Pscout: analyzing the android permission specification KWY Au, YF Zhou, Z Huang, D Lie Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 1047 | 2012 |
Short paper: a look at smartphone permission models KWY Au, YF Zhou, Z Huang, P Gill, D Lie Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 108 | 2011 |
Using Safety Properties to Generate Vulnerability Patches Z Huang, D Lie, G Tan, T Jaeger Proceedings of the 40th IEEE Symposium on Security and Privacy (SP), 2019 | 77 | 2019 |
Talos: Neutralizing vulnerabilities with security workarounds for rapid response Z Huang, M DAngelo, D Miyani, D Lie Proceedings of the 37th IEEE Symposium on Security and Privacy (SP), 618-635, 2016 | 61 | 2016 |
Binpro: A tool for binary source code provenance D Miyani, Z Huang, D Lie arXiv preprint arXiv:1711.00830, 2017 | 17 | 2017 |
LMP: light-weighted memory protection with hardware assistance W Huang, Z Huang, D Miyani, D Lie Proceedings of the 32nd Annual Computer Security Applications Conference …, 2016 | 16 | 2016 |
Ocasta: Clustering configuration settings for error recovery Z Huang, D Lie Proceedings of the 44th Annual IEEE/IFIP International Conference on …, 2014 | 10 | 2014 |
Automatically identifying configuration files Z Huang University of Toronto, 2009 | 10* | 2009 |
Integer Overflow Detection with Delayed Runtime Test Z Huang, X Yu Proceedings of the 16th International Conference on Availability …, 2021 | 8 | 2021 |
Rapid Vulnerability Mitigation with Security Workarounds Z Huang, G Tan Proceedings of the 2nd NDSS Workshop on Binary Analysis Research, 2019 | 8 | 2019 |
Fine-grained Program Partitioning for Security Z Huang, T Jaeger, G Tan Proceedings of the 14th European Workshop on Systems Security, 21-26, 2021 | 7 | 2021 |
Detecting Software Vulnerabilities Using Neural Networks A Aumpansub, Z Huang Proceedings of the 13th International Conference on Machine Learning and …, 2021 | 7 | 2021 |
Learning-based Vulnerability Detection in Binary Code A Aumpansub, Z Huang Proceedings of the 14th International Conference on Machine Learning and …, 2022 | 4 | 2022 |
Semantic-Aware Vulnerability Detection Z Huang, M White Proceedings of 2022 IEEE International Conference on Cyber Security and …, 2022 | 3 | 2022 |
Pearl-TEE: supporting untrusted applications in trustzone W Huang, V Rudchenko, H Shuang, Z Huang, D Lie Proceedings of the 3rd Workshop on System Software for Trusted Execution, 8-13, 2018 | 3 | 2018 |
Multiclass Classification of Software Vulnerabilities with Deep Learning C Contreras, H Dokic, Z Huang, D Stan Raicu, J Furst, T Roselyne Proceedings of the 15th International Conference on Machine Learning and …, 2023 | 1 | 2023 |
Runtime Recovery for Integer Overflows Z Huang Proceedings of the 6th International Conference on System Reliability and …, 2022 | 1 | 2022 |
Fixing Software Vulnerabilities and Configuration Errors Z Huang University of Toronto, 2018 | 1 | 2018 |
Path-wise Vulnerability Mitigation H Dokic, Z Huang 18th Workshop on Programming Languages and Analysis for Security, 2023 | | 2023 |
Targeted Symbolic Execution for UAF Vulnerabilities Z Huang Proceedings of the 7th International Conference on System Reliability and Safety, 2023 | | 2023 |