2009 |
12 | EE | Zhenkai Liang,
Weiqing Sun,
V. N. Venkatakrishnan,
R. Sekar:
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
2008 |
11 | EE | Weiqing Sun,
R. Sekar,
Zhenkai Liang,
V. N. Venkatakrishnan:
Expanding Malware Defense by Securing Software Installations.
DIMVA 2008: 164-185 |
10 | EE | Zhuowei Li,
XiaoFeng Wang,
Zhenkai Liang,
Michael K. Reiter:
AGIS: Towards automatic generation of infection signatures.
DSN 2008: 237-246 |
9 | EE | Dawn Xiaodong Song,
David Brumley,
Heng Yin,
Juan Caballero,
Ivan Jager,
Min Gyung Kang,
Zhenkai Liang,
James Newsome,
Pongsin Poosankam,
Prateek Saxena:
BitBlaze: A New Approach to Computer Security via Binary Analysis.
ICISS 2008: 1-25 |
8 | EE | David Brumley,
Cody Hartwig,
Zhenkai Liang,
James Newsome,
Dawn Xiaodong Song,
Heng Yin:
Automatically Identifying Trigger-based Behavior in Malware.
Botnet Detection 2008: 65-88 |
2007 |
7 | EE | Juan Caballero,
Heng Yin,
Zhenkai Liang,
Dawn Xiaodong Song:
Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
ACM Conference on Computer and Communications Security 2007: 317-329 |
2005 |
6 | EE | Zhenkai Liang,
R. Sekar:
Fast and automated generation of attack signatures: a basis for building self-protecting servers.
ACM Conference on Computer and Communications Security 2005: 213-222 |
5 | EE | Zhenkai Liang,
R. Sekar:
Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models.
ACSAC 2005: 215-224 |
4 | EE | Weiqing Sun,
Zhenkai Liang,
V. N. Venkatakrishnan,
R. Sekar:
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
NDSS 2005 |
3 | EE | Zhenkai Liang,
R. Sekar,
Daniel C. DuVarney:
Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems.
USENIX Annual Technical Conference, General Track 2005: 375-378 |
2003 |
2 | EE | Zhenkai Liang,
V. N. Venkatakrishnan,
R. Sekar:
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs.
ACSAC 2003: 182-191 |
2002 |
1 | EE | V. N. Venkatakrishnan,
R. Sekar,
T. Kamat,
S. Tsipa,
Zhenkai Liang:
An Approach for Secure Software Installation.
LISA 2002: 219-226 |