Yueqi Chen

Affiliations:
  • University of Colorado Boulder, Department of Computer Science, CO, USA
  • Pennsylvania State University, College of Information Sciences & Technology, University Park, PA, USA (PhD 2022)


According to our database1, Yueqi Chen authored at least 15 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs.
IEEE Trans. Dependable Secur. Comput., 2024

When eBPF Meets Machine Learning: On-the-fly OS Kernel Compartmentalization.
CoRR, 2024

2023
Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness.
Proceedings of the 32nd USENIX Security Symposium, 2023

PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability.
Proceedings of the 31st USENIX Security Symposium, 2022

GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

An In-depth Analysis of Duplicated Linux Kernel Bug Reports.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2020
Exposing cache timing side-channel leaks through out-of-order symbolic execution.
Proc. ACM Program. Lang., 2020

SpecuSym: speculative symbolic execution for cache timing leak detection.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

A Systematic Study of Elastic Objects in Kernel Exploitation.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities.
Proceedings of the 28th USENIX Security Symposium, 2019

Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
Proceedings of the 28th USENIX Security Symposium, 2019

RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018


  Loading...