Biblio

Export 19 results:
Filters: Author is Chao Zhang  [Clear All Filters]
2024
Wang J, Zhang C, Chen L, Rong Y, Wu Y, Wang H, Tan W, Li Q, Li Z.  2024.  Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph Features. 33rd USENIX Security Symposium (USENIX Security 24). :4265--4282.
Li P, Meng W, Zhang C.  2024.  SDFuzz: Target States Driven Directed Fuzzing. 33rd USENIX Security Symposium (USENIX Security 24). :2441--2457.
2023
Wang J, Zhang Z, Wang M, Qiu H, Zhang T, Li Q, Li Z, Wei T, Zhang C.  2023.  Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks. 32nd USENIX Security Symposium (USENIX Security 23). :2329--2346.
Shi J, Wang Z, Feng Z, Lan Y, Qin S, You W, Zou W, Payer M, Zhang C.  2023.  AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering. 32nd USENIX Security Symposium (USENIX Security 23). :4967--4984.
Wang R, Chen K, Zhang C, Pan Z, Li Q, Qin S, Xu S, Zhang M, Li Y.  2023.  AlphaEXP: An Expert System for Identifying Security-Sensitive Kernel Objects. 32nd USENIX Security Symposium (USENIX Security 23). :4229--4246.
Li Y, Duan Y, Huang Z, Hong C, Zhang C, Song Y.  2023.  Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference. 32nd USENIX Security Symposium (USENIX Security 23). :5377--5394.
Yin T, Gao Z, Xiao Z, Ma Z, Zheng M, Zhang C.  2023.  KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations. 32nd USENIX Security Symposium (USENIX Security 23). :5039--5054.
Chen X, Shi Y, Jiang Z, Li Y, Wang R, Duan H, Wang H, Zhang C.  2023.  MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries. 32nd USENIX Security Symposium (USENIX Security 23). :841--858.
Guo R, Chen J, Wang Y, Mu K, Liu B, Li X, Zhang C, Duan H, Wu J.  2023.  Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack. 32nd USENIX Security Symposium (USENIX Security 23). :6185--6202.
2022
Fu Q-A, Dong Y, Su H, Zhu J, Zhang C.  2022.  AutoDA: Automated Decision-based Iterative Adversarial Attacks. 31st USENIX Security Symposium (USENIX Security 22). :3557--3574.
Zhao B, Li Z, Qin S, Ma Z, Yuan M, Zhu W, Tian Z, Zhang C.  2022.  StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing. 31st USENIX Security Symposium (USENIX Security 22). :3273--3289.
2021
Wang Y, Zhang C, Zhao Z, Zhang B, Gong X, Zou W.  2021.  MAZE: Towards Automated Heap Feng Shui. 30th USENIX Security Symposium (USENIX Security 21). :1647--1664.
Chen L, Wang Y, Cai Q, Zhan Y, Hu H, Linghu J, Hou Q, Zhang C, Duan H, Xue Z.  2021.  Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems. 30th USENIX Security Symposium (USENIX Security 21). :303--319.
Chen K, Zhang C, Yin T, Chen X, Zhao L.  2021.  VScape: Assessing and Escaping Virtual Call Protections. 30th USENIX Security Symposium (USENIX Security 21). :1719--1736.
2020
Liu B, Zhang C, Gong G, Zeng Y, Ruan H, Zhuge J.  2020.  FANS: Fuzzing Android Native System Services via Automated Interface Analysis. 29th USENIX Security Symposium (USENIX Security 20). :307--323.
Gan S, Zhang C, Chen P, Zhao B, Qin X, Wu D, Chen Z.  2020.  GREYONE: Data Flow Sensitive Fuzzing. 29th USENIX Security Symposium (USENIX Security 20). :2577--2594.
2019
Lyu C, Ji S, Zhang C, Li Y, Lee W-H, Song Y, Beyah R.  2019.  MOPT: Optimized Mutation Scheduling for Fuzzers. 28th USENIX Security Symposium (USENIX Security 19). :1949--1966.
2017
Jia X, Zhang C, Su P, Yang Y, Huang H, Feng D.  2017.  Towards Efficient Heap Overflow Discovery. 26th USENIX Security Symposium (USENIX Security 17). :989--1006.
2011
Zhang C, Huang C, Ross KW, Maltz DA, Li J.  2011.  Inflight Modifications of Content: Who Are the Culprits? 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11).