What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Bing Mao
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2023
journals/compsec
Generation-based fuzzing? Don't build a new generator, reuse!
Chengbin Pang
Hongbin Liu
Yifan Wang
Neil Zhenqiang Gong
Bing Mao
Jun Xu
2023
conf/uss
Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs.
Jianhao Xu
Kangjie Lu
Zhengjie Du
Zhu Ding
Linke Li
Qiushi Wu
Mathias Payer
Bing Mao
2023
conf/sp
WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches.
Jianhao Xu
Luca Di Bartolomeo
Flavio Toffalini
Bing Mao
Mathias Payer
2022
conf/uss
Ground Truth for Binary Disassembly is Not Easy.
Chengbin Pang
Tiantai Zhang
Ruotong Yu
Bing Mao
Jun Xu
2021
conf/sp
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask.
Chengbin Pang
Ruotong Yu
Yaohui Chen
Eric Koskinen
Georgios Portokalidis
Bing Mao
Jun Xu
2020
conf/esorics
HART: Hardware-Assisted Kernel Module Tracing on Arm.
Yunlan Du
Zhenyu Ning
Jun Xu
Zhilong Wang
Yueh-Hsun Lin
Fengwei Zhang
Xinyu Xing
Bing Mao
2020
conf/dsn
CATI: Context-Assisted Type Inference from Stripped Binaries.
Ligeng Chen
Zhongling He
Bing Mao
2019
conf/ccs
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
Yaohui Chen
Dongliang Mu
Jun Xu
Zhichuang Sun
Wenbo Shen
Xinyu Xing
Long Lu
Bing Mao
2018
conf/uss
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
Dongliang Mu
Alejandro Cuevas
Limin Yang
Hang Hu
Xinyu Xing
Bing Mao
Gang Wang
2018
conf/dsn
To Detect Stack Buffer Overflow with Polymorphic Canaries.
Zhilong Wang
Xuhua Ding
Chengbin Pang
Jian Guo
Jun Zhu
Bing Mao
2018
conf/acsac
Mapping to Bits: Efficiently Detecting Type Confusion Errors.
Chengbin Pang
Yunlan Du
Bing Mao
Shanqing Guo
2017
conf/uss
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Jun Xu
Dongliang Mu
Xinyu Xing
Peng Liu
Ping Chen
Bing Mao
2017
conf/dsn
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Ping Chen
Jun Xu
Zhisheng Hu
Xinyu Xing
Minghui Zhu
Bing Mao
Peng Liu
2015
conf/acns
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
Jiang Ming
Zhi Xin
Pengwei Lan
Dinghao Wu
Peng Liu
Bing Mao
2015
conf/esorics
A Practical Approach for Adaptive Data Structure Layout Randomization.
Ping Chen
Jun Xu
Zhiqiang Lin
Dongyan Xu
Bing Mao
Peng Liu
2015
conf/wisec
TextLogger: inferring longer inputs on touch screen using motion sensors.
Dan Ping
Xin Sun
Bing Mao
2014
conf/sec
Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph.
Xin Sun
Yibing Zhongyang
Zhi Xin
Bing Mao
Li Xie
2014
conf/dsn
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
Rui Wu
Ping Chen
Peng Liu
Bing Mao
2013
conf/ccs
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware.
Yibing Zhongyang
Zhi Xin
Bing Mao
Li Xie
2012
conf/ccs
CloudER: a framework for automatic software vulnerability location and patching in the cloud.
Ping Chen
Dongyan Xu
Bing Mao
2012
conf/sec
RandHyp: Preventing Attacks via Xen Hypercall Interface.
Feifei Wang
Ping Chen
Bing Mao
Li Xie
2011
conf/ccs
Automatic construction of jump-oriented programming shellcode (on the x86).
Ping Chen
Xiao Xing
Bing Mao
Li Xie
Xiaobin Shen
Xinchun Yin
2011
conf/sec
JITDefender: A Defense against JIT Spraying Attacks.
Ping Chen
Yi Fang
Bing Mao
Li Xie
2010
conf/iciss
Efficient Detection of the Return-Oriented Programming Malicious Code.
Ping Chen
Xiao Xing
Hao Han
Bing Mao
Li Xie
2010
conf/icics
Return-Oriented Rootkit without Returns (on the x86).
Ping Chen
Xiao Xing
Bing Mao
Li Xie
2009
conf/iciss
DROP: Detecting Return-Oriented Programming Malicious Code.
Ping Chen
Hai Xiao
Xiaobin Shen
Xinchun Yin
Bing Mao
Li Xie
2009
conf/icics
IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program.
Ping Chen
Hao Han
Yi Wang
Xiaobin Shen
Xinchun Yin
Bing Mao
Li Xie
Coauthors
Alejandro Cuevas
(1)
Bing Mao
(27)
Chengbin Pang
(5)
Dan Ping
(1)
Dinghao Wu
(1)
Dongliang Mu
(3)
Dongyan Xu
(2)
Eric Koskinen
(1)
Feifei Wang
(1)
Fengwei Zhang
(1)
Flavio Toffalini
(1)
Gang Wang
(1)
Georgios Portokalidis
(1)
Hai Xiao
(1)
Hang Hu
(1)
Hao Han
(2)
Hongbin Liu
(1)
Jian Guo
(1)
Jiang Ming
(1)
Jianhao Xu
(2)
Jun Xu
(8)
Jun Zhu
(1)
Kangjie Lu
(1)
Li Xie
(9)
Ligeng Chen
(1)
Limin Yang
(1)
Linke Li
(1)
Long Lu
(1)
Luca Di Bartolomeo
(1)
Mathias Payer
(2)
Minghui Zhu
(1)
Neil Zhenqiang Gong
(1)
Peng Liu
(5)
Pengwei Lan
(1)
Ping Chen
(12)
Qiushi Wu
(1)
Rui Wu
(1)
Ruotong Yu
(2)
Shanqing Guo
(1)
Tiantai Zhang
(1)
Wenbo Shen
(1)
Xiao Xing
(3)
Xiaobin Shen
(3)
Xin Sun
(2)
Xinchun Yin
(3)
Xinyu Xing
(5)
Xuhua Ding
(1)
Yaohui Chen
(2)
Yi Fang
(1)
Yi Wang
(1)
Yibing Zhongyang
(2)
Yifan Wang
(1)
Yueh-Hsun Lin
(1)
Yunlan Du
(2)
Zhengjie Du
(1)
Zhenyu Ning
(1)
Zhi Xin
(3)
Zhichuang Sun
(1)
Zhilong Wang
(2)
Zhiqiang Lin
(1)
Zhisheng Hu
(1)
Zhongling He
(1)
Zhu Ding
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to