2008 |
10 | EE | Chao Dai,
Jianmin Pang,
Rongcai Zhao,
Xiaojun Ma:
Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps.
ACIS-ICIS 2008: 525-530 |
9 | EE | Miao Wang,
Rongcai Zhao,
Jianmin Pang,
Guoming Cai:
Reconstructing Control Flow in Modulo Scheduled Loops.
ACIS-ICIS 2008: 539-544 |
8 | EE | Wen Fu,
Rongcai Zhao,
Jianmin Pang,
Jingbo Zhang:
Recovering Variable-Argument Functions from Binary Executables.
ACIS-ICIS 2008: 545-550 |
7 | EE | Jiuzhen Jin,
Jianmin Pang,
Zheng Shan,
Rongcai Zhao:
Queuing Network Performance Model for Evaluation of CMP-Based VoIP SPS.
ACIS-ICIS 2008: 589-594 |
6 | EE | Jingbo Zhang,
Wen Fu,
Jianmin Pang,
Rongcai Zhao:
Using Propositional Calculas to Accurately Structure Control-Flow from Binary Executables.
CSSE (2) 2008: 338-341 |
5 | EE | Jingbo Zhang,
Rongcai Zhao,
Jianmin Pang,
Wen Fu:
Formal Abstraction of Semantics for Detecting Malicious Code.
CSSE (2) 2008: 350-353 |
2007 |
4 | EE | Jingbo Zhang,
Rongcai Zhao,
Jianmin Pang:
Parameter and Return-value Analysis of Binary Executables.
COMPSAC (1) 2007: 501-508 |
3 | | Lin Han,
Rongcai Zhao,
Jianmin Pang:
Dynamic decomposition algorithm merging control flow analysis.
PDPTA 2007: 245-249 |
2006 |
2 | | Shanshan Wang,
Rongcai Zhao,
Jianmin Pang:
Improvement and Implementation of Accurate Array Data-Flow Analysis.
PDPTA 2006: 620-629 |
1 | EE | Xuemeng Zhang,
Rongcai Zhao,
Jianmin Pang:
Semantic Abstraction of IA-64 Multimedia Instructions.
SKG 2006: 91 |