Bing Mao

According to our database1, Bing Mao authored at least 41 papers between 1999 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Detecting missing checks for identifying insufficient attack protections.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

To Detect Stack Buffer Overflow with Polymorphic Canaries.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Impeding behavior-based malware analysis via replacement attacks to malware specifications.
J. Computer Virology and Hacking Techniques, 2017

Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks.
ICST Trans. Security Safety, 2017

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Proceedings of the 26th USENIX Security Symposium, 2017

DiffGuard: Obscuring Sensitive Information in Canary Based Protections.
Proceedings of the Security and Privacy in Communication Networks, 2017

ROPOB: Obfuscating Binary Code via Return Oriented Programming.
Proceedings of the Security and Privacy in Communication Networks, 2017

NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling.
Proceedings of the Security and Privacy in Communication Networks, 2016

2015
TextLogger: inferring longer inputs on touch screen using motion sensors.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Detection, Classification and Characterization of Android Malware Using API Data Dependency.
Proceedings of the Security and Privacy in Communication Networks, 2015

A Practical Approach for Adaptive Data Structure Layout Randomization.
Proceedings of the Computer Security - ESORICS 2015, 2015

Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Detect Android Malware Variants Using Component Based Topology Graph.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Defensor: Lightweight and Efficient Security-Enhanced Framework for Android.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Automatic construction of printable return-oriented programming payload.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
JITSafe: a framework against Just-in-time spraying attacks.
IET Information Security, 2013

DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Replacement attacks: automatically evading behavior-based software birthmark.
Int. J. Inf. Sec., 2012

RandHyp: Preventing Attacks via Xen Hypercall Interface.
Proceedings of the Information Security and Privacy Research, 2012

CloudER: a framework for automatic software vulnerability location and patching in the cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

RIM: A Method to Defend from JIT Spraying Attack.
Proceedings of the Seventh International Conference on Availability, 2012

2011
JITDefender: A Defense against JIT Spraying Attacks.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Replacement Attacks on Behavior Based Software Birthmark.
Proceedings of the Information Security, 14th International Conference, 2011

Automatic construction of jump-oriented programming shellcode (on the x86).
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation.
Proceedings of the Information Security - 13th International Conference, 2010

Efficient Detection of the Return-Oriented Programming Malicious Code.
Proceedings of the Information Systems Security - 6th International Conference, 2010

Return-Oriented Rootkit without Returns (on the x86).
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
DROP: Detecting Return-Oriented Programming Malicious Code.
Proceedings of the Information Systems Security, 5th International Conference, 2009

IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Traffic Controller: A Practical Approach to Block Network Covert Timing Channel.
Proceedings of the The Forth International Conference on Availability, 2009

BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability.
Proceedings of the The Forth International Conference on Availability, 2009

2006
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation.
Proceedings of the Information Security, 9th International Conference, 2006

Efficient and Practical Control Flow Monitoring for Program Security.
Proceedings of the Advances in Computer Science, 2006

A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities.
Proceedings of the The First International Conference on Availability, 2006

2005
A policy flexible architecture for secure operating system.
Operating Systems Review, 2005

2004
The design and implementation of a runtime system for graph-oriented parallel and distributed programming.
Journal of Systems and Software, 2004

1999
Object Mapping for Layered Cooperative Systems.
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999


  Loading...