Mingyi Zhao
Mingyi Zhao
Verified email at
Cited by
Cited by
Comparing different moving target defense techniques
J Xu, P Guo, M Zhao, RF Erbacher, M Zhu, P Liu
Proceedings of the First ACM Workshop on Moving Target Defense, 97-107, 2014
An empirical study of web vulnerability discovery ecosystems
M Zhao, J Grossklags, P Liu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs
T Maillart, M Zhao, J Grossklags, J Chuang
Journal of Cybersecurity 3 (2), 81-90, 2017
Devising effective policies for bug-bounty platforms and security vulnerability discovery
M Zhao, A Laszka, J Grossklags
Journal of Information Policy 7 (1), 372-418, 2017
Banishing misaligned incentives for validating reports in bug-bounty platforms
A Laszka, M Zhao, J Grossklags
European Symposium on Research in Computer Security, 161-178, 2016
An exploratory study of white hat behaviors in a web vulnerability disclosure program
M Zhao, J Grossklags, K Chen
Proceedings of the 2014 ACM workshop on security information workers, 51-58, 2014
Risk assessment of buffer" Heartbleed" over-read vulnerabilities
J Wang, M Zhao, Q Zeng, D Wu, P Liu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
The rules of engagement for bug bounty programs
A Laszka, M Zhao, A Malbari, J Grossklags
International Conference on Financial Cryptography and Data Security, 138-159, 2018
Heaptherapy: An efficient end-to-end solution against heap buffer overflows
Q Zeng, M Zhao, P Liu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
Enforcement of autonomous authorizations in collaborative distributed query evaluation
Q Zeng, M Zhao, P Liu, P Yadav, S Calo, J Lobo
IEEE Transactions on Knowledge and Data Engineering 27 (4), 979-992, 2014
Crowdsourced security vulnerability discovery: Modeling and organizing bug-bounty programs
M Zhao, A Laszka, T Maillart, J Grossklags
The HCOMP Workshop on Mathematical Foundations of Human Computation, Austin …, 2016
Empirical analysis and modeling of black-box mutational fuzzing
M Zhao, P Liu
International Symposium on Engineering Secure Software and Systems, 173-189, 2016
Towards collaborative query planning in multi-party database networks
M Zhao, P Liu, J Lobo
IFIP Annual Conference on Data and Applications Security and Privacy, 19-34, 2015
Modeling and checking the security of DIFC system configurations
M Zhao, P Liu
Automated Security Management, 21-38, 2013
Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration
M Zhao
Poster: Targeted therapy for program bugs
Q Zeng, M Zhao, P Liu
the 35th IEEE Symposium on Security and Privacy, 2014
Federating geovisual analytic tools for cyber security analysis
M Zhao, C Zhong, R Ciamaichelo, M Konek, N Sawant, NA Giacobe
2012 IEEE Conference on Visual Analytics Science and Technology (VAST), 303-304, 2012
Towards Agile Cyber Analysis: Leveraging Visualization as Functions in Collaborative Visual Analytics
C Zhong, M Zhao, G Xiao, J Xu
Proceedings of IEEE Symposium on Visual Analytics Science and Technology, 2013
Secure Zero-Day Detection: Wiping Off the VEP Trade-Off
M Zhao, M Yung
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race …, 2019
Given Enough Eyeballs, All Bugs Are Shallow?
T Maillart, M Zhao, J Grossklags, J Chuang
The system can't perform the operation now. Try again later.
Articles 1–20