Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Muhui Jiang"'
Publikováno v:
International Journal of Software & Informatics; 2024, Vol. 14 Issue 3, p225-247, 23p
Autor:
Muhui Jiang, Qinming Dai, Wenlong Zhang, Rui Chang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren
Publikováno v:
IEEE Transactions on Software Engineering. 49:1683-1703
Publikováno v:
Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems.
Autor:
Qiang Liu, Cen Zhang, Lin Ma, Muhui Jiang, Yajin Zhou, Lei Wu, Wenbo Shen, Xiapu Luo, Yang Liu, Kui Ren
Publikováno v:
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE).
Publikováno v:
ISSTA
Android packers have been widely adopted by developers to protect apps from being plagiarized. Meanwhile, various unpacking tools unpack the apps through direct memory dumping. To defend against these off-the-shelf unpacking tools, packers start to a
Publikováno v:
CCS
Dynamic analysis based on the full-system emulator QEMU is widely used for various purposes.However, it is challenging to run firmware images of embedded devices in QEMU, especially the process to boot the Linux kernel (we call this process rehosting
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1da173fef87c979ade87b7530d2767ab
Publikováno v:
ISSTA
With the increasing popularity of embedded devices, ARM is becoming the dominant architecture for them. In the meanwhile, there is a pressing need to perform security assessments for these devices. Due to different types of peripherals, it is challen
Publikováno v:
COMPSAC (1)
CPU cache misses and branch mispredictions waste CPU cycles and affect program performance. Such software inefficiencies could be neither eliminated by existing compilers nor avoided by developers. In this paper, we propose a novel approach, named PE
Publikováno v:
SRDS
By hiding messages inside existing network protocols, anti-censorship tools could empower censored users to visit blocked websites. However, existing solutions generally suffer from two limitations. First, they usually need the support of ISP or the
Publikováno v:
ICWS
Distributed Denial of Service (DDoS) attacks are still among the most urgent threats to the modern Internet. Recently, application layer DDoS attacks against web servers are becoming popular, resulting in great revenue losses to victims. A systematic