Zhiqiang Lin

According to our database1, Zhiqiang Lin authored at least 151 papers between 2005 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things.
Secur. Commun. Networks, 2021

WLAN-Log-Based Superspreader Detection in the COVID-19 Pandemic.
CoRR, 2021

A Measurement Study of Wechat Mini-Apps.
Proceedings of the SIGMETRICS '21: ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2021

Keynote: Uncovering Vulnerabilities in Bluetooth Devices with Automated Binary Analysis.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

2020
Compartmented Secret Sharing Schemes and Locally Repairable Codes.
IEEE Trans. Commun., 2020

SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution.
IEEE Secur. Priv., 2020

Construction and Application of Functional Brain Network Based on Entropy.
Entropy, 2020

A novel authentication scheme based on edge computing for blockchain-based distributed energy trading system.
EURASIP J. Wirel. Commun. Netw., 2020

CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV.
CoRR, 2020

ACOUSTIC-TURF: Acoustic-based Privacy-Preserving COVID-19 Contact Tracing.
CoRR, 2020

On Design of Single-Layer and Multilayer Code-Based Linkable Ring Signatures.
IEEE Access, 2020

An Improved Model for Effectiveness Evaluation of Missile Electromagnetic Launch System.
IEEE Access, 2020

TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
Proceedings of the 29th USENIX Security Symposium, 2020

Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT.
Proceedings of the 29th USENIX Security Symposium, 2020

SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants.
Proceedings of the 29th USENIX Security Symposium, 2020

FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020

Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

Energy Attacks on Mobile Devices.
Proceedings of the Second IEEE International Conference on Trust, 2020

Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps.
Proceedings of the Security and Privacy in Communication Networks, 2020

A Study of the Privacy of COVID-19 Contact Tracing Apps.
Proceedings of the Security and Privacy in Communication Networks, 2020

On the Effectiveness of Behavior-Based Ransomware Detection.
Proceedings of the Security and Privacy in Communication Networks, 2020

Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

On Design of Blockchain-based Transport Scheme.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
polarRLCE: A New Code-Based Cryptosystem Using Polar Codes.
Secur. Commun. Networks, 2019

Efficient Explicit Constructions of Multipartite Secret Sharing Schemes.
IACR Cryptol. ePrint Arch., 2019

Efficient explicit constructions of compartmented secret sharing schemes.
Des. Codes Cryptogr., 2019

On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode.
CoRR, 2019

Vibration Control of a Flexible Spacecraft System With Input Backlash.
IEEE Access, 2019

Vibration Control for Two Kinds of Flexible Mechanical Systems With Full State Output Constraints.
IEEE Access, 2019

Improved Migration Genetic Algorithm Optimization for Variable-Speed Falling Trajectory of Mobile Crossbeam in Composite Hydraulic Press With Pressure Shock.
IEEE Access, 2019

CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software.
Proceedings of the 28th USENIX Security Symposium, 2019

Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization.
Proceedings of the 28th USENIX Security Symposium, 2019

The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends.
Proceedings of the 28th USENIX Security Symposium, 2019

Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Towards Automated Inter-Service Authorization for Microservice Applications.
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019

Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Probabilistic disassembly.
Proceedings of the 41st International Conference on Software Engineering, 2019

Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Effects of Extremely Low Frequency Electromagnetic Fields Exposure in an Informationalized Perspective.
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019

Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Towards Memory Safe Enclave Programming with Rust-SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Analyzing control flow integrity with LLVM-CFI.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Second Generation Small Pixel Technology Using Hybrid Bond Stacking.
Sensors, 2018

An adaptive decision-making method with fuzzy Bayesian reinforcement learning for robot soccer.
Inf. Sci., 2018

A review: The effects of imperfect data on incremental decision tree.
Int. J. Inf. Commun. Technol., 2018

Fast construction of binary ring FCSRs for hardware stream ciphers.
Des. Codes Cryptogr., 2018

SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution.
CoRR, 2018

A generic method to construct zero-difference balanced functions.
Cryptogr. Commun., 2018

An Adaptive Strategy Selection Method With Reinforcement Learning for Robotic Soccer Games.
IEEE Access, 2018

Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors.
Proceedings of the 27th USENIX Security Symposium, 2018

Guarder: A Tunable Secure Allocator.
Proceedings of the 27th USENIX Security Symposium, 2018

Using Virtual Machine Introspection for Operating Systems Security Education.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

A Security Concern About Deep Learning Models.
Proceedings of the Science of Cyber Security - First International Conference, 2018

τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Locally Repairable Codes with Heterogeneous Locality Constraints.
Proceedings of the IEEE Information Theory Workshop, 2018

SGXElide: enabling enclave code secrecy via self-modification.
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018

K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Boost Symbolic Execution Using Dynamic State Merging and Forking.
Proceedings of the 6th International Workshop on Quantitative Approaches to Software Quality co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018

A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Permutation Polynomials over Z<i><sub>p<sup>n</sup></sub></i> and Their Randomness.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications.
Cryptogr. Commun., 2017

SMARTGEN: Exposing Server URLs of Mobile Apps With Selective Symbolic Execution.
Proceedings of the 26th International Conference on World Wide Web, 2017

Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Securing Data Analytics on SGX with Randomization.
Proceedings of the Computer Security - ESORICS 2017, 2017

PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

FreeGuard: A Faster Secure Heap Allocator.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

CCS'17 Tutorial Abstract / SGX Security and Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

SGX-Log: Securing System Logs With SGX.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Building a Security OS With Software Defined Infrastructure.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Type Inference on Executables.
ACM Comput. Surv., 2016

Automatic Uncovering of Tap Points from Kernel Executions.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Detecting Stack Layout Corruptions with Robust Stack Unwinding.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

A Case for Protecting Computer Games With SGX.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Load balancing scheduling algorithm for storage system based on state acquisition and dynamic feedback.
Proceedings of the IEEE International Conference on Information and Automation, 2016

Derandomizing Kernel Address Space Layout for Memory Introspection and Forensics.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Adaptive encrypted traffic fingerprinting with bi-directional dependence.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Construction of Transition Matrices for Ternary Ring Feedback With Carry Shift Registers.
IEEE Trans. Inf. Theory, 2015

On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution.
IEEE Trans. Dependable Secur. Comput., 2015

An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure.
J. Univers. Comput. Sci., 2015

On two circuit configurations of non-linear feedback shift registers.
Int. J. Inf. Commun. Technol., 2015

On the LFSRization of a Class of FCSR Automata.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Construction of Transition Matrices for Binary FCSRs.
IACR Cryptol. ePrint Arch., 2015

A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions.
ACM Comput. Surv., 2015

PEMU: A Pin Highly Compatible Out-of-VM Dynamic Binary Instrumentation Framework.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015

You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps.
Proceedings of the 24th USENIX Security Symposium, 2015

Automatically deriving pointer reference expressions from binary code for memory dump analysis.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Towards Automatic Inference of Kernel Object Semantics from Binary Code.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Half a Century of Practice: Who Is Still Storing Plaintext Passwords?
Proceedings of the Information Security Practice and Experience, 2015

A Practical Approach for Adaptive Data Structure Layout Randomization.
Proceedings of the Computer Security - ESORICS 2015, 2015

Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Data-Centric OS Kernel Malware Characterization.
IEEE Trans. Inf. Forensics Secur., 2014

Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting.
IEEE Trans. Cloud Comput., 2014

Clock-controlled generators with large period output sequences.
Int. J. Grid Util. Comput., 2014

X-Force: Force-Executing Binary Programs for Security Applications.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Preventing Cryptographic Key Leakage in Cloud Virtual Machines.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

Towards a Systematic Study of the Covert Channel Attacks in Smartphones.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification.
Proceedings of the Computer Security - ESORICS 2014, 2014

Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

MACE: high-coverage and robust memory analysis for commodity operating systems.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Distribution Properties and 2-Adic Complexity of Clock-Controlled FCSR Sequences.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.
ACM Trans. Inf. Syst. Secur., 2013

EXTERIOR: using a dual-VM based external shell for guest-OS introspection, configuration, and recovery.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013

CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM.
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013

Message from the IPCCC 2013 technical program chairs.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

The Transformation from the Galois NLFSR to the Fibonacci Configuration.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Manipulating semantic values in kernel data structures: Attack assessments and implications.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Obfuscation resilient binary code reuse through trace-oriented programming.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Subverting system authentication with context-aware, reactive virtual machine introspection.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

OS-Sommelier: memory-only operating system fingerprinting in the cloud.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012

Automatic generation of vaccines for malware immunization.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Binary stirring: self-randomizing instruction addresses of legacy x86 binary code.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Securing untrusted code via compiler-agnostic binary rewriting.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Constructing a Diversified FCSR with a Given Connection Integer.
IACR Cryptol. ePrint Arch., 2011

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011

Characterizing kernel malware behavior with kernel data access patterns.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications.
IEEE Trans. Software Eng., 2010

Automatic Reverse Engineering of Data Structures from Binary Execution.
Proceedings of the Network and Distributed System Security Symposium, 2010

Strict control dependence and its effect on dynamic information flow analyses.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Proceedings of the Network and Distributed System Security Symposium, 2009

A Method of Human Skin Region Detection Based on PCNN.
Proceedings of the Advances in Neural Networks, 2009

Polymorphing Software by Randomizing Data Structure Layout.
Proceedings of the Detection of Intrusions and Malware, 2009

2008
A CMOS Image Sensor for Multi-Level Focal Plane Image Decomposition.
IEEE Trans. Circuits Syst. I Regul. Pap., 2008

Deriving input syntactic structure from execution.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Proceedings of the Network and Distributed System Security Symposium, 2008

A CMOS image sensor with focal plane SPIHT image compression.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

Convicting exploitable software vulnerabilities: An efficient input provenance based approach.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
A CMOS Front-End for a Lossy Image Compression Sensor.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

2006
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation.
Proceedings of the Information Security, 9th International Conference, 2006

Effects of charge-based computation non-idealities on CMOS image compression sensors.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities.
Proceedings of the The First International Conference on Availability, 2006

2005
A policy flexible architecture for secure operating system.
ACM SIGOPS Oper. Syst. Rev., 2005

A CMOS image sensor for focal plane decomposition.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005


  Loading...