Full Name
LIANG ZHENKAI
Variants
Liang, Z.
 
Main Affiliation
 
 
Email
dcslzk@nus.edu.sg
 

Publications

Results 1-20 of 24 (Search time: 0.005 seconds).

Issue DateTitleAuthor(s)
12013A comprehensive client-side behavior model for diagnosing attacks in Ajax applicationsDong, X.; Patil, K.; Mao, J.; Liang, Z. 
22012A framework to eliminate backdoors from response-computable authenticationDai, S.; Wei, T.; Zhang, C.; Wang, T.; Ding, Y.; Liang, Z. ; Zou, W.
32013A quantitative evaluation of privilege separation in web browser designsDong, X.; Hu, H.; Saxena, P.; Liang, Z. 
42013A software environment for confining malicious android applications via resource virtualizationLi, X.; Bai, G.; Liang, Z. ; Yin, H.
52011AdSentry: Comprehensive and flexible confinement of JavaScript-based advertisementsDong, X.; Tran, M.; Liang, Z. ; Jiang, X.
62009Alcatraz: An isolated environment for experimenting with untrusted softwareLiang, Z. ; Sun, W.; Venkatakrishnan, V.N.; Sekar, R.
72012An empirical study of dangerous behaviors in firefox extensionsWang, J.; Li, X.; Liu, X.; Dong, X.; Wang, J.; Liang, Z. ; Feng, Z.
82013BaitAlarm: Detecting phishing sites using similarity in fundamental visual featuresMao, J.; Li, P.; Li, K.; Wei, T.; Liang, Z. 
92012Codejail: Application-transparent isolation of libraries with tight program interactionsWu, Y.; Sathyanarayan, S.; Yap, R.H.C. ; Liang, Z. 
102009DARWIN: An approach for debugging evolving programsQi, D.; Roychoudhury, A. ; Liang, Z. ; Vaswani, K.
112012DARWIN: An approach to debugging evolving programsQi, D.; Roychoudhury, A. ; Liang, Z. 
122012Detecting and preventing ActiveX API-misuse vulnerabilities in internet explorerDai, T.; Sathyanarayan, S.; Yap, R.H.C. ; Liang, Z. 
132013Enforcing system-wide control flow integrity for exploit detection and diagnosisPrakash, A.; Yin, H.; Liang, Z. 
142010Golden implementation driven software debuggingBanerjee, A. ; Roychoudhury, A. ; Harlie, J.A. ; Liang, Z. 
152010Heap Taichi: Exploiting memory allocation granularity in heap-spraying attacksDing, Y.; Wei, T.; Wang, T.; Liang, Z. ; Zou, W.
162011Jump-oriented programming: A new class of code-reuse attackBletsch, T.; Jiang, X.; Freeh, V.W.; Liang, Z. 
172013Poster - CryptServer: strong data protection in commodity LAMP serversChen, Z.; Dong, X.; Saxena, P.; Liang, Z. 
182013Protecting sensitive web content from client-side vulnerabilities with CRYPTONSDong, X.; Chen, Z.; Siadati, H.; Tople, S.; Saxena, P.; Liang, Z. 
192010Test generation to expose changes in evolving programsQi, D.; Roychoudhury, A. ; Liang, Z. 
202011Towards fine-grained access control in JavaScript contextsPatil, K.; Dong, X.; Li, X.; Liang, Z. ; Jiang, X.