Neural machine translation inspired binary code similarity comparison beyond function pairs F Zuo, X Li, Z Zhang, P Young, L Luo, Q Zeng arXiv preprint arXiv:1808.04706; NDSS 2019, 2018 | 239 | 2018 |
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling H Chi, Q Zeng, X Du, J Yu arXiv preprint arXiv:1808.02125, 2018 | 97 | 2018 |
HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes C Fu, Q Zeng, X Du USENIX Security, 2021 | 88 | 2021 |
A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis K Redmond, L Luo, Q Zeng arXiv preprint arXiv:1812.09652, 2018 | 64 | 2018 |
Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures Q Zeng, D Wu, P Liu PLDI 2011, 367-377, 2011 | 64 | 2011 |
Touch well before use: Intuitive and secure authentication for iot devices X Li, F Yan, F Zuo, Q Zeng, L Luo The 25th annual international conference on mobile computing and networking …, 2019 | 55 | 2019 |
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples Q Zeng, J Su, C Fu, G Kayas, L Luo, X Du, CC Tan, J Wu The 49th IEEE/IFIP International Conference on Dependable Systems and …, 2019 | 53* | 2019 |
Privacy leakage in smart homes and its mitigation: IFTTT as a case study R Xu, Q Zeng, L Zhu, H Chi, X Du, M Guizani IEEE Access 7, 63457-63471, 2019 | 52 | 2019 |
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection H Chi, Q Zeng, X Du, L Luo NDSS, 2021 | 51* | 2021 |
T2pair: Secure and usable pairing for heterogeneous iot devices X Li, Q Zeng, L Luo, T Luo Proceedings of the 2020 acm sigsac conference on computer and communications …, 2020 | 49 | 2020 |
Resilient decentralized android application repackaging detection using logic bombs Q Zeng, L Luo, Z Qian, X Du, Z Li Proceedings of the 2018 international symposium on code generation and …, 2018 | 40 | 2018 |
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 38 | 2017 |
Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities J Wang, M Zhao, Q Zeng, D Wu, P Liu Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP …, 2015 | 37 | 2015 |
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. D Tian, Q Zeng, D Wu, P Liu, C Hu NDSS 2012, 2012 | 30 | 2012 |
Heaptherapy: An efficient end-to-end solution against heap buffer overflows Q Zeng, M Zhao, P Liu 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015 | 29 | 2015 |
Deltapath: Precise and scalable calling context encoding Q Zeng, J Rhee, H Zhang, N Arora, G Jiang, P Liu IEEE/ACM International Symposium on Code Generation and Optimization, 109, 2014 | 23 | 2014 |
Solminer: mining distinct solutions in programs L Luo, Q Zeng Proceedings of the 38th International Conference on Software Engineering …, 2016 | 22 | 2016 |
Delay wreaks havoc on your smart home: Delay-based automation interference attacks H Chi, C Fu, Q Zeng, X Du 2022 IEEE Symposium on Security and Privacy (SP), 285-302, 2022 | 18 | 2022 |
Exploiting the sensitivity of L2 adversarial examples to erase-and-restore F Zuo, Q Zeng Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 18 | 2021 |
Resilient user-side android application repackaging and tampering detection using cryptographically obfuscated logic bombs Q Zeng, L Luo, Z Qian, X Du, Z Li, CT Huang, C Farkas IEEE Transactions on Dependable and Secure Computing 18 (6), 2582-2600, 2019 | 18 | 2019 |