Find Research Output

Search concepts
Selected Filters
2017
1 Citation (Scopus)

Towards a science for adaptive defense: Revisit server protection

Hu, Z., Chen, P., Lu, Y., Zhu, M. & Liu, P., Jan 6 2017, Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 112-121 10 p. 7809698. (Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost effectiveness
manipulation
Data structures
Servers
costs
11 Citations (Scopus)

Towards probabilistic identification of zero-day attack paths

Sun, X., Dai, J., Liu, P., Singhal, A. & Yen, J., Feb 21 2017, 2016 IEEE Conference on Communications and Network Security, CNS 2016. Institute of Electrical and Electronics Engineers Inc., p. 64-72 9 p. 7860471. (2016 IEEE Conference on Communications and Network Security, CNS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian networks
Network security
Industry
Experiments
27 Citations (Scopus)

TrustShadow: Secure execution of unmodified applications with ARM TrustZone

Guan, L., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 488-501 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Communication
Processing
Internet of things
2 Citations (Scopus)

Using Bayesian networks to fuse intrusion evidences and detect zero-day attack paths

Sun, X., Dai, J., Liu, P., Singhal, A. & Yen, J., Nov 15 2017, Network Security Metrics. Springer International Publishing, p. 95-115 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Bayesian networks
Electric fuses
Network security
Industry
2 Citations (Scopus)

What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon

Chen, P., Xu, J., Hu, Z., Xing, X., Zhu, M., Mao, B. & Liu, P., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 451-462 12 p. 8023144. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer operating systems
Data storage equipment
Linux
2016
6 Citations (Scopus)

A comprehensive study of co-residence threat in multi-tenant public PaaS clouds

Zhang, W., Jia, X., Wang, C., Zhang, S., Huang, Q., Wang, M. & Liu, P., Jan 1 2016, Information and Communications Security - 18th International Conference, ICICS 2016, Proceedings. Lam, K-Y., Qing, S. & Chi, C-H. (eds.). Springer Verlag, p. 361-375 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9977 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Placement
Containers
Covert Channel
Data storage equipment
Data Center
3 Citations (Scopus)

A machine learning approach for detecting third-party trackers on the web

Wu, Q., Liu, Q., Zhang, Y., Liu, P. & Wen, G., Jan 1 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Katsikas, S., Meadows, C., Askoxylakis, I. & Ioannidis, S. (eds.). Springer Verlag, p. 238-258 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Machine Learning
Application programming interfaces (API)
JavaScript
Supervised Learning
7 Citations (Scopus)

Android malware development on public malware scanning platforms: A large-scale data-driven study

Huang, H., Zheng, C., Zeng, J., Zhou, W., Zhu, S., Liu, P., Chari, S. & Zhang, C., Jan 1 2016, Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016. Ak, R., Karypis, G., Xia, Y., Hu, X. T., Yu, P. S., Joshi, J., Ungar, L., Liu, L., Sato, A-H., Suzumura, T., Rachuri, S., Govindaraju, R. & Xu, W. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1090-1099 10 p. 7840712. (Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scanning
Websites
Malware
Testing
Industry
6 Citations (Scopus)

Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process

Zhong, C., Yen, J., Liu, P. & Erbacher, R. F., Jun 30 2016, Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016. Qiu, M. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 357-363 7 p. 7502316. (Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Experiments
Analysts
Cognitive processes
Automata
11 Citations (Scopus)

Call me back! Attacks on system server and system apps in Android through synchronous callback

Wang, K., Zhang, Y. & Liu, P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 92-103 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Computer systems
Servers
Static analysis
Viruses
11 Citations (Scopus)

CREDAL: Towards locating a memory corruption vulnerability with your core dump

Xu, J., Mu, D., Chen, P., Xing, X., Wang, P. & Liu, P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 529-540 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Computer debugging

Demo: A symbolic N-variant system

Xu, J., Guo, P., Chen, B., Erbacher, R. F., Chen, P. & Liu, P., Oct 24 2016, MTD 2016 - Proceedings of the 2016 ACM Workshop on Moving Target Defense, co-located with CCS 2016. Association for Computing Machinery, Inc, p. 65-68 4 p. (MTD 2016 - Proceedings of the 2016 ACM Workshop on Moving Target Defense, co-located with CCS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Processing
9 Citations (Scopus)

Deviation-based obfuscation-resilient program equivalence checking with application to software plagiarism detection

Ming, J., Zhang, F., Wu, D., Liu, P. & Zhu, S., Dec 2016, In : IEEE Transactions on Reliability. 65, 4, p. 1647-1664 18 p., 7490384.

Research output: Contribution to journalArticle

Semantics
Copying
Industry
Experiments
5 Citations (Scopus)

Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing

Chen, K., Zhang, Y. & Liu, P., Sep 2016, In : IEEE Transactions on Reliability. 65, 3, p. 1180-1194 15 p., 7386711.

Research output: Contribution to journalArticle

Data storage equipment
Black-box testing
Binary codes
Testing
3 Citations (Scopus)

Empirical analysis and modeling of black-box mutational fuzzing

Zhao, M. & Liu, P., Jan 1 2016, Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, Proceedings. Bodden, E., Caballero, J. & Athanasopoulos, E. (eds.). Springer Verlag, p. 173-189 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9639).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Empirical Analysis
Black Box
Vulnerability
Stochastic models
Modeling
13 Citations (Scopus)

Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods

Jiang, Y., Zhang, C., Wu, D. & Liu, P., Mar 1 2016, Proceedings - 17th IEEE International Symposium on High Assurance Systems Engineering, HASE 2016. Babiceanu, R., Waeselynck, H., Xu, J., Paul, R. A. & Cukic, B. (eds.). IEEE Computer Society, p. 122-131 10 p. 7423143. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering; vol. 2016-March).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software engineering
Creep
7 Citations (Scopus)

From physical to cyber: Escalating protection for personalized auto insurance

Guan, L., Xu, J., Wang, S., Xing, X., Lin, L., Huang, H., Liu, P. & Lee, W., Nov 14 2016, Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016. Association for Computing Machinery, Inc, p. 42-55 14 p. (Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Insurance
Industry
Railroad cars
Hardware

ICruiser: Protecting Kernel Link-Based Data Structures with Secure Canary

Li, W., Wu, D. & Liu, P., Sep 21 2016, Proceedings - 2016 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2016. Institute of Electrical and Electronics Engineers Inc., p. 31-38 8 p. 7573721. (Proceedings - 2016 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data structures
Binary trees
Seed
18 Citations (Scopus)

JRed: Program Customization and Bloatware Mitigation Based on Static Analysis

Jiang, Y., Wu, D. & Liu, P., Aug 24 2016, Proceedings - 2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016. Claycomb, W., Milojicic, D., Liu, L., Matskin, M., Zhang, Z., Reisman, S., Sato, H., Zhang, Z. & Ahamed, S. I. (eds.). IEEE Computer Society, p. 12-21 10 p. 7551989. (Proceedings - International Computer Software and Applications Conference; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trimming
Static analysis
Soot
Software engineering
Data storage equipment
1 Citation (Scopus)

MTD 2016: Third ACM workshop on moving target defense

Liu, P. & Wang, C., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 1 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Industry
Secure communication
13 Citations (Scopus)

NFPS: Adding undetectable secure deletion to flash translation layer

Jia, S., Xia, L., Chen, B. & Liu, P., May 30 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 305-316 12 p. (ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ashes
Cryptography
3 Citations (Scopus)

Program-object level data flow analysis with applications to data leakage and contamination forensics

Xiao, G., Wang, J., Liu, P., Ming, J. & Wu, D., Mar 9 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 277-284 8 p. (CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data flow analysis
Contamination
Servers
Data flow graphs
Leakage (fluid)
7 Citations (Scopus)

Repackage-proofing android apps

Luo, L., Fu, Y., Wu, D., Zhu, S. & Liu, P., Sep 29 2016, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 550-561 12 p. 7579771. (Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Ecosystems
Android (operating system)
6 Citations (Scopus)

Sanitizing data is not enough! Towards sanitizing structural artifacts in flash media

Chen, B., Jia, S., Xia, L. & Liu, P., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, p. 496-507 12 p. (ACM International Conference Proceeding Series; vol. 5-9-December-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flash memory
Cryptography
6 Citations (Scopus)

Stay in your Cage! a sound sandbox for third-party libraries on android

Wang, F., Zhang, Y., Wang, K., Liu, P. & Wang, W., Jan 1 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Katsikas, S., Meadows, C., Askoxylakis, I. & Ioannidis, S. (eds.). Springer Verlag, p. 458-476 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cage
Acoustic waves
Sound
Libraries
Java
13 Citations (Scopus)

StraightTaint: Decoupled offline symbolic taint analysis

Ming, J., Wu, D., Wang, J., Xiao, G. & Liu, P., Aug 25 2016, ASE 2016 - Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering. Khurshid, S., Lo, D. & Apel, S. (eds.). Association for Computing Machinery, Inc, p. 308-319 12 p. (ASE 2016 - Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic analysis
Computer forensics
Reverse engineering
Program processors
Communication

Towards service continuity for transactional applications via diverse device drivers

Zhang, S., Jia, X. & Liu, P., Jan 1 2016, In : International Journal of Information and Computer Security. 8, 4, p. 382-400 19 p.

Research output: Contribution to journalArticle

Response time (computer systems)
Computer operating systems
Program processors
Data storage equipment
Virtualization
2015
30 Citations (Scopus)

An empirical study of web vulnerability discovery ecosystems

Zhao, M., Grossklags, J. & Liu, P., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1105-1117 13 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Trajectories
Industry
2 Citations (Scopus)

An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes

Zhong, C., Yen, J., Liu, P., Erbacher, R., Etoty, R. & Garneau, C., Apr 21 2015, Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015. Association for Computing Machinery, 2746203. (ACM International Conference Proceeding Series; vol. 21-22-April-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trace analysis
Experiments
Students
Uncertainty
10 Citations (Scopus)

A practical approach for adaptive data structure layout randomization

Chen, P., Xu, J., Lin, Z., Xu, D., Mao, B. & Liu, P., Jan 1 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Ryan, P. Y. A., Pernul, G. & Weippl, E. (eds.). Springer Verlag, p. 69-89 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Randomisation
Data structures
Layout
Data Structures
Countermeasures
5 Citations (Scopus)

A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract)

Jiang, Y., Zhang, C., Wu, D. & Liu, P., Nov 6 2015, Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015. Institute of Electrical and Electronics Engineers Inc., p. 184-185 2 p. 7322142. (Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data flow analysis
Computer programming
Computer programming languages
Software engineering
Creep
10 Citations (Scopus)

ARSCA: A computer tool for tracing the cognitive processes of cyber-attack analysis

Zhong, C., Yen, J., Liu, P., Erbacher, R., Etoty, R. & Garneau, C., May 14 2015, 2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision, CogSIMA 2015. Institute of Electrical and Electronics Engineers Inc., p. 165-171 7 p. 7108193. (2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision, CogSIMA 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Time and motion study
Tracing
Shielding
Attack
Students
7 Citations (Scopus)

A study of decision process in MCDM problems with large number of criteria

Liu, J., Liu, P., Liu, S. F., Zhou, X. Z. & Zhang, T., Mar 1 2015, In : International Transactions in Operational Research. 22, 2, p. 237-264 28 p.

Research output: Contribution to journalArticle

Decision making
Multiple criteria decision making
Decision process
Tolerance
Prospect theory
3 Citations (Scopus)

Cyber insider mission detection for situation awareness

Du, H., Wang, C., Zhang, T., Yang, S. J., Choi, J. & Liu, P., 2015, In : Studies in Computational Intelligence. 563, p. 201-217 17 p.

Research output: Contribution to journalArticle

Software agents
Fuzzy rules
Electric fuses
Hidden Markov models
Learning systems
2 Citations (Scopus)

Discover and tame long-running idling processes in enterprise systems

Wang, J., Qian, Z., Li, Z., Wu, Z., Rhee, J., Ning, X., Liu, P. & Jiang, G., Apr 14 2015, ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc, p. 543-554 12 p. (ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Autocorrelation
Industry
Feedback
7 Citations (Scopus)

Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation

Zeng, Q., Zhao, M., Liu, P., Yadav, P., Calo, S. & Lobo, J., Apr 1 2015, In : IEEE Transactions on Knowledge and Data Engineering. 27, 4, p. 979-992 14 p., 6895252.

Research output: Contribution to journalArticle

Query processing
Communication
Access control
Costs
Planning
94 Citations (Scopus)

Finding unknown malice in 10 seconds: Mass vetting for new threats at the Google-play scale

Chen, K., Wang, P., Lee, Y., Wang, X. F., Zhang, N., Huang, H., Zou, W. & Liu, P., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 659-674 16 p. (Proceedings of the 24th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Flow graphs
Engines
30 Citations (Scopus)

From system services freezing to system server shutdown in android: All you need is a loop in an app

Huang, H., Zhu, S., Chen, K. & Liu, P., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1236-1247 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Freezing
Servers
Concurrency control
Application programming interfaces (API)
Smartphones
10 Citations (Scopus)

HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows

Zeng, Q., Zhao, M. & Liu, P., Sep 14 2015, Proceedings - 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015. IEEE Computer Society, p. 485-496 12 p. 7266875. (Proceedings of the International Conference on Dependable Systems and Networks; vol. 2015-September).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
Availability
Hardware
Data storage equipment
5 Citations (Scopus)

How your phone camera can be used to stealthily spy on you: Transplantation attacks against android camera service

Zhang, Z., Liu, P., Xiang, J., Jing, J. & Lei, L., Mar 2 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 99-110 12 p. (CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Cameras
Application programs
Transplantation (surgical)
Transplants
1 Citation (Scopus)

Inferring the stealthy bridges between enterprise network islands in cloud using cross-layer bayesian networks

Sun, X., Dai, J., Singhal, A. & Liu, P., Jan 1 2015, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. Springer Verlag, p. 3-23 21 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 152).

Research output: Chapter in Book/Report/Conference proceedingChapter

Bayesian networks
Industry
Experiments
Virtual machine
5 Citations (Scopus)

Private Browsing Mode Not Really That Private: Dealing with Privacy Breach Caused by Browser Extensions

Zhao, B. & Liu, P., Sep 14 2015, Proceedings - 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015. IEEE Computer Society, Vol. 2015-September. p. 184-195 12 p. 7266849

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
Dynamic analysis
12 Citations (Scopus)

Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection

Jhi, Y. C., Jia, X., Wang, X., Zhu, S., Liu, P. & Wu, D., Sep 1 2015, In : IEEE Transactions on Software Engineering. 41, 9, p. 925-943 19 p., 7076635.

Research output: Contribution to journalArticle

Semantics
8 Citations (Scopus)

Replacement attacks: Automatically impeding behavior-based malware specifications

Ming, J., Xin, Z., Lan, P., Wu, D., Liu, P. & Mao, B., Jan 1 2015, Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, Revised Selected Papers. Malkin, T., Lewko, A. B., Kolesnikov, V. & Polychronakis, M. (eds.). Springer Verlag, p. 497-517 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9092).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Replacement
Attack
Specification
Specifications
11 Citations (Scopus)

Risk Assessment of Buffer 'Heartbleed' Over-Read Vulnerabilities

Wang, J., Zhao, M., Zeng, Q., Wu, D. & Liu, P., Sep 14 2015, Proceedings - 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015. IEEE Computer Society, p. 555-562 8 p. 7266882. (Proceedings of the International Conference on Dependable Systems and Networks; vol. 2015-September).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk assessment
23 Citations (Scopus)

TaintPipe: Pipelined symbolic taint analysis

Ming, J., Wu, D., Xiao, G., Wang, J. & Liu, P., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 65-80 16 p. (Proceedings of the 24th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Flow control
Dynamic analysis
Pipelines
Concretes
12 Citations (Scopus)

Towards analyzing the input validation vulnerabilities associated with android system services

Cao, C., Gao, N., Liu, P. & Xiang, J., Dec 7 2015, Proceedings - 31st Annual Computer Security Applications Conference, ACSAC 2015. Association for Computing Machinery, p. 361-370 10 p. (ACM International Conference Proceeding Series; vol. 7-11-December-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Towards collaborative query planning in multi-party database networks

Zhao, M., Liu, P. & Lobo, J., Jan 1 2015, Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Proceedings. Samarati, P. (ed.). Springer Verlag, p. 19-34 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9149).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Planning
Query
Distributed Databases
Disclosure
Confidentiality
40 Citations (Scopus)

Towards discovering and understanding task hijacking in android

Ren, C., Zhang, Y., Xue, H., Wei, T. & Liu, P., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 945-959 15 p. (Proceedings of the 24th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multitasking
Application programs
Defects
Monitoring
Android (operating system)
1 Citation (Scopus)

Uncovering the dilemmas on antivirus software design in modern mobile platforms

Huang, H., Chen, K., Liu, P., Zhu, S. & Wu, D., Jan 1 2015, International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Srivatsa, M., Tian, J. & Jing, J. (eds.). Springer Verlag, p. 359-366 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 153).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software design
Detectors
Scanning
Malware
Mobile devices