Zhenkai Liang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

12EEZhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar: Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ACM Trans. Inf. Syst. Secur. 12(3): (2009)
11EEWeiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkatakrishnan: Expanding Malware Defense by Securing Software Installations. DIMVA 2008: 164-185
10EEZhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael K. Reiter: AGIS: Towards automatic generation of infection signatures. DSN 2008: 237-246
9EEDawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena: BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25
8EEDavid Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin: Automatically Identifying Trigger-based Behavior in Malware. Botnet Detection 2008: 65-88
7EEJuan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiaodong Song: Polyglot: automatic extraction of protocol message format using dynamic binary analysis. ACM Conference on Computer and Communications Security 2007: 317-329
6EEZhenkai Liang, R. Sekar: Fast and automated generation of attack signatures: a basis for building self-protecting servers. ACM Conference on Computer and Communications Security 2005: 213-222
5EEZhenkai Liang, R. Sekar: Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. ACSAC 2005: 215-224
4EEWeiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar: One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. NDSS 2005
3EEZhenkai Liang, R. Sekar, Daniel C. DuVarney: Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems. USENIX Annual Technical Conference, General Track 2005: 375-378
2EEZhenkai Liang, V. N. Venkatakrishnan, R. Sekar: Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. ACSAC 2003: 182-191
1EEV. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang: An Approach for Secure Software Installation. LISA 2002: 219-226

Coauthor Index

1David Brumley [8] [9]
2Juan Caballero [7] [9]
3Daniel C. DuVarney [3]
4Cody Hartwig [8]
5Ivan Jager [9]
6T. Kamat [1]
7Min Gyung Kang [9]
8Zhuowei Li [10]
9James Newsome [8] [9]
10Pongsin Poosankam [9]
11Michael K. Reiter [10]
12Prateek Saxena [9]
13R. Sekar [1] [2] [3] [4] [5] [6] [11] [12]
14Dawn Xiaodong Song [7] [8] [9]
15Weiqing Sun [4] [11] [12]
16S. Tsipa [1]
17V. N. Venkatakrishnan [1] [2] [4] [11] [12]
18XiaoFeng Wang [10]
19Heng Yin [7] [8] [9]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)