Zhiqiang Lin

Google Scholar ORCID: 0000-0001-6527-5994
102 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Understanding Miniapp Malware: Identification, Dissection, and Characterization.
Yuqing Yang Yue Zhang Zhiqiang Lin
2025
conf/ndss
Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs.
Linxi Jiang Xin Jin Zhiqiang Lin
2025
conf/ndss
Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation.
2025
conf/ndss
Repurposing Neural Networks for Efficient Cryptographic Computation.
Xin Jin Shiqing Ma Zhiqiang Lin
2025
conf/uss
AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality Apps.
2024
conf/ndss
5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service.
2023
conf/uss
Controlled Data Races in Enclaves: Attacks and Detection.
2023
conf/uss
Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract.
2023
conf/uss
A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games.
Chaoshun Zuo Chao Wang Zhiqiang Lin
2023
conf/uss
One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat.
Chao Wang Yue Zhang Zhiqiang Lin
2023
conf/uss
Reusable Enclaves for Confidential Serverless Computing.
2023
conf/uss
Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries.
Haohuang Wen Zhiqiang Lin
2023
conf/ndss
Thwarting Smartphone SMS Attacks at the Radio Interface Layer.
2023
conf/ndss
Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing.
2022
conf/uss
Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games.
Chaoshun Zuo Zhiqiang Lin
2022
conf/ndss
Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures.
2021
conf/uss
Towards Formal Verification of State Continuity for Enclave Programs.
2021
conf/uss
Automatic Policy Generation for Inter-Service Access Control of Microservices.
2021
conf/uss
SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting.
2020
conf/uss
TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
2020
conf/uss
Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT.
2020
conf/uss
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.
2020
conf/uss
FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
2020
conf/uss
SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants.
2020
conf/ndss
Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps.
2019
conf/uss
Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization.
2019
conf/uss
The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends.
2019
conf/uss
CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software.
2019
conf/ndss
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
2018
conf/uss
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors.
2018
conf/uss
Guarder: A Tunable Secure Allocator.
2018
conf/ndss
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
2018
conf/ndss
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
2016
conf/ndss
Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services.
2016
conf/acsac
Adaptive encrypted traffic fingerprinting with bi-directional dependence.
2015
conf/uss
You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps.
2014
conf/uss
Preventing Cryptographic Key Leakage in Cloud Virtual Machines.
2014
conf/uss
X-Force: Force-Executing Binary Programs for Security Applications.
2014
conf/ndss
Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization.
2014
conf/ndss
SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps.
2012
conf/ndss
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
2011
conf/ndss
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
2010
conf/ndss
Automatic Reverse Engineering of Data Structures from Binary Execution.
Zhiqiang Lin Xiangyu Zhang Dongyan Xu
2009
conf/ndss
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Tielei Wang Tao Wei Zhiqiang Lin Wei Zou
2008
conf/ndss
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.

Coauthors

Adwait Nadkarni (1)
Ahmad Mustafa (1)
Alireza Saberi (1)
Alvaro A. Cárdenas (1)
Angelos Stavrou (2)
Anish Arora (1)
Aravind Prakash (2)
Ashish Gehani (1)
Bhavani Thuraisingham (2)
Bing Mao (1)
Binyu Zang (1)
Bo Lu (1)
Brendan Dolan-Gavitt (1)
Brendan Saltaformaggio (1)
Carter Yagemann (2)
Chao Wang (4)
Chao Wu (1)
Chaoshun Zuo (16)
Chia-Che Tsai (1)
Christopher Ellis (2)
Claudia Eckert (2)
Corey Crosser (1)
David I. Urbina (1)
David Sounthiraraj (1)
Dawu Gu (1)
Dongyan Xu (11)
Eknath Venkataramani (1)
Erick Bauman (5)
Erman Pattuk (1)
Fahad Shaon (1)
Fei Peng (1)
Gang Tan (2)
Garret Greenwood (1)
Giancarlo Pellegrino (2)
Guofei Gu (1)
Guoxing Chen (4)
Haibing Guan (1)
Haibo Chen (1)
Haipeng Cai (1)
Haohuang Wen (9)
Heng Yin (2)
Hongyu Liu (2)
Huibo Wang (3)
Huseyin Ulusoy (1)
Insup Lee (1)
Jairo Giraldo (1)
Jens Grossklags (2)
Jialong Zhang (1)
Jian Weng (1)
Jiancong Cui (1)
Jianyu Niu (1)
Jiawei Guo (1)
Jim Hao Chen (1)
Jin Chen (1)
Jiongyi Chen (2)
John Y. Kim (1)
Jorge Blasco (2)
Juan Caballero (3)
Juanru Li (1)
Jun Xu (1)
Jun Yeon Won (1)
Junghwan Rhee (4)
Junyuan Zeng (1)
Justin Sahs (1)
Kaiyuan Zhang (1)
Kaushal Kafle (1)
Kehuan Zhang (2)
Kenneth A. Miller (1)
Kevin Fu (2)
Kevin W. Hamlen (7)
Kexin Pei (1)
Khaled Al-Naami (1)
Latifur Khan (6)
Lei Xu (1)
Linxi Jiang (1)
Liqun Shan (1)
Long Li (1)
Luis E. Salazar (1)
Luyi Xing (1)
Marcelo Morales (1)
Masoud Ghaffarinia (1)
Matthias Neumayer (2)
Md Sakib Anwar (1)
Melih Sirlanci (2)
Menghan Sun (2)
Mengya Zhang (3)
Mengyuan Li (3)
Mingshen Sun (1)
Mohamed A Elsaadani (1)
Mohamed Elsabagh (2)
Mohit Kumar Jangid (3)
Murat Kantarcioglu (3)
Omar Alrawi (1)
Pallavi Sivakumaran (1)
Paul Muntean (2)
Pei Wang (1)
Peng Liu (1)
Phillip A. Porras (2)
Ping Chen (1)
Pinshen Xu (1)
Qi Alfred Chen (2)
Qian Feng (1)
Qingchuan Zhao (8)
Rajib Dey (1)
Ran Duan (1)
Ranjita Pai Kasturi (1)
Raul Quinonez (1)
Richard Wartell (2)
Ronghai Yang (1)
Rui Wang (1)
Ruian Duan (1)
Ruoyu Wang (1)
Ryan D. Riley (1)
Ryan Johnson (2)
Sam Silvestro (2)
Sanchuan Chen (3)
Seung-Hun Kim (1)
Shiqing Ma (1)
Shixuan Zhao (3)
Shuaike Dong (1)
Sunil Manandhar (1)
Swarup Chandra (3)
Taesoo Kim (1)
Tao Wei (2)
Ten-Hwang Lai (1)
Tianyi Liu (1)
Tielei Wang (1)
Tobias Alam (1)
Tongping Liu (2)
Vinod Yegneswaran (2)
Vishal Karande (4)
Vishwath Mohan (2)
Wei Zou (1)
Weidong Shi (1)
Wenhao Wang (1)
Wenqiang Li (1)
Wenrui Diao (2)
Wing Cheong Lau (1)
Won Woo Ro (1)
Wubing Wang (1)
Xiali Hei (2)
Xiangyu Zhang (9)
Xiao Wang (1)
XiaoFeng Wang (1)
Xiaojing Liao (1)
Xiaokuan Zhang (3)
Xiaoyang Xu (1)
Xin Jin (4)
Xing Li (1)
Xingli Zhang (1)
Xingyu Lyu (1)
Xinwen Fu (1)
Xuxian Jiang (3)
Yan Chen (1)
Yan Long (2)
Yan Solihin (1)
Yangchun Fu (4)
Yanjie Zhao (1)
Yazhou Tu (2)
Yier Jin (1)
Yiming Jing (1)
Yinqian Zhang (17)
Yu Ding (1)
Yu Nong (1)
Yuan Xiao (1)
Yuanyuan Zhang (1)
Yue Zhang (11)
Yueqiang Cheng (1)
Yufei Gu (1)
Yulong Zhang (1)
Yuqing Yang (5)
Zhaoyan Xu (1)
Zhendong Su (1)
Zhiqiang Lin (102)
Zhui Deng (1)
Zhuo Zhang (1)
Ziman Ling (1)
Ziyi Liu (1)
Filters
Years:  to