Follow
Zhen Huang
Zhen Huang
Assistant Professor, School of Computing, DePaul University
Verified email at depaul.edu - Homepage
Title
Cited by
Cited by
Year
Pscout: analyzing the android permission specification
KWY Au, YF Zhou, Z Huang, D Lie
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
10852012
Short paper: a look at smartphone permission models
KWY Au, YF Zhou, Z Huang, P Gill, D Lie
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
1082011
Using Safety Properties to Generate Vulnerability Patches
Z Huang, D Lie, G Tan, T Jaeger
Proceedings of the 40th IEEE Symposium on Security and Privacy (SP), 2019
1022019
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response
Z Huang, M DAngelo, D Miyani, D Lie
Proceedings of the 37th IEEE Symposium on Security and Privacy (SP), 618-635, 2016
652016
BinPro: A Tool for Binary Source Code Provenance
D Miyani, Z Huang, D Lie
arXiv preprint arXiv:1711.00830, 2017
202017
LMP: light-weighted memory protection with hardware assistance
W Huang, Z Huang, D Miyani, D Lie
Proceedings of the 32nd Annual Computer Security Applications Conference …, 2016
172016
Fine-grained Program Partitioning for Security
Z Huang, T Jaeger, G Tan
Proceedings of the 14th European Workshop on Systems Security, 21-26, 2021
132021
Detecting Software Vulnerabilities Using Neural Networks
A Aumpansub, Z Huang
Proceedings of the 13th International Conference on Machine Learning and …, 2021
122021
Integer Overflow Detection with Delayed Runtime Test
Z Huang, X Yu
Proceedings of the 16th International Conference on Availability …, 2021
112021
Rapid Vulnerability Mitigation with Security Workarounds
Z Huang, G Tan
Proceedings of the 2nd NDSS Workshop on Binary Analysis Research, 2019
112019
Ocasta: Clustering Configuration Settings for Error Recovery
Z Huang, D Lie
Proceedings of the 44th Annual IEEE/IFIP International Conference on …, 2014
112014
Automatically Identifying Configuration Files
Z Huang
University of Toronto, 2009
11*2009
Learning-based Vulnerability Detection in Binary Code
A Aumpansub, Z Huang
Proceedings of the 14th International Conference on Machine Learning and …, 2022
92022
Pearl-TEE: supporting untrusted applications in trustzone
W Huang, V Rudchenko, H Shuang, Z Huang, D Lie
Proceedings of the 3rd Workshop on System Software for Trusted Execution, 8-13, 2018
62018
Semantic-Aware Vulnerability Detection
Z Huang, M White
Proceedings of 2022 IEEE International Conference on Cyber Security and …, 2022
52022
Multiclass Classification of Software Vulnerabilities with Deep Learning
C Contreras, H Dokic, Z Huang, D Stan Raicu, J Furst, T Roselyne
Proceedings of the 15th International Conference on Machine Learning and …, 2023
22023
Runtime Recovery for Integer Overflows
Z Huang
Proceedings of the 6th International Conference on System Reliability and …, 2022
22022
Mitigating Vulnerabilities in Closed Source Software
Z Huang, G Tan, X Yu
EAI Endorsed Transactions on Security and Safety 8 (30), 2022
12022
Fixing Software Vulnerabilities and Configuration Errors
Z Huang
University of Toronto, 2018
12018
Vulnerability Detection in C/C++ Code with Deep Learning
Z Huang, A Aumpansub
arXiv preprint arXiv:2405.12384, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20