Dongrui Zeng

According to our database1, Dongrui Zeng authored at least 13 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
ABSLearn: a GNN-based framework for aliasing and buffer-size information retrieval.
Pattern Anal. Appl., August, 2023

CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis.
IET Inf. Secur., July, 2023

DeepCatra: Learning flow- and graph-based behaviours for Android malware detection.
IET Inf. Secur., January, 2023

μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code.
IEEE Trans. Dependable Secur. Comput., 2023

LibScan: Towards More Precise Third-Party Library Identification for Android Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
DeepCatra: Learning Flow- and Graph-based Behaviors for Android Malware Detection.
CoRR, 2022

BinPointer: towards precise, sound, and scalable binary-level pointer analysis.
Proceedings of the CC '22: 31st ACM SIGPLAN International Conference on Compiler Construction, Seoul, South Korea, April 2, 2022

2021
CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis.
CoRR, 2021

MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Refining Indirect Call Targets at the Binary Level.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

ReCFA: Resilient Control-Flow Attestation.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2019
Program-mandering: Quantitative Privilege Separation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
From Debugging-Information Based Binary-Level Type Inference to CFG Generation.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018


  Loading...