Seguir
Zhen Huang
Zhen Huang
Assistant Professor, School of Computing, DePaul University
Dirección de correo verificada de depaul.edu - Página principal
Título
Citado por
Citado por
Año
Pscout: analyzing the android permission specification
KWY Au, YF Zhou, Z Huang, D Lie
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
10472012
Short paper: a look at smartphone permission models
KWY Au, YF Zhou, Z Huang, P Gill, D Lie
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
1082011
Using Safety Properties to Generate Vulnerability Patches
Z Huang, D Lie, G Tan, T Jaeger
Proceedings of the 40th IEEE Symposium on Security and Privacy (SP), 2019
772019
Talos: Neutralizing vulnerabilities with security workarounds for rapid response
Z Huang, M DAngelo, D Miyani, D Lie
Proceedings of the 37th IEEE Symposium on Security and Privacy (SP), 618-635, 2016
612016
Binpro: A tool for binary source code provenance
D Miyani, Z Huang, D Lie
arXiv preprint arXiv:1711.00830, 2017
172017
LMP: light-weighted memory protection with hardware assistance
W Huang, Z Huang, D Miyani, D Lie
Proceedings of the 32nd Annual Computer Security Applications Conference …, 2016
162016
Ocasta: Clustering configuration settings for error recovery
Z Huang, D Lie
Proceedings of the 44th Annual IEEE/IFIP International Conference on …, 2014
102014
Automatically identifying configuration files
Z Huang
University of Toronto, 2009
10*2009
Integer Overflow Detection with Delayed Runtime Test
Z Huang, X Yu
Proceedings of the 16th International Conference on Availability …, 2021
82021
Rapid Vulnerability Mitigation with Security Workarounds
Z Huang, G Tan
Proceedings of the 2nd NDSS Workshop on Binary Analysis Research, 2019
82019
Fine-grained Program Partitioning for Security
Z Huang, T Jaeger, G Tan
Proceedings of the 14th European Workshop on Systems Security, 21-26, 2021
72021
Detecting Software Vulnerabilities Using Neural Networks
A Aumpansub, Z Huang
Proceedings of the 13th International Conference on Machine Learning and …, 2021
72021
Learning-based Vulnerability Detection in Binary Code
A Aumpansub, Z Huang
Proceedings of the 14th International Conference on Machine Learning and …, 2022
42022
Semantic-Aware Vulnerability Detection
Z Huang, M White
Proceedings of 2022 IEEE International Conference on Cyber Security and …, 2022
32022
Pearl-TEE: supporting untrusted applications in trustzone
W Huang, V Rudchenko, H Shuang, Z Huang, D Lie
Proceedings of the 3rd Workshop on System Software for Trusted Execution, 8-13, 2018
32018
Multiclass Classification of Software Vulnerabilities with Deep Learning
C Contreras, H Dokic, Z Huang, D Stan Raicu, J Furst, T Roselyne
Proceedings of the 15th International Conference on Machine Learning and …, 2023
12023
Runtime Recovery for Integer Overflows
Z Huang
Proceedings of the 6th International Conference on System Reliability and …, 2022
12022
Fixing Software Vulnerabilities and Configuration Errors
Z Huang
University of Toronto, 2018
12018
Path-wise Vulnerability Mitigation
H Dokic, Z Huang
18th Workshop on Programming Languages and Analysis for Security, 2023
2023
Targeted Symbolic Execution for UAF Vulnerabilities
Z Huang
Proceedings of the 7th International Conference on System Reliability and Safety, 2023
2023
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20