Follow
Ping Chen
Ping Chen
Verified email at ist.psu.edu - Homepage
Title
Cited by
Cited by
Year
DROP: Detecting return-oriented programming malicious code
P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
2882009
JITDefender: A defense against JIT spraying attacks
P Chen, Y Fang, B Mao, L Xie
Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011
632011
Automatic construction of jump-oriented programming shellcode (on the x86)
P Chen, X Xing, B Mao, L Xie, X Shen, X Yin
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
622011
Postmortem Program Analysis with {Hardware-Enhanced}{Post-Crash} Artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017
522017
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
512016
System call redirection: A practical approach to meeting real-world virtual machine introspection needs
R Wu, P Chen, P Liu, B Mao
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
512014
A Practical Approach for Adaptive Data Structure Layout Randomization
PL Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao
ESORICS'15, 2015
50*2015
Efficient detection of the return-oriented programming malicious code
P Chen, X Xing, H Han, B Mao, L Xie
Information Systems Security: 6th International Conference, ICISS 2010 …, 2010
492010
Brick: A binary tool for run-time detecting and locating integer-based vulnerability
P Chen, Y Wang, Z Xin, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 208-215, 2009
472009
JITSafe: a framework against Just-in-time spraying attacks
P Chen, R Wu, B Mao
Information Security, IET 7 (4), 283 - 292, 2013
392013
IntFinder: Automatically detecting integer bugs in x86 binary program
P Chen, H Han, Y Wang, X Shen, X Yin, B Mao, L Xie
Information and Communications Security, 336-345, 2009
342009
Semantics-preserving reinforcement learning attack against graph neural networks for malware detection
L Zhang, P Liu, YH Choi, P Chen
IEEE Transactions on Dependable and Secure Computing 20 (2), 1390-1402, 2022
322022
Return-oriented rootkit without returns (on the x86)
P Chen, X Xing, B Mao, L Xie
Information and Communications Security: 12th International Conference …, 2010
282010
Dancing with wolves: Towards practical event-driven vmm monitoring
L Deng, P Liu, J Xu, P Chen, Q Zeng
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017
252017
RIM: A Method to Defend from JIT Spraying Attack
R Wu, P Chen, B Mao, L Xie
Availability, Reliability and Security (ARES), 143 - 148, 2012
212012
Traffic controller: A practical approach to block network covert timing channel
Y Wang, P Chen, Y Ge, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 349-354, 2009
182009
Method and apparatus for handling bugs
K Chen, J Tao, B Chen, P Chen
US Patent App. 14/568,738, 2015
132015
RandHyp: Preventing Attacks via Xen Hypercall Interface
F Wang, P Chen, B Mao, L Xie
SEC 2012, 138-149, 2012
122012
HARM: Hardware-assisted continuous re-randomization for microcontrollers
J Shi, L Guan, W Li, D Zhang, P Chen, N Zhang
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 520-536, 2022
112022
On convergence rates of game theoretic reinforcement learning algorithms
Z Hu, M Zhu, P Chen, P Liu
Automatica 104, 90-101, 2019
92019
The system can't perform the operation now. Try again later.
Articles 1–20