Author of the publication

Modx: Binary Level Partial Imported Third-Party Library Detection through Program Modularization and Semantic Matching.

, , , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

State-of-the-Art: Security Competition in Talent Education., , , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 461-481. Springer, (2017)FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities., , , , , and . USENIX Security Symposium, page 781-797. USENIX Association, (2018)PPIDS: A Pyramid-Like Printer Intrusion Detection System Based on ATT&CK Framework., , , , , , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 277-290. Springer, (2019)Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services., , , , and . CCS, page 1581-1597. ACM, (2021)Reverse Engineering Workload Measure based on Function Classification., , , , and . CSCWD, page 660-665. IEEE, (2023)SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization., , , , , , , , , and 2 other author(s). WWW, page 2733-2744. ACM / IW3C2, (2021)ModX: Binary Level Partially Imported Third-Party Library Detection via Program Modularization and Semantic Matching., , , , , and . ICSE, page 1393-1405. ACM, (2022)MAAC: Novel Alert Correlation Method To Detect Multi-step Attack., , , and . CoRR, (2020)Wi-Fi Secure Access Control System Based on Geo-fence., and . ISCC, page 1-6. IEEE, (2019)Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection., , , , , and . Comput. Secur., (February 2024)