Biblio

Export 12 results:
Filters: Author is Peng Liu  [Clear All Filters]
2022
Zhou S, Yang Z, Qiao D, Liu P, Yang M, Wang Z, Wu C.  2022.  Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. 31st USENIX Security Symposium (USENIX Security 22). :4365--4382.
2021
Zhou W, Guan L, Liu P, Zhang Y.  2021.  Automatic Firmware Emulation through Invalidity-guided Knowledge Inference. 30th USENIX Security Symposium (USENIX Security 21). :2007--2024.
2020
He Y, Xu Y, Jia X, Zhang S, Liu P, Chang S.  2020.  EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :195--208.
2019
Zhou W, Jia Y, Yao Y, Zhu L, Guan L, Mao Y, Liu P, Zhang Y.  2019.  Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. 28th USENIX Security Symposium (USENIX Security 19). :1133--1150.
Song W, Liu P.  2019.  Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC . 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :427--442.
Yuan L-P, Hu W, Yu T, Liu P, Zhu S.  2019.  Towards Large-Scale Hunting for Android Negative-Day Malware. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :533--545.
2017
Xu J, Mu D, Xing X, Liu P, Chen P, Mao B.  2017.  Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. 26th USENIX Security Symposium (USENIX Security 17). :17-32.
2016
Liu P, Yoon J, Johnson L, Banerjee S.  2016.  Greening the Video Transcoding Service with Low-Cost Hardware Transcoders. 2016 USENIX Annual Technical Conference (USENIX ATC 16). :407--419.
2015
Wang J, Xiong X, Liu P.  2015.  Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications. 2015 USENIX Annual Technical Conference (USENIX ATC 15). :361--373.
Chen K, Wang P, Lee Y, Wang XF, Zhang N, Huang H, Zou W, Liu P.  2015.  Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. 24th USENIX Security Symposium (USENIX Security 15). :659--674.
Ming J, Wu D, Xiao G, Wang J, Liu P.  2015.  TaintPipe: Pipelined Symbolic Taint Analysis. 24th USENIX Security Symposium (USENIX Security 15). :65--80.
Ren C, Zhang Y, Xue H, Wei T, Liu P.  2015.  Towards Discovering and Understanding Task Hijacking in Android. 24th USENIX Security Symposium (USENIX Security 15). :945--959.