Jiang Ming
Home
Honors & Awards
Publications
Teaching
Team
Services
Versatility
Contact
Jiang Ming
Latest
[S&P '25] Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation
[NDSS '25] Retrofitting XoM for Stripped Binaries without Embedded Data Relocation
[NSDI '24] Towards Intelligent Automobile Cockpit via A New Container Architecture
[CCS '23] PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection
[ESORICS '23] Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference
[USENIX Security '23] On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling
[USENIX Security '22] PolyCruise: A Cross-Language Dynamic Information Flow Analysis
[ASPLOS '22] One Size Does Not Fit All: Security Hardening of MIPS Embedded Systems via Static Binary Debloating for Shared Libraries
[NDSS '22] Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators
[CCS '21] Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization
[USENIX Security '21] MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation
[USENIX Security '21] Obfuscation-Resilient Executable Payload Extraction From Packed Malware
[PLDI '21] Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical Study
[PLDI '21] Boosting SMT Solver Performance on Mixed-Bitwise-Arithmetic Expressions
[ICSE '21] App's Auto-Login Function Security Testing via Android OS-Level Virtualization
[WiSec '21] Z-Fuzzer: Device-agnostic Fuzzing of Zigbee Protocol Implementation
[ACSAC '20] Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation
[CCS '20] PatchScope: Memory Object Centric Patch Diffing
[CCS '20] VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing
[ICICS '19] Capturing the Persistence of Facial Expression Features for Deepfake Video Detection
[MobiSys '19] "Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps
[ACSAC '18] StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification
[CCS '18] VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification
[CCS '18] Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost
[USENIX Security '18] Towards Predicting Efficient and Anonymous Tor Circuits
[USENIX Security '17] BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
[S&P '17] Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping
[SCAM '16] BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling
[ISC '16] Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
[ASE '16] StraightTaint: Decoupled Offline Symbolic Taint Analysis
[Euro S&P '16] Translingual Obfuscation
[CODASPY '16] Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics
[CCS '15] LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
[USENIX Security '15] TaintPipe: Pipelined Symbolic Taint Analysis
[ACNS '15] Replacement Attacks: Automatically Impeding Behavior-based Malware Specifications
[IFIP SEC '15] Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference
[FSE '14] Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection
[ICISC '12] iBinHunt: Binary Hunting with Inter-Procedural Control Flow
[ESORICS '11] Linear Obfuscation to Combat Symbolic Execution
[NSS '11] Towards Ground Truthing Observations in Gray-Box Anomaly Intrusion Detection
[ICICS '09] Denial-of-Service Attacks on Host-Based Generic Unpackers
Cite
×