Seguir
Debin Gao
Debin Gao
Dirección de correo verificada de smu.edu.sg - Página principal
Título
Citado por
Citado por
Año
Binhunt: Automatically finding semantic differences in binary programs
D Gao, MK Reiter, D Song
Information and Communications Security: 10th International Conference …, 2008
3492008
Gray-box extraction of execution graphs for anomaly detection
D Gao, MK Reiter, D Song
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2152004
On gray-box program tracking for anomaly detection
D Gao, MK Reiter, D Song
Carnegie Mellon University, 2004
1502004
On challenges in evaluating malware clustering
P Li, L Liu, D Gao, MK Reiter
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
1472010
Behavioral distance measurement using hidden markov models
D Gao, MK Reiter, D Song
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
1372006
Behavioral distance for intrusion detection
D Gao, MK Reiter, D Song
Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006
1362006
iBinHunt: Binary hunting with inter-procedural control flow
J Ming, M Pan, D Gao
International Conference on Information Security and Cryptology, 92-109, 2012
1342012
I can be you: Questioning the use of keystroke dynamics as biometrics
CM Tey, P Gupta, D Gao
1052013
Linear obfuscation to combat symbolic execution
Z Wang, J Ming, C Jia, D Gao
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
982011
Mitigating access-driven timing channels in clouds using StopWatch
P Li, D Gao, MK Reiter
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
752013
Comparing mobile privacy protection through cross-platform applications
J Han, Q Yan, D Gao, J Zhou, RH Deng
Internet Society, 2013
672013
Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance
D Gao, MK Reiter, D Song
IEEE Transactions on Dependable and Secure Computing 6 (2), 96-110, 2008
582008
Stopwatch: a cloud architecture for timing channel mitigation
P Li, D Gao, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 17 (2), 1-28, 2014
562014
Ropsteg: program steganography with return oriented programming
K Lu, S Xiong, D Gao
Proceedings of the 4th ACM conference on Data and application security and …, 2014
502014
Launching return-oriented programming attacks against randomized relocatable executables
L Liu, J Han, D Gao, J Jing, D Zha
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
472011
Mobipot: Understanding mobile telephony threats with honeycards
M Balduzzi, P Gupta, L Gu, D Gao, M Ahamad
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
412016
Launching generic attacks on ios with approved third-party applications
J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou
Applied Cryptography and Network Security: 11th International Conference …, 2013
352013
On the effectiveness of software diversity: A systematic study on real-world vulnerabilities
J Han, D Gao, RH Deng
International Conference on Detection of Intrusions and Malware, and …, 2009
352009
On the effectiveness of software diversity: A systematic study on real-world vulnerabilities
J Han, D Gao, RH Deng
International Conference on Detection of Intrusions and Malware, and …, 2009
352009
Software watermarking using return-oriented programming
H Ma, K Lu, X Ma, H Zhang, C Jia, D Gao
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
332015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20