Biblio

Export 11 results:
Filters: Author is Peng Liu  [Clear All Filters]
2021
Zhou W, Guan L, Liu P, Zhang Y.  2021.  Automatic Firmware Emulation through Invalidity-guided Knowledge Inference. 30th {USENIX} Security Symposium ({USENIX} Security 21). :2007--2024.
2020
He Y, Xu Y, Jia X, Zhang S, Liu P, Chang S.  2020.  EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX. 23rd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2020). :195--208.
2019
Zhou W, Jia Y, Yao Y, Zhu L, Guan L, Mao Y, Liu P, Zhang Y.  2019.  Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1133--1150.
Song W, Liu P.  2019.  Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC . 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019). :427--442.
Yuan L-P, Hu W, Yu T, Liu P, Zhu S.  2019.  Towards Large-Scale Hunting for Android Negative-Day Malware. 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019). :533--545.
2017
Xu J, Mu D, Xing X, Liu P, Chen P, Mao B.  2017.  Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. 26th {USENIX} Security Symposium ({USENIX} Security 17). :17-32.
2016
Liu P, Yoon J, Johnson L, Banerjee S.  2016.  Greening the Video Transcoding Service with Low-Cost Hardware Transcoders. 2016 {USENIX} Annual Technical Conference ({USENIX} {ATC} 16). :407--419.
2015
Wang J, Xiong X, Liu P.  2015.  Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications. 2015 {USENIX} Annual Technical Conference ({USENIX} {ATC} 15). :361--373.
Chen K, Wang P, Lee Y, Wang XF, Zhang N, Huang H, Zou W, Liu P.  2015.  Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. 24th {USENIX} Security Symposium ({USENIX} Security 15). :659--674.
Ming J, Wu D, Xiao G, Wang J, Liu P.  2015.  TaintPipe: Pipelined Symbolic Taint Analysis. 24th {USENIX} Security Symposium ({USENIX} Security 15). :65--80.
Ren C, Zhang Y, Xue H, Wei T, Liu P.  2015.  Towards Discovering and Understanding Task Hijacking in Android. 24th {USENIX} Security Symposium ({USENIX} Security 15). :945--959.