Junyuan Zeng
Junyuan Zeng
Samsung Research America, Inc
Bestätigte E-Mail-Adresse bei utdallas.edu
Titel
Zitiert von
Zitiert von
Jahr
Obfuscation resilient binary code reuse through trace-oriented programming
J Zeng, Y Fu, KA Miller, Z Lin, X Zhang, D Xu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
702013
Cpu transparent protection of os kernel and hypervisor integrity with programmable dram
Z Liu, JH Lee, J Zeng, Y Wen, Z Lin, W Shi
Proceedings of the 40th Annual International Symposium on Computer …, 2013
472013
HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management.
Y Fu, J Zeng, Z Lin
Proceedings of the 2014 USENIX conference on USENIX Annual Technical …, 2014
432014
Pemu: A pin highly compatible out-of-vm dynamic binary instrumentation framework
J Zeng, Y Fu, Z Lin
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on …, 2015
352015
Improved index compression techniques for versioned document collections
J He, J Zeng, T Suel
Proceedings of the 19th ACM international conference on Information and …, 2010
302010
Android malware development on public malware scanning platforms: A large-scale data-driven study
H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, S Chari, C Zhang
2016 IEEE International Conference on Big Data, 1090-1099, 2016
142016
Towards automatic inference of kernel object semantics from binary code
J Zeng, Z Lin
Proceedings of the 18th International Symposium on Research in Attacks …, 2015
132015
Automatic uncovering of tap points from kernel executions
J Zeng, Y Fu, Z Lin
Proceedings of the 19th International Symposium on Research in Attacks …, 2016
72016
A Large-scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform
H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, I Molloy, S Chari, ...
2018 IEEE Transactions on Big Data, 2018
42018
Binary Code Reuse: A Dynamic Analysis Based Approach
J Zeng, Z Lin, A Cárdenas, KW Hamlen, L Khan
University of Texas at Dallas, 2015
12015
System and method for monitoring file integrity of multiple containers using one agent
J Zeng, Z Zhan, Y Chen, J Su
US Patent 10,949,532, 2021
2021
Method and system for autonomous malware analysis
Z Zhan, J Zeng, J Su
US Patent App. 16/246,445, 2020
2020
Screenshot based tui process for in-app purchase authentication
Y Lu, J Zeng, P Peng
US Patent US20200081615A1, 2020
2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–13