo Kim and
                  Wenke Lee},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {280--291},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813694},
  doi          = {10.1145/2810103.2813694},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuSLCKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangNCSCS15,
  author       = {Chao Zhang and
                  Mehrdad Niknami and
                  Kevin Zhijie Chen and
                  Chengyu Song and
                  Zhaofeng Chen and
                  Dawn Song},
  title        = {JITScope: Protecting web users from control-flow hijacking attacks},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {567--575},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218424},
  doi          = {10.1109/INFOCOM.2015.7218424},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhangNCSCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LeeSJWKLL15,
  author       = {Byoungyoung Lee and
                  Chengyu Song and
                  Yeongjin Jang and
                  Tielei Wang and
                  Taesoo Kim and
                  Long Lu and
                  Wenke Lee},
  title        = {Preventing Use-after-free with Dangling Pointers Nullification},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/preventing-use-after-free-dangling-pointers-nullification},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LeeSJWKLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SongZWLM15,
  author       = {Chengyu Song and
                  Chao Zhang and
                  Tielei Wang and
                  Wenke Lee and
                  David Melski},
  title        = {Exploiting and Protecting Dynamic Code Generation},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/exploiting-and-protecting-dynamic-code-generation},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SongZWLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhangSCCS15,
  author       = {Chao Zhang and
                  Chengyu Song and
                  Kevin Zhijie Chen and
                  Zhaofeng Chen and
                  Dawn Song},
  title        = {VTint: Protecting Virtual Function Tables' Integrity},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/vtint-protecting-virtual-function-tables-integrity},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhangSCCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/MinKLSK15,
  author       = {Changwoo Min and
                  Sanidhya Kashyap and
                  Byoungyoung Lee and
                  Chengyu Song and
                  Taesoo Kim},
  editor       = {Ethan L. Miller and
                  Steven Hand},
  title        = {Cross-checking semantic correctness: the case of finding file system
                  bugs},
  booktitle    = {Proceedings of the 25th Symposium on Operating Systems Principles,
                  {SOSP} 2015, Monterey, CA, USA, October 4-7, 2015},
  pages        = {361--377},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2815400.2815422},
  doi          = {10.1145/2815400.2815422},
  timestamp    = {Tue, 20 Dec 2022 17:33:10 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/MinKLSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeeSKL15,
  author       = {Byoungyoung Lee and
                  Chengyu Song and
                  Taesoo Kim and
                  Wenke Lee},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Type Casting Verification: Stopping an Emerging Attack Vector},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {81--96},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/lee},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LeeSKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JangSCWL14,
  author       = {Yeongjin Jang and
                  Chengyu Song and
                  Simon P. Chung and
                  Tielei Wang and
                  Wenke Lee},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {A11y Attacks: Exploiting Accessibility in Operating Systems},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {103--115},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660295},
  doi          = {10.1145/2660267.2660295},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JangSCWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/WangSL14,
  author       = {Tielei Wang and
                  Chengyu Song and
                  Wenke Lee},
  editor       = {Sven Dietrich},
  title        = {Diagnosis and Emergency Patch Generation for Integer Overflow Exploits},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {255--275},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_14},
  doi          = {10.1007/978-3-319-08509-8\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/WangSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LauCSJLB14,
  author       = {Billy Lau and
                  Simon P. Chung and
                  Chengyu Song and
                  Yeongjin Jang and
                  Wenke Lee and
                  Alexandra Boldyreva},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Mimesis Aegis: {A} Mimicry Privacy Shield-A System's Approach to Data
                  Privacy on Public Cloud},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {33--48},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/lau},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LauCSJLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SongRL12,
  author       = {Chengyu Song and
                  Paul Royal and
                  Wenke Lee},
  editor       = {Patrick Traynor},
  title        = {Impeding Automated Malware Analysis with Environment-sensitive Malware},
  booktitle    = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue,
                  WA, USA, August 7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/hotsec12/workshop-program/presentation/song},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SongRL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/CoDHKNCGMLSBHM11,
  author       = {Michele Co and
                  Jack W. Davidson and
                  Jason D. Hiser and
                  John C. Knight and
                  Anh Nguyen{-}Tuong and
                  David Cok and
                  Denis Gopan and
                  David Melski and
                  Wenke Lee and
                  Chengyu Song and
                  Thomas Bracewell and
                  David Hyde and
                  Brian Mastropietro},
  editor       = {Jan J{\"{u}}rjens and
                  Seok{-}Won Lee and
                  Mattia Monga},
  title        = {{PEASOUP:} preventing exploits against software of uncertain provenance
                  (position paper)},
  booktitle    = {Proceedings of the 7th International Workshop on Software Engineering
                  for Secure Systems, {SESS} 2011, Waikiki, Honolulu, HI, USA, May 22,
                  2011},
  pages        = {43--49},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1988630.1988639},
  doi          = {10.1145/1988630.1988639},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/CoDHKNCGMLSBHM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SongZHY10,
  author       = {Chengyu Song and
                  Jianwei Zhuge and
                  Xinhui Han and
                  Zhiyuan Ye},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Preventing drive-by download via inter-module communication monitoring},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {124--134},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755705},
  doi          = {10.1145/1755688.1755705},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SongZHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/09/ZhugeHSGHZ09,
  author       = {Jianwei Zhuge and
                  Thorsten Holz and
                  Chengyu Song and
                  Jinpeng Guo and
                  Xinhui Han and
                  Wei Zou},
  editor       = {M. Eric Johnson},
  title        = {Studying Malicious Websites and the Underground Economy on the Chinese
                  Web},
  booktitle    = {Managing Information Risk and the Economics of Security},
  pages        = {225--244},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-09762-6\_11},
  doi          = {10.1007/978-0-387-09762-6\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/09/ZhugeHSGHZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/ZhugeHSGHZ08,
  author       = {Jianwei Zhuge and
                  Thorsten Holz and
                  Chengyu Song and
                  Jinpeng Guo and
                  Xinhui Han and
                  Wei Zou},
  title        = {Studying Malicious Websites and the Underground Economy on the Chinese
                  Web},
  booktitle    = {7th Annual Workshop on the Economics of Information Security, {WEIS}
                  2008, Dartmouth College, Hanover, NH, USA, June 25-28, 2008},
  year         = {2008},
  url          = {http://weis2008.econinfosec.org/papers/Holz.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:45 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/ZhugeHSGHZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhugeHHSZ07,
  author       = {Jianwei Zhuge and
                  Thorsten Holz and
                  Xinhui Han and
                  Chengyu Song and
                  Wei Zou},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {Collecting Autonomous Spreading Malware Using High-Interaction Honeypots},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {438--451},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_34},
  doi          = {10.1007/978-3-540-77048-0\_34},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhugeHHSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics