Jiang Ming
Title
Cited by
Cited by
Year
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection
L Luo, J Ming, D Wu, P Liu, S Zhu
22nd ACM SIGSOFT International Symposium on the Foundations of Software …, 2014
1532014
iBinHunt: Binary Hunting with Inter-Procedural Control Flow
J Ming, M Pan, D Gao
15th Annual International Conference on Information Security and Cryptology …, 2012
822012
Linear Obfuscation to Combat Symbolic Execution
Z Wang, J Ming, C Jia, D Gao
16th European Symposium on Research in Computer Security (ESORICS’11), 2011
692011
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
J Ming, D Xu, L Wang, D Wu
22nd ACM Conference on Computer and Communications Security (CCS'15), 2015
592015
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping
D Xu, J Ming, D Wu
38th IEEE Symposium on Security and Privacy (S&P'17), 2017
512017
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
492017
TaintPipe: Pipelined Symbolic Taint Analysis
J Ming, DinghaoWu, G Xiao, J Wang, P Liu
24th USENIX Security Symposium (USENIX Security’15), 2015
492015
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
J Ming, D Xu, Y Jiang, D Wu
26th USENIX Security Symposium (USENIX Security’17)., 2017
452017
BIM Server Requirements to Support the Energy Efficient Building Lifecycle
Y Jiang, J Ming, D Wu, J Yen, P Mitra, JI Messner, R Leicht
2012 ASCE International Conference on Computing in Civil Engineering, 2012
372012
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
D Xu, J Ming, D Wu
19th Information Security Conference (ISC'16), 2016
352016
StraightTaint: Decoupled Offline Symbolic Taint Analysis
J Ming, D Wu, J Wang, G Xiao, P Liu
31st IEEE/ACM International Conference on Automated Software Engineering …, 2016
312016
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference
J Ming, D Xu, D Wu
30th IFIP TC-11 SEC International Information Security and Privacy …, 2015
282015
Impeding Behavior-based Malware Analysis via Replacement Attacks to Malware Specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
Journal of Computer Virology and Hacking Techniques, 2016
262016
Deviation-Based Obfuscation-Resilient Program Equivalence Checking with Application to Software Plagiarism Detection
J Ming, F Zhang, D Wu, P Liu, S Zhu
IEEE Transactions on Reliability 65 (4), 2016
262016
Translingual Obfuscation
P Wang, S Wang, J Ming, Y Jiang, D Wu.
1st IEEE European Symposium on Security and Privacy (Euro S&P'16), 2016
232016
VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification
D Xu, J Ming, Y Fu, D Wu
25th ACM Conference on Computer and Communications Security (CCS'18), 2018
222018
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost
B Cheng*, J Ming*, J Fu, G Peng, T Chen, X Zhang, JY Marion
25th ACM Conference on Computer and Communications Security (CCS'18)., 2018
212018
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
13th International Conference on Applied Cryptography and Network Security …, 2015
142015
Automatic Building Information Model Query Generation
Y Jiang, N Yu, J Ming, S Lee, J DeGraw, J Yen, JI Messner, D Wu
Journal of Information Technology in Construction (ITCon) 20, 518-535, 2015
142015
Denial-of-Service Attacks on Host-Based Generic Unpackers
L Liu, J Ming, Z Wang, D Gao, C Jia
11th International Conference on Information and Communications Security …, 2009
112009
The system can't perform the operation now. Try again later.
Articles 1–20