Ping Chen

Orcid: 0000-0002-8517-0580

Affiliations:
  • Fudan University, Institute for Big Data, Shanghai, China
  • Pennsylvania State University, College of Information Sciences and Technology, State College, PA, USA (former)
  • Purdue University, Department of Computer Science, West Lafayette, USA (former)
  • Nanjing University Department of Computer Science and Technology, State Key Laboratory for Novel Software Technology, China (PhD 2012)


According to our database1, Ping Chen authored at least 31 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2023

2022
HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks.
IEEE Trans. Inf. Forensics Secur., 2021

2020
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics.
J. Comput. Secur., 2020

2019
Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

MTD Techniques for Memory Protection Against Zero-Day Attacks.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

On convergence rates of game theoretic reinforcement learning algorithms.
Autom., 2019

2018
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks.
Cybersecur., 2018

ROPNN: Detection of ROP Payloads Using Deep Neural Networks.
CoRR, 2018

2017
Dancing with Wolves: Towards Practical Event-driven VMM Monitoring.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Proceedings of the 26th USENIX Security Symposium, 2017

What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Towards a Science for Adaptive Defense: Revisit Server Protection.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Demo: A Symbolic N-Variant System.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

2015
Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack.
CoRR, 2015

A Practical Approach for Adaptive Data Structure Layout Randomization.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Automatic construction of printable return-oriented programming payload.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
JITSafe: a framework against Just-in-time spraying attacks.
IET Inf. Secur., 2013

2012
RandHyp: Preventing Attacks via Xen Hypercall Interface.
Proceedings of the Information Security and Privacy Research, 2012

CloudER: a framework for automatic software vulnerability location and patching in the cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

RIM: A Method to Defend from JIT Spraying Attack.
Proceedings of the Seventh International Conference on Availability, 2012

2011
JITDefender: A Defense against JIT Spraying Attacks.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Automatic construction of jump-oriented programming shellcode (on the x86).
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Efficient Detection of the Return-Oriented Programming Malicious Code.
Proceedings of the Information Systems Security - 6th International Conference, 2010

Return-Oriented Rootkit without Returns (on the x86).
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
DROP: Detecting Return-Oriented Programming Malicious Code.
Proceedings of the Information Systems Security, 5th International Conference, 2009

IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Traffic Controller: A Practical Approach to Block Network Covert Timing Channel.
Proceedings of the The Forth International Conference on Availability, 2009

BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability.
Proceedings of the The Forth International Conference on Availability, 2009


  Loading...