Bing Mao
Bing Mao
Computer Science, Nanjing University
Bestätigte E-Mail-Adresse bei nju.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
DROP: Detecting return-oriented programming malicious code
P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie
International Conference on Information Systems Security, 163-177, 2009
2572009
Role-based access control model for CSCW systems
C Li, Y Zhan, B Mao, L Xie
RUAN JIAN XUE BAO 11 (7), 931-937, 2000
78*2000
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware
Y Zhongyang, Z Xin, B Mao, L Xie
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
682013
Detecting code reuse in android applications using component-based control flow graph
X Sun, Y Zhongyang, Z Xin, B Mao, L Xie
IFIP international information security conference, 142-155, 2014
582014
AutoPaG: towards automated software patch generation with source code root cause identification and repair
Z Lin, X Jiang, D Xu, B Mao, L Xie
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
562007
JITDefender: A defense against JIT spraying attacks
P Chen, Y Fang, B Mao, L Xie
IFIP International Information Security Conference, 142-153, 2011
552011
设计计算机辅助协同工作系统的几个关键技术
茅兵, 杜兴, 谢立
计算机研究与发展 33 (004), 241-247, 1996
52*1996
访问控制研究综述
赵亮, 茅兵, 谢立
计算机工程 30 (002), 1-2, 2004
50*2004
Automatic construction of jump-oriented programming shellcode (on the x86)
P Chen, X Xing, B Mao, L Xie, X Shen, X Yin
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
452011
System call redirection: A practical approach to meeting real-world virtual machine introspection needs
R Wu, P Chen, P Liu, B Mao
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
442014
Efficient detection of the return-oriented programming malicious code
P Chen, X Xing, H Han, B Mao, L Xie
International Conference on Information Systems Security, 140-155, 2010
442010
Textlogger: inferring longer inputs on touch screen using motion sensors
D Ping, X Sun, B Mao
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
382015
Brick: A binary tool for run-time detecting and locating integer-based vulnerability
P Chen, Y Wang, Z Xin, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 208-215, 2009
382009
A practical approach for adaptive data structure layout randomization
P Chen, J Xu, Z Lin, D Xu, B Mao, P Liu
European Symposium on Research in Computer Security, 69-89, 2015
342015
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th {USENIX} Security Symposium ({USENIX} Security 18), 919-936, 2018
332018
JITSafe: a framework against Just-in-time spraying attacks
P Chen, R Wu, B Mao
IET Information Security 7 (4), 283-292, 2013
332013
Detect android malware variants using component based topology graph
T Shen, Y Zhongyang, Z Xin, B Mao, H Huang
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
312014
Detection, classification and characterization of android malware using api data dependency
Y Li, T Shen, X Sun, X Pan, B Mao
International Conference on Security and Privacy in Communication Systems, 23-40, 2015
292015
一种基于有向图模型的安全策略冲突检测方法
姚键, 茅兵, 谢立
计算机研究与发展 42 (7), 1108, 2005
272005
Impeding behavior-based malware analysis via replacement attacks to malware specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
Journal of Computer Virology and Hacking Techniques 13 (3), 193-207, 2017
262017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20