Follow
Ping Chen
Ping Chen
Verified email at ist.psu.edu - Homepage
Title
Cited by
Cited by
Year
DROP: Detecting return-oriented programming malicious code
P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
2802009
JITDefender: A defense against JIT spraying attacks
P Chen, Y Fang, B Mao, L Xie
Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011
632011
Automatic construction of jump-oriented programming shellcode (on the x86)
P Chen, X Xing, B Mao, L Xie, X Shen, X Yin
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
582011
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
512016
System call redirection: A practical approach to meeting real-world virtual machine introspection needs
R Wu, P Chen, P Liu, B Mao
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
502014
Postmortem program analysis with {Hardware-Enhanced}{Post-Crash} artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017
482017
Efficient detection of the return-oriented programming malicious code
P Chen, X Xing, H Han, B Mao, L Xie
Information Systems Security: 6th International Conference, ICISS 2010 …, 2010
472010
Brick: A binary tool for run-time detecting and locating integer-based vulnerability
P Chen, Y Wang, Z Xin, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 208-215, 2009
472009
A Practical Approach for Adaptive Data Structure Layout Randomization
PL Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao
ESORICS'15, 2015
46*2015
JITSafe: a framework against Just-in-time spraying attacks
P Chen, R Wu, B Mao
Information Security, IET 7 (4), 283 - 292, 2013
392013
IntFinder: Automatically detecting integer bugs in x86 binary program
P Chen, H Han, Y Wang, X Shen, X Yin, B Mao, L Xie
Information and Communications Security, 336-345, 2009
332009
Return-oriented rootkit without returns (on the x86)
P Chen, X Xing, B Mao, L Xie
Information and Communications Security: 12th International Conference …, 2010
272010
Dancing with wolves: Towards practical event-driven vmm monitoring
L Deng, P Liu, J Xu, P Chen, Q Zeng
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017
262017
RIM: A Method to Defend from JIT Spraying Attack
R Wu, P Chen, B Mao, L Xie
Availability, Reliability and Security (ARES), 143 - 148, 2012
202012
Semantics-preserving reinforcement learning attack against graph neural networks for malware detection
L Zhang, P Liu, YH Choi, P Chen
IEEE Transactions on Dependable and Secure Computing 20 (2), 1390-1402, 2022
192022
Traffic controller: A practical approach to block network covert timing channel
Y Wang, P Chen, Y Ge, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 349-354, 2009
172009
RandHyp: Preventing Attacks via Xen Hypercall Interface
F Wang, P Chen, B Mao, L Xie
SEC 2012, 138-149, 2012
132012
What you see is not what you get! thwarting just-in-time rop with chameleon
P Chen, J Xu, Z Hu, X Xing, M Zhu, B Mao, P Liu
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
112017
Method and apparatus for handling bugs
K Chen, J Tao, B Chen, P Chen
US Patent App. 14/568,738, 2015
112015
ROPNN: Detection of ROP payloads using deep neural networks
X Li, Z Hu, Y Fu, P Chen, M Zhu, P Liu
arXiv preprint arXiv:1807.11110, 2018
92018
The system can't perform the operation now. Try again later.
Articles 1–20