Browsing by Author LIANG ZHENKAI

Select a letter below to browse by last name or type
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


Showing results 1 to 20 of 24  next >
Issue DateTitleAuthor(s)
2013A comprehensive client-side behavior model for diagnosing attacks in Ajax applicationsDong, X.; Patil, K.; Mao, J.; Liang, Z. 
2012A framework to eliminate backdoors from response-computable authenticationDai, S.; Wei, T.; Zhang, C.; Wang, T.; Ding, Y.; Liang, Z. ; Zou, W.
2013A quantitative evaluation of privilege separation in web browser designsDong, X.; Hu, H.; Saxena, P.; Liang, Z. 
2013A software environment for confining malicious android applications via resource virtualizationLi, X.; Bai, G.; Liang, Z. ; Yin, H.
2011AdSentry: Comprehensive and flexible confinement of JavaScript-based advertisementsDong, X.; Tran, M.; Liang, Z. ; Jiang, X.
2009Alcatraz: An isolated environment for experimenting with untrusted softwareLiang, Z. ; Sun, W.; Venkatakrishnan, V.N.; Sekar, R.
2012An empirical study of dangerous behaviors in firefox extensionsWang, J.; Li, X.; Liu, X.; Dong, X.; Wang, J.; Liang, Z. ; Feng, Z.
2013BaitAlarm: Detecting phishing sites using similarity in fundamental visual featuresMao, J.; Li, P.; Li, K.; Wei, T.; Liang, Z. 
2012Codejail: Application-transparent isolation of libraries with tight program interactionsWu, Y.; Sathyanarayan, S.; Yap, R.H.C. ; Liang, Z. 
2009DARWIN: An approach for debugging evolving programsQi, D.; Roychoudhury, A. ; Liang, Z. ; Vaswani, K.
2012DARWIN: An approach to debugging evolving programsQi, D.; Roychoudhury, A. ; Liang, Z. 
2012Detecting and preventing ActiveX API-misuse vulnerabilities in internet explorerDai, T.; Sathyanarayan, S.; Yap, R.H.C. ; Liang, Z. 
2013Enforcing system-wide control flow integrity for exploit detection and diagnosisPrakash, A.; Yin, H.; Liang, Z. 
2010Golden implementation driven software debuggingBanerjee, A. ; Roychoudhury, A. ; Harlie, J.A. ; Liang, Z. 
2010Heap Taichi: Exploiting memory allocation granularity in heap-spraying attacksDing, Y.; Wei, T.; Wang, T.; Liang, Z. ; Zou, W.
2011Jump-oriented programming: A new class of code-reuse attackBletsch, T.; Jiang, X.; Freeh, V.W.; Liang, Z. 
2013Poster - CryptServer: strong data protection in commodity LAMP serversChen, Z.; Dong, X.; Saxena, P.; Liang, Z. 
2013Protecting sensitive web content from client-side vulnerabilities with CRYPTONSDong, X.; Chen, Z.; Siadati, H.; Tople, S.; Saxena, P.; Liang, Z. 
2010Test generation to expose changes in evolving programsQi, D.; Roychoudhury, A. ; Liang, Z. 
2011Towards fine-grained access control in JavaScript contextsPatil, K.; Dong, X.; Li, X.; Liang, Z. ; Jiang, X.