Full Name
Zhenkai Liang
Variants
Liang, Z.
Liang Zhenkai
 
 
 
Email
dcslzk@nus.edu.sg
 

Publications

Results 1-20 of 30 (Search time: 0.006 seconds).

Issue DateTitleAuthor(s)
12013A comprehensive client-side behavior model for diagnosing attacks in Ajax applicationsDong, X.; Patil, K.; Mao, J.; Liang, Z. 
22012A framework to eliminate backdoors from response-computable authenticationDai, S.; Wei, T.; Zhang, C.; Wang, T.; Ding, Y.; Liang, Z. ; Zou, W.
32013A quantitative evaluation of privilege separation in web browser designsDong, X.; Hu, H.; Saxena, P.; Liang, Z. 
42013A software environment for confining malicious android applications via resource virtualizationLi, X.; Bai, G.; Liang, Z. ; Yin, H.
52011AdSentry: Comprehensive and flexible confinement of JavaScript-based advertisementsDong, X.; Tran, M.; Liang, Z. ; Jiang, X.
62009Alcatraz: An isolated environment for experimenting with untrusted softwareLiang, Z. ; Sun, W.; Venkatakrishnan, V.N.; Sekar, R.
72012An empirical study of dangerous behaviors in firefox extensionsWang, J.; Li, X.; Liu, X.; Dong, X.; Wang, J.; Liang, Z. ; Feng, Z.
82018Automated identification of sensitive data from implicit user specificationYang, Z. ; Liang, Z. 
92013BaitAlarm: Detecting phishing sites using similarity in fundamental visual featuresMao, J.; Li, P.; Li, K.; Wei, T.; Liang, Z. 
102012Codejail: Application-transparent isolation of libraries with tight program interactionsWu, Y.; Sathyanarayan, S.; Yap, R.H.C. ; Liang, Z. 
112009DARWIN: An approach for debugging evolving programsQi, D.; Roychoudhury, A. ; Liang, Z. ; Vaswani, K.
122012DARWIN: An approach to debugging evolving programsQi, D.; Roychoudhury, A. ; Liang, Z. 
132012Detecting and preventing ActiveX API-misuse vulnerabilities in internet explorerDai, T.; Sathyanarayan, S.; Yap, R.H.C. ; Liang, Z. 
142018Detecting Malicious Behaviors in JavaScript ApplicationsMao, J.; Bian, J.; Bai, G.; Wang, R.; Chen, Y.; Xiao, Y.; Liang, Z. 
152018Detecting Phishing Websites via Aggregation Analysis of Page LayoutsMao, J.; Bian, J.; Tian, W.; Zhu, S.; Wei, T.; Li, A.; Liang, Z. 
162013Enforcing system-wide control flow integrity for exploit detection and diagnosisPrakash, A.; Yin, H.; Liang, Z. 
172010Golden implementation driven software debuggingBanerjee, A. ; Roychoudhury, A. ; Harlie, J.A. ; Liang, Z. 
182010Heap Taichi: Exploiting memory allocation granularity in heap-spraying attacksDing, Y.; Wei, T.; Wang, T.; Liang, Z. ; Zou, W.
192011Jump-oriented programming: A new class of code-reuse attackBletsch, T.; Jiang, X.; Freeh, V.W.; Liang, Z. 
201-Jan-2019Neural Network Inversion in Adversarial Setting via Background Knowledge AlignmentYang, Ziqi ; Zhang, Jiyi; Chang, Ee-Chien ; Liang, Zhenkai