What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jiang Ming
Google Scholar
ORCID:
0000-0001-9682-0502
34
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation.
Naiqian Zhang
Dongpeng Xu
Jiang Ming
Jun Xu
Qiaoyan Yu
2025
conf/host
Low-Entropy Packed Binary Detection via Accurate Hardware Events Profiling.
Erika A. Leal
Mengfei Ren
Shijia Li
Jiang Ming
2025
conf/ndss
Retrofitting XoM for Stripped Binaries without Embedded Data Relocation.
Chenke Luo
Jiang Ming
Mengfei Xie
Guojun Peng
Jianming Fu
2025
conf/uss
VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness.
Side Liu
Jiang Ming
Yilin Zhou
Jianming Fu
Guojun Peng
2025
journals/compsec
The hidden complexities of Android TPL detection: An empirical analysis of techniques, challenges, and effectiveness.
Lige Zhan
Jiang Ming
Jianming Fu
Guojun Peng
Letian Sha
Lili Lan
2023
journals/tifs
Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics Testing.
Chenke Luo
Jiang Ming
Jianming Fu
Guojun Peng
Zhetao Li
2023
conf/ccs
PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection.
Shijia Li
Jiang Ming
Pengda Qiu
Qiyuan Chen
Lanqing Liu
Huaifeng Bao
Qiang Wang
Chunfu Jia
2023
conf/uss
On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling.
Binlin Cheng
Erika A. Leal
Haotian Zhang
Jiang Ming
2023
conf/esorics
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference.
Mengfei Ren
Haotian Zhang
Xiaolei Ren
Jiang Ming
Yu Lei
2022
conf/uss
PolyCruise: A Cross-Language Dynamic Information Flow Analysis.
Wen Li
Jiang Ming
Xiapu Luo
Haipeng Cai
2022
conf/ndss
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators.
Shijia Li
Chunfu Jia
Pengda Qiu
Qiyuan Chen
Jiang Ming
Debin Gao
2021
conf/ccs
Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization.
Wenna Song
Jiang Ming
Lin Jiang
Yi Xiang
Xuanchen Pan
Jianming Fu
Guojun Peng
2021
conf/uss
MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.
Binbin Liu
Junfu Shen
Jiang Ming
Qilong Zheng
Jing Li
Dongpeng Xu
2021
conf/uss
Obfuscation-Resilient Executable Payload Extraction From Packed Malware.
Binlin Cheng
Jiang Ming
Erika A. Leal
Haotian Zhang
Jianming Fu
Guojun Peng
Jean-Yves Marion
2021
conf/wisec
Z-Fuzzer: device-agnostic fuzzing of Zigbee protocol implementation.
Mengfei Ren
Xiaolei Ren
Huadong Feng
Jiang Ming
Yu Lei
2020
conf/ccs
PatchScope: Memory Object Centric Patch Diffing.
Lei Zhao
Yuncong Zhu
Jiang Ming
Yichen Zhang
Haotian Zhang
Heng Yin
2020
conf/ccs
VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing.
Luman Shi
Jiang Ming
Jianming Fu
Guojun Peng
Dongpeng Xu
Kun Gao
Xuanchen Pan
2020
conf/acsac
Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation.
Chen Cao
Le Guan
Jiang Ming
Peng Liu
2019
conf/ccs
MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus.
Li Wang
Dongpeng Xu
Jiang Ming
Yu Fu
Dinghao Wu
2019
conf/icics
Capturing the Persistence of Facial Expression Features for Deepfake Video Detection.
Yiru Zhao
Wanfeng Ge
Wenxin Li
Run Wang
Lei Zhao
Jiang Ming
2018
conf/ccs
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification.
Dongpeng Xu
Jiang Ming
Yu Fu
Dinghao Wu
2018
conf/ccs
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.
Binlin Cheng
Jiang Ming
Jianming Fu
Guojun Peng
Ting Chen
Xiaosong Zhang
Jean-Yves Marion
2018
conf/uss
Towards Predicting Efficient and Anonymous Tor Circuits.
Armon Barton
Matthew Wright
Jiang Ming
Mohsen Imani
2018
conf/acsac
StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification.
Mohsin Junaid
Jiang Ming
David Chenho Kung
2017
conf/uss
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking.
Jiang Ming
Dongpeng Xu
Yufei Jiang
Dinghao Wu
2017
conf/sp
Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping.
Dongpeng Xu
Jiang Ming
Dinghao Wu
2016
conf/eurosp
Translingual Obfuscation.
Pei Wang
Shuai Wang
Jiang Ming
Yufei Jiang
Dinghao Wu
2015
conf/ccs
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code.
Jiang Ming
Dongpeng Xu
Li Wang
Dinghao Wu
2015
conf/uss
TaintPipe: Pipelined Symbolic Taint Analysis.
Jiang Ming
Dinghao Wu
Gaoyao Xiao
Jun Wang
Peng Liu
2015
conf/sec
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference.
Jiang Ming
Dongpeng Xu
Dinghao Wu
2015
conf/acns
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
Jiang Ming
Zhi Xin
Pengwei Lan
Dinghao Wu
Peng Liu
Bing Mao
2012
conf/icisc
iBinHunt: Binary Hunting with Inter-procedural Control Flow.
Jiang Ming
Meng Pan
Debin Gao
2011
conf/esorics
Linear Obfuscation to Combat Symbolic Execution.
Zhi Wang
Jiang Ming
Chunfu Jia
Debin Gao
2009
conf/icics
Denial-of-Service Attacks on Host-Based Generic Unpackers.
Limin Liu
Jiang Ming
Zhi Wang
Debin Gao
Chunfu Jia
Coauthors
Armon Barton
(1)
Binbin Liu
(1)
Bing Mao
(1)
Binlin Cheng
(3)
Chen Cao
(1)
Chenke Luo
(2)
Chunfu Jia
(4)
David Chenho Kung
(1)
Debin Gao
(4)
Dinghao Wu
(9)
Dongpeng Xu
(9)
Erika A. Leal
(3)
Gaoyao Xiao
(1)
Guojun Peng
(8)
Haipeng Cai
(1)
Haotian Zhang
(4)
Heng Yin
(1)
Huadong Feng
(1)
Huaifeng Bao
(1)
Jean-Yves Marion
(2)
Jiang Ming
(34)
Jianming Fu
(8)
Jing Li
(1)
Jun Wang
(1)
Jun Xu
(1)
Junfu Shen
(1)
Kun Gao
(1)
Lanqing Liu
(1)
Le Guan
(1)
Lei Zhao
(2)
Letian Sha
(1)
Li Wang
(2)
Lige Zhan
(1)
Lili Lan
(1)
Limin Liu
(1)
Lin Jiang
(1)
Luman Shi
(1)
Matthew Wright
(1)
Meng Pan
(1)
Mengfei Ren
(3)
Mengfei Xie
(1)
Mohsen Imani
(1)
Mohsin Junaid
(1)
Naiqian Zhang
(1)
Pei Wang
(1)
Peng Liu
(3)
Pengda Qiu
(2)
Pengwei Lan
(1)
Qiang Wang
(1)
Qiaoyan Yu
(1)
Qilong Zheng
(1)
Qiyuan Chen
(2)
Run Wang
(1)
Shijia Li
(3)
Shuai Wang
(1)
Side Liu
(1)
Ting Chen
(1)
Wanfeng Ge
(1)
Wen Li
(1)
Wenna Song
(1)
Wenxin Li
(1)
Xiaolei Ren
(2)
Xiaosong Zhang
(1)
Xiapu Luo
(1)
Xuanchen Pan
(2)
Yi Xiang
(1)
Yichen Zhang
(1)
Yilin Zhou
(1)
Yiru Zhao
(1)
Yu Fu
(2)
Yu Lei
(2)
Yufei Jiang
(2)
Yuncong Zhu
(1)
Zhetao Li
(1)
Zhi Wang
(2)
Zhi Xin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to