Articles with public access mandates - Jiang MingLearn more
Not available anywhere: 3
Cracking IoT device user account via brute-force attack to SMS authentication code
D Wang, J Ming, T Chen, X Zhang, C Wang
Proceedings of the First Workshop on Radical and Experiential Security, 57-60, 2018
Mandates: National Natural Science Foundation of China
Capturing the persistence of facial expression features for deepfake video detection
Y Zhao, W Ge, W Li, R Wang, L Zhao, J Ming
Information and Communications Security: 21st International Conference …, 2020
Mandates: National Natural Science Foundation of China
Capturing Invalid Input Manipulations for Memory Corruption Diagnosis
L Zhao, K Jiang, Y Zhu, L Wang, J Ming
IEEE Transactions on Dependable and Secure Computing 20 (2), 917-930, 2022
Mandates: National Natural Science Foundation of China
Available somewhere: 41
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
Mandates: US National Science Foundation
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
J Ming, D Xu, Y Jiang, D Wu
26th USENIX Security Symposium (USENIX Security’17)., 2017
Mandates: US National Science Foundation, US Department of Defense
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping
D Xu, J Ming, D Wu
38th IEEE Symposium on Security and Privacy (S&P'17), 2017
Mandates: US National Science Foundation, US Department of Defense
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost
B Cheng*, J Ming*, J Fu, G Peng, T Chen, X Zhang, JY Marion
25th ACM Conference on Computer and Communications Security (CCS'18)., 2018
Mandates: National Natural Science Foundation of China
Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation
C Cao, L Guan, J Ming, P Liu
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
Mandates: US National Science Foundation, US Department of Defense
VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification
D Xu, J Ming, Y Fu, D Wu
25th ACM Conference on Computer and Communications Security (CCS'18), 2018
Mandates: US National Science Foundation, US Department of Defense
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
D Xu, J Ming, D Wu
19th Information Security Conference (ISC'16), 2016
Mandates: US National Science Foundation
Windranger: A directed greybox fuzzer driven by deviation basic blocks
Z Du, Y Li, Y Liu, B Mao
Proceedings of the 44th International Conference on Software Engineering …, 2022
Mandates: National Natural Science Foundation of China, National Research Foundation …
StraightTaint: Decoupled Offline Symbolic Taint Analysis
J Ming, D Wu, J Wang, G Xiao, P Liu
31st IEEE/ACM International Conference on Automated Software Engineering …, 2016
Mandates: US National Science Foundation
Unleashing the hidden power of compiler optimization on binary code difference: An empirical study
X Ren, M Ho, J Ming, Y Lei, L Li
Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021
Mandates: US National Science Foundation
Deviation-Based Obfuscation-Resilient Program Equivalence Checking with Application to Software Plagiarism Detection
J Ming, F Zhang, D Wu, P Liu, S Zhu
IEEE Transactions on Reliability 65 (4), 2016
Mandates: US National Science Foundation
Impeding Behavior-based Malware Analysis via Replacement Attacks to Malware Specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
Journal of Computer Virology and Hacking Techniques, 2016
Mandates: US National Science Foundation
{PolyCruise}: A {Cross-Language} dynamic information flow analysis
W Li, J Ming, X Luo, H Cai
31st USENIX Security Symposium (USENIX Security 22), 2513-2530, 2022
Mandates: US National Science Foundation, US Department of Defense
{Obfuscation-Resilient} Executable Payload Extraction From Packed Malware
B Cheng, J Ming, EA Leal, H Zhang, J Fu, G Peng, JY Marion
30th USENIX Security Symposium (USENIX Security 21), 3451-3468, 2021
Mandates: US National Science Foundation, US Department of Education, National Natural …
{MBA-Blast}: Unveiling and Simplifying Mixed {Boolean-Arithmetic} Obfuscation
B Liu, J Shen, J Ming, Q Zheng, J Li, D Xu
30th USENIX Security Symposium (USENIX Security 21), 1701-1718, 2021
Mandates: US National Science Foundation
Translingual Obfuscation
P Wang, S Wang, J Ming, Y Jiang, D Wu.
1st IEEE European Symposium on Security and Privacy (Euro S&P'16), 2016
Mandates: US National Science Foundation
" Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps
L Shi, J Fu, Z Guo, J Ming
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
Mandates: US National Science Foundation, National Natural Science Foundation of China
Publication and funding information is determined automatically by a computer program