Obfuscation resilient binary code reuse through trace-oriented programming J Zeng, Y Fu, KA Miller, Z Lin, X Zhang, D Xu Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 93 | 2013 |
Cpu transparent protection of os kernel and hypervisor integrity with programmable dram Z Liu, JH Lee, J Zeng, Y Wen, Z Lin, W Shi Proceedings of the 40th Annual International Symposium on Computer …, 2013 | 52 | 2013 |
HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management. Y Fu, J Zeng, Z Lin Proceedings of the 2014 USENIX conference on USENIX Annual Technical …, 2014 | 50 | 2014 |
Pemu: A pin highly compatible out-of-vm dynamic binary instrumentation framework J Zeng, Y Fu, Z Lin Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on …, 2015 | 45 | 2015 |
Improved index compression techniques for versioned document collections J He, J Zeng, T Suel Proceedings of the 19th ACM international conference on Information and …, 2010 | 34 | 2010 |
Android malware development on public malware scanning platforms: A large-scale data-driven study H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, S Chari, C Zhang 2016 IEEE International Conference on Big Data, 1090-1099, 2016 | 28 | 2016 |
Towards automatic inference of kernel object semantics from binary code J Zeng, Z Lin Proceedings of the 18th International Symposium on Research in Attacks …, 2015 | 18 | 2015 |
A Large-scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, I Molloy, S Chari, ... 2018 IEEE Transactions on Big Data, 2018 | 14 | 2018 |
Automatic uncovering of tap points from kernel executions J Zeng, Y Fu, Z Lin Proceedings of the 19th International Symposium on Research in Attacks …, 2016 | 9 | 2016 |
Method and system for autonomous malware analysis Z Zhan, J Zeng, J Su US Patent 11,531,748, 2022 | 6 | 2022 |
Phantom Attack: Evading System Call Monitoring X Guo, J Zeng Defcon 29, 2021 | | 2021 |
System and method for monitoring file integrity of multiple containers using one agent J Zeng, Z Zhan, Y Chen, J Su US Patent 10,949,532, 2021 | | 2021 |
Screenshot based tui process for in-app purchase authentication Y Lu, J Zeng, P Peng US Patent US20200081615A1, 2020 | | 2020 |
PEMU J Zeng, Y Fu, Z Lin Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on …, 2015 | | 2015 |
Binary code reuse: a dynamic analysis based approach J Zeng The University of Texas at Dallas, 2015 | | 2015 |