Pscout: analyzing the android permission specification KWY Au, YF Zhou, Z Huang, D Lie Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 1085 | 2012 |
Short paper: a look at smartphone permission models KWY Au, YF Zhou, Z Huang, P Gill, D Lie Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 108 | 2011 |
Using Safety Properties to Generate Vulnerability Patches Z Huang, D Lie, G Tan, T Jaeger Proceedings of the 40th IEEE Symposium on Security and Privacy (SP), 2019 | 102 | 2019 |
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response Z Huang, M DAngelo, D Miyani, D Lie Proceedings of the 37th IEEE Symposium on Security and Privacy (SP), 618-635, 2016 | 65 | 2016 |
BinPro: A Tool for Binary Source Code Provenance D Miyani, Z Huang, D Lie arXiv preprint arXiv:1711.00830, 2017 | 20 | 2017 |
LMP: light-weighted memory protection with hardware assistance W Huang, Z Huang, D Miyani, D Lie Proceedings of the 32nd Annual Computer Security Applications Conference …, 2016 | 17 | 2016 |
Fine-grained Program Partitioning for Security Z Huang, T Jaeger, G Tan Proceedings of the 14th European Workshop on Systems Security, 21-26, 2021 | 13 | 2021 |
Detecting Software Vulnerabilities Using Neural Networks A Aumpansub, Z Huang Proceedings of the 13th International Conference on Machine Learning and …, 2021 | 12 | 2021 |
Integer Overflow Detection with Delayed Runtime Test Z Huang, X Yu Proceedings of the 16th International Conference on Availability …, 2021 | 11 | 2021 |
Rapid Vulnerability Mitigation with Security Workarounds Z Huang, G Tan Proceedings of the 2nd NDSS Workshop on Binary Analysis Research, 2019 | 11 | 2019 |
Ocasta: Clustering Configuration Settings for Error Recovery Z Huang, D Lie Proceedings of the 44th Annual IEEE/IFIP International Conference on …, 2014 | 11 | 2014 |
Automatically Identifying Configuration Files Z Huang University of Toronto, 2009 | 11* | 2009 |
Learning-based Vulnerability Detection in Binary Code A Aumpansub, Z Huang Proceedings of the 14th International Conference on Machine Learning and …, 2022 | 9 | 2022 |
Pearl-TEE: supporting untrusted applications in trustzone W Huang, V Rudchenko, H Shuang, Z Huang, D Lie Proceedings of the 3rd Workshop on System Software for Trusted Execution, 8-13, 2018 | 6 | 2018 |
Semantic-Aware Vulnerability Detection Z Huang, M White Proceedings of 2022 IEEE International Conference on Cyber Security and …, 2022 | 5 | 2022 |
Multiclass Classification of Software Vulnerabilities with Deep Learning C Contreras, H Dokic, Z Huang, D Stan Raicu, J Furst, T Roselyne Proceedings of the 15th International Conference on Machine Learning and …, 2023 | 2 | 2023 |
Runtime Recovery for Integer Overflows Z Huang Proceedings of the 6th International Conference on System Reliability and …, 2022 | 2 | 2022 |
Mitigating Vulnerabilities in Closed Source Software Z Huang, G Tan, X Yu EAI Endorsed Transactions on Security and Safety 8 (30), 2022 | 1 | 2022 |
Fixing Software Vulnerabilities and Configuration Errors Z Huang University of Toronto, 2018 | 1 | 2018 |
Vulnerability Detection in C/C++ Code with Deep Learning Z Huang, A Aumpansub arXiv preprint arXiv:2405.12384, 2024 | | 2024 |