Folgen
Junyuan Zeng
Junyuan Zeng
Zugehörigkeit unbekannt
Keine bestätigte E-Mail-Adresse
Titel
Zitiert von
Zitiert von
Jahr
Obfuscation resilient binary code reuse through trace-oriented programming
J Zeng, Y Fu, KA Miller, Z Lin, X Zhang, D Xu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
872013
HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management.
Y Fu, J Zeng, Z Lin
Proceedings of the 2014 USENIX conference on USENIX Annual Technical …, 2014
502014
Cpu transparent protection of os kernel and hypervisor integrity with programmable dram
Z Liu, JH Lee, J Zeng, Y Wen, Z Lin, W Shi
Proceedings of the 40th Annual International Symposium on Computer …, 2013
502013
Pemu: A pin highly compatible out-of-vm dynamic binary instrumentation framework
J Zeng, Y Fu, Z Lin
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on …, 2015
432015
Improved index compression techniques for versioned document collections
J He, J Zeng, T Suel
Proceedings of the 19th ACM international conference on Information and …, 2010
342010
Android malware development on public malware scanning platforms: A large-scale data-driven study
H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, S Chari, C Zhang
2016 IEEE International Conference on Big Data, 1090-1099, 2016
272016
Towards automatic inference of kernel object semantics from binary code
J Zeng, Z Lin
Proceedings of the 18th International Symposium on Research in Attacks …, 2015
182015
A Large-scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform
H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, I Molloy, S Chari, ...
2018 IEEE Transactions on Big Data, 2018
92018
Automatic uncovering of tap points from kernel executions
J Zeng, Y Fu, Z Lin
Proceedings of the 19th International Symposium on Research in Attacks …, 2016
92016
Method and system for autonomous malware analysis
Z Zhan, J Zeng, J Su
US Patent 11,531,748, 2022
62022
Binary code reuse: a dynamic analysis based approach
J Zeng
The University of Texas at Dallas, 2015
12015
Phantom Attack: Evading System Call Monitoring
X Guo, J Zeng
Defcon 29, 2021
2021
System and method for monitoring file integrity of multiple containers using one agent
J Zeng, Z Zhan, Y Chen, J Su
US Patent 10,949,532, 2021
2021
Screenshot based tui process for in-app purchase authentication
Y Lu, J Zeng, P Peng
US Patent US20200081615A1, 2020
2020
PEMU
J Zeng, Y Fu, Z Lin
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on …, 2015
2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–15