A hybrid alias analysis and its application to global variable protection in the linux kernel G Li, H Zhang, J Zhou, W Shen, Y Sui, Z Qian 32nd USENIX Security Symposium (USENIX Security 23), 4211-4228, 2023 | 10 | 2023 |
Automatic permission check analysis for linux kernel J Zhou, T Zhang, W Shen, D Lee, C Jung, A Azab, R Wang, P Ning, K Ren IEEE Transactions on Dependable and Secure Computing 20 (3), 1849-1866, 2022 | 4 | 2022 |
Beyond control: Exploring novel file system objects for data-only attacks on linux systems J Zhou, J Hu, Z Pan, J Zhu, W Shen, G Li, Z Qian arXiv preprint arXiv:2401.17618, 2024 | 3 | 2024 |
{DMAAUTH}: A Lightweight Pointer Integrity-based Secure Architecture to Defeat {DMA} Attacks X Wang, W Shen, Y Bu, J Zhou, Y Zhou 33rd USENIX Security Symposium (USENIX Security 24), 1081-1098, 2024 | 2 | 2024 |
Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow Q Liu, W Shen, J Zhou, Z Zhang, J Hu, S Ni, K Lu, R Chang European Symposium on Research in Computer Security, 194-214, 2024 | 1 | 2024 |
A novel page-UAF exploit strategy for privilege escalation in Linux systems Jinmeng Zhou, Jiayi Hu, Wenbo Shen, Zhiyun Qian Phrack Issue 71, 2024 | | 2024 |