USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 12 results:
Filters: Author is Peng Liu [Clear All Filters]
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. 31st USENIX Security Symposium (USENIX Security 22). :4365--4382.
.
2022. Automatic Firmware Emulation through Invalidity-guided Knowledge Inference. 30th USENIX Security Symposium (USENIX Security 21). :2007--2024.
.
2021. EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :195--208.
.
2020. Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. 28th USENIX Security Symposium (USENIX Security 19). :1133--1150.
.
2019. Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC . 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :427--442.
.
2019. Towards Large-Scale Hunting for Android Negative-Day Malware. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :533--545.
.
2019. Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. 26th USENIX Security Symposium (USENIX Security 17). :17-32.
.
2017. Greening the Video Transcoding Service with Low-Cost Hardware Transcoders. 2016 USENIX Annual Technical Conference (USENIX ATC 16). :407--419.
.
2016. Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications. 2015 USENIX Annual Technical Conference (USENIX ATC 15). :361--373.
.
2015. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. 24th USENIX Security Symposium (USENIX Security 15). :659--674.
.
2015. TaintPipe: Pipelined Symbolic Taint Analysis. 24th USENIX Security Symposium (USENIX Security 15). :65--80.
.
2015. Towards Discovering and Understanding Task Hijacking in Android. 24th USENIX Security Symposium (USENIX Security 15). :945--959.
.
2015.