default search action
Zhiyun Qian
Person information
- affiliation: University of California Riverside, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:
Comprehensive Memory Safety Validation: An Alternative Approach to Memory Safety. IEEE Secur. Priv. 22(4): 40-49 (2024) - [j15]Haonan Li, Yu Hao, Yizhuo Zhai, Zhiyun Qian:
Enhancing Static Analysis for Practical Bug Detection: An LLM-Integrated Approach. Proc. ACM Program. Lang. 8(OOPSLA1): 474-499 (2024) - [c97]Abdulrahman Fahim, Shitong Zhu, Zhiyun Qian, Chengyu Song, Evangelos E. Papalexakis, Supriyo Chakraborty, Kevin S. Chan, Paul L. Yu, Trent Jaeger, Srikanth V. Krishnamurthy:
DNS Exfiltration Guided by Generative Adversarial Networks. EuroS&P 2024: 580-599 - [c96]Xingyu Li, Zheng Zhang, Zhiyun Qian, Trent Jaeger, Chengyu Song:
An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem. MSR 2024: 63-74 - [c95]Zhengchuan Liang, Xiaochen Zou, Chengyu Song, Zhiyun Qian:
K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel. NDSS 2024 - [c94]Xiaochen Zou, Yu Hao, Zheng Zhang, Juefei Pu, Weiteng Chen, Zhiyun Qian:
SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem. NDSS 2024 - [c93]Weiteng Chen, Yu Hao, Zheng Zhang, Xiaochen Zou, Dhilung Kirat, Shachee Mishra, Douglas Lee Schales, Jiyong Jang, Zhiyun Qian:
SyzGen++: Dependency Inference for Augmenting Kernel Driver Fuzzing. SP 2024: 4661-4677 - [c92]Rahul George, Mingming Chen, Kaiming Huang, Zhiyun Qian, Thomas La Porta, Trent Jaeger:
OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget. USENIX Security Symposium 2024 - [c91]Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul L. Yu, Srikanth V. Krishnamurthy:
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks. USENIX Security Symposium 2024 - [c90]Zheng Zhang, Yu Hao, Weiteng Chen, Xiaochen Zou, Xingyu Li, Haonan Li, Yizhuo Zhai, Zhiyun Qian, Billy Lau:
SymBisect: Accurate Bisection for Fuzzer-Exposed Vulnerabilities. USENIX Security Symposium 2024 - [i16]Joseph Bursey, Ardalan Amiri Sani, Zhiyun Qian:
SyzRetrospector: A Large-Scale Retrospective Study of Syzbot. CoRR abs/2401.11642 (2024) - [i15]Jinmeng Zhou, Jiayi Hu, Ziyue Pan, Jiaxun Zhu, Wenbo Shen, Guoren Li, Zhiyun Qian:
Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems. CoRR abs/2401.17618 (2024) - [i14]Xingyu Li, Zheng Zhang, Zhiyun Qian, Trent Jaeger, Chengyu Song:
An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem. CoRR abs/2402.05212 (2024) - [i13]Yu-Tsung Lee, Hayawardh Vijayakumar, Zhiyun Qian, Trent Jaeger:
Static Detection of Filesystem Vulnerabilities in Android Systems. CoRR abs/2407.11279 (2024) - 2023
- [c89]Aditya Basu, John Sampson, Zhiyun Qian, Trent Jaeger:
Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities. FAST 2023: 183-198 - [c88]Haonan Li, Yu Hao, Yizhuo Zhai, Zhiyun Qian:
Assisting Static Analysis with Large Language Models: A ChatGPT Experiment. ESEC/SIGSOFT FSE 2023: 2107-2111 - [c87]Yu Hao, Guoren Li, Xiaochen Zou, Weiteng Chen, Shitong Zhu, Zhiyun Qian, Ardalan Amiri Sani:
SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers. SP 2023: 3262-3278 - [c86]Guoren Li, Hang Zhang, Jinmeng Zhou, Wenbo Shen, Yulei Sui, Zhiyun Qian:
A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel. USENIX Security Symposium 2023: 4211-4228 - [i12]Yu Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage. CoRR abs/2302.13506 (2023) - [i11]Haonan Li, Yu Hao, Yizhuo Zhai, Zhiyun Qian:
The Hitchhiker's Guide to Program Analysis: A Journey with Large Language Models. CoRR abs/2308.00245 (2023) - [i10]Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:
Top of the Heap: Efficient Memory Error Protection for Many Heap Objects. CoRR abs/2310.06397 (2023) - 2022
- [j14]Shaoyong Du, Minrui Zhao, Jingyu Hua, Hang Zhang, Xiaoyu Chen, Zhiyun Qian, Sheng Zhong:
Who Moves My App Promotion Investment? A Systematic Study About App Distribution Fraud. IEEE Trans. Dependable Secur. Comput. 19(4): 2648-2664 (2022) - [j13]Fatemah Alharbi, Yuchen Zhou, Feng Qian, Zhiyun Qian, Nael B. Abu-Ghazaleh:
DNS Poisoning of Operating System Caches: Attacks and Mitigations. IEEE Trans. Dependable Secur. Comput. 19(4): 2851-2863 (2022) - [c85]Xin'an Zhou, Jiale Guan, Luyi Xing, Zhiyun Qian:
Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT. CCS 2022: 3285-3299 - [c84]Yu Hao, Hang Zhang, Guoren Li, Xingyun Du, Zhiyun Qian, Ardalan Amiri Sani:
Demystifying the Dependency Challenge in Kernel Fuzzing. ICSE 2022: 659-671 - [c83]Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haixin Duan, Zhiyun Qian:
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP. NDSS 2022 - [c82]Kaiming Huang, Yongzhe Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:
The Taming of the Stack: Isolating Stack Data from Memory Errors. NDSS 2022 - [c81]Yizhuo Zhai, Yu Hao, Zheng Zhang, Weiteng Chen, Guoren Li, Zhiyun Qian, Chengyu Song, Manu Sridharan, Srikanth V. Krishnamurthy, Trent Jaeger, Paul L. Yu:
Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel. NDSS 2022 - [c80]Xuancheng Jin, Xuangan Xiao, Songlin Jia, Wang Gao, Dawu Gu, Hang Zhang, Siqi Ma, Zhiyun Qian, Juanru Li:
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK. SP 2022: 650-665 - [c79]Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi:
LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution. USENIX Security Symposium 2022: 125-142 - [c78]Xuewei Feng, Qi Li, Kun Sun, Zhiyun Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu:
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. USENIX Security Symposium 2022: 2619-2636 - [c77]Xiaochen Zou, Guoren Li, Weiteng Chen, Hang Zhang, Zhiyun Qian:
SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel. USENIX Security Symposium 2022: 3201-3217 - [i9]Aditya Basu, John Sampson, Zhiyun Qian, Trent Jaeger:
Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities. CoRR abs/2211.16735 (2022) - 2021
- [j12]Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh:
Beyond the CPU: Side-Channel Attacks on GPUs. IEEE Des. Test 38(3): 15-21 (2021) - [j11]Shaoyong Du, Pengxiong Zhu, Jingyu Hua, Zhiyun Qian, Zhao Zhang, Xiaoyu Chen, Sheng Zhong:
An Empirical Analysis of Hazardous Uses of Android Shared Storage. IEEE Trans. Dependable Secur. Comput. 18(1): 340-355 (2021) - [j10]Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh:
Side Channel Attacks on GPUs. IEEE Trans. Dependable Secur. Comput. 18(4): 1950-1961 (2021) - [j9]Qiang Zeng, Lannan Luo, Zhiyun Qian, Xiaojiang Du, Zhoujun Li, Chin-Tser Huang, Csilla Farkas:
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs. IEEE Trans. Dependable Secur. Comput. 18(6): 2582-2600 (2021) - [c76]Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Keyu Man, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq, Yu Hao, Guoren Li, Zheng Zhang, Xiaochen Zou:
Eluding ML-based Adblockers With Actionable Adversarial Examples. ACSAC 2021: 541-553 - [c75]Zhongjie Wang, Shitong Zhu, Keyu Man, Pengxiong Zhu, Yu Hao, Zhiyun Qian, Srikanth V. Krishnamurthy, Tom La Porta, Michael J. De Lucia:
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison. MTD@CCS 2021: 31-32 - [c74]Weiteng Chen, Yu Wang, Zheng Zhang, Zhiyun Qian:
SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers. CCS 2021: 749-763 - [c73]Hang Zhang, Weiteng Chen, Yu Hao, Guoren Li, Yizhuo Zhai, Xiaochen Zou, Zhiyun Qian:
Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels. CCS 2021: 811-824 - [c72]Zhongjie Wang, Shitong Zhu, Keyu Man, Pengxiong Zhu, Yu Hao, Zhiyun Qian, Srikanth V. Krishnamurthy, Tom La Porta, Michael J. De Lucia:
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison. CCS 2021: 3384-3399 - [c71]Keyu Man, Xin'an Zhou, Zhiyun Qian:
DNS Cache Poisoning Attack: Resurrections with Side Channels. CCS 2021: 3400-3414 - [c70]Di Gao, Hao Lin, Zhenhua Li, Feng Qian, Qi Alfred Chen, Zhiyun Qian, Wei Liu, Liangyi Gong, Yunhao Liu:
A nationwide census on wifi security threats: prevalence, riskiness, and the economics. MobiCom 2021: 242-255 - [c69]Seyed Mohammadjavad Seyed Talebi, Zhihao Yao, Ardalan Amiri Sani, Zhiyun Qian, Daniel Austin:
Undo Workarounds for Kernel Bugs. USENIX Security Symposium 2021: 2381-2398 - [c68]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems. USENIX Security Symposium 2021: 2579-2596 - [c67]Daimeng Wang, Zheng Zhang, Hang Zhang, Zhiyun Qian, Srikanth V. Krishnamurthy, Nael B. Abu-Ghazaleh:
SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning. USENIX Security Symposium 2021: 2741-2758 - [c66]Zheng Zhang, Hang Zhang, Zhiyun Qian, Billy Lau:
An Investigation of the Android Kernel Patch Ecosystem. USENIX Security Symposium 2021: 3649-3666 - [e1]Trent Jaeger, Zhiyun Qian:
MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, Virtual Event, Republic of Korea, 15 November 2021. ACM 2021, ISBN 978-1-4503-8658-6 [contents] - [i8]Xiaochen Zou, Guoren Li, Weiteng Chen, Hang Zhang, Zhiyun Qian:
SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel. CoRR abs/2111.06002 (2021) - 2020
- [j8]Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. Proc. ACM Meas. Anal. Comput. Syst. 4(1): 13:1-13:23 (2020) - [j7]Yue Cao, Ahmed Osama Fathy Atya, Shailendra Singh, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas F. La Porta, Prashant Krishnamurthy, Lisa M. Marvel:
Packet Header Obfuscation Using MIMO. IEEE/ACM Trans. Netw. 28(4): 1712-1725 (2020) - [c65]Keyu Man, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, Haixin Duan:
DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels. CCS 2020: 1337-1350 - [c64]Shitong Zhu, Shasha Li, Zhongjie Wang, Xun Chen, Zhiyun Qian, Srikanth V. Krishnamurthy, Kevin S. Chan, Ananthram Swami:
You do (not) belong here: detecting DPI evasion attacks with context learning. CoNEXT 2020: 183-197 - [c63]Liangyi Gong, Zhenhua Li, Feng Qian, Zifan Zhang, Qi Alfred Chen, Zhiyun Qian, Hao Lin, Yunhao Liu:
Experiences of landing machine learning onto market-scale mobile malware detection. EuroSys 2020: 2:1-2:14 - [c62]Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun:
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. NDSS 2020 - [c61]Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. SIGMETRICS (Abstracts) 2020: 69-70 - [c60]Yizhuo Zhai, Yu Hao, Hang Zhang, Daimeng Wang, Chengyu Song, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy, Paul L. Yu:
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel. ESEC/SIGSOFT FSE 2020: 221-232 - [c59]Umar Iqbal, Peter Snyder, Shitong Zhu, Benjamin Livshits, Zhiyun Qian, Zubair Shafiq:
AdGraph: A Graph-Based Approach to Ad and Tracker Blocking. SP 2020: 763-776 - [c58]Xiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, Zhiyun Qian:
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices. USENIX Security Symposium 2020: 577-593 - [c57]Weiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian:
KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities. USENIX Security Symposium 2020: 1093-1110 - [i7]Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq:
A4 : Evading Learning-based Adblockers. CoRR abs/2001.10999 (2020) - [i6]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Daimeng Wang, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems. CoRR abs/2008.03593 (2020) - [i5]Shitong Zhu, Shasha Li, Zhongjie Wang, Xun Chen, Zhiyun Qian, Srikanth V. Krishnamurthy, Kevin S. Chan, Ananthram Swami:
You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning. CoRR abs/2011.01514 (2020)
2010 – 2019
- 2019
- [j6]Lei Zhang, Zhemin Yang, Yuyu He, Mingqi Li, Sen Yang, Min Yang, Yuan Zhang, Zhiyun Qian:
App in the Middle: Demystify Application Virtualization in Android and its Security Threats. Proc. ACM Meas. Anal. Comput. Syst. 3(1): 17:1-17:24 (2019) - [j5]Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D. McDaniel, Lisa M. Marvel:
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud. IEEE/ACM Trans. Netw. 27(2): 560-576 (2019) - [c56]Yue Cao, Zhongjie Wang, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Paul L. Yu:
Principled Unearthing of TCP Side Channel Vulnerabilities. CCS 2019: 211-224 - [c55]Daimeng Wang, Zhiyun Qian, Nael B. Abu-Ghazaleh, Srikanth V. Krishnamurthy:
PAPP: Prefetcher-Aware Prime and Probe Side-channel Attack. DAC 2019: 62 - [c54]Fatemah Alharbi, Jie Chang, Yuchen Zhou, Feng Qian, Zhiyun Qian, Nael B. Abu-Ghazaleh:
Collaborative Client-Side DNS Cache Poisoning Attack. INFOCOM 2019: 1153-1161 - [c53]Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Rajiv Gupta, Paul L. Yu:
Figment: Fine-grained Permission Management for Mobile Apps. INFOCOM 2019: 1405-1413 - [c52]Arash Alavi, Rajiv Gupta, Zhiyun Qian:
When the Attacker Knows a Lot: The GAGA Graph Anonymizer. ISC 2019: 211-230 - [c51]Zheng Fang, Hao Fu, Tianbo Gu, Zhiyun Qian, Trent Jaeger, Prasant Mohapatra:
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things. MASS 2019: 236-244 - [c50]Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Paul L. Yu:
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries. NDSS 2019 - [c49]Frank Capobianco, Rahul George, Kaiming Huang, Trent Jaeger, Srikanth V. Krishnamurthy, Zhiyun Qian, Mathias Payer, Paul L. Yu:
Employing attack graphs for intrusion detection. NSPW 2019: 16-30 - [c48]Ahmed Abdo, Sakib Md. Bin Malek, Zhiyun Qian, Qi Zhu, Matthew J. Barth, Nael B. Abu-Ghazaleh:
Application level attacks on Connected Vehicle Protocols. RAID 2019: 459-471 - [c47]Lei Zhang, Zhemin Yang, Yuyu He, Mingqi Li, Sen Yang, Min Yang, Yuan Zhang, Zhiyun Qian:
App in the Middle: Demystify Application Virtualization in Android and its Security Threats. SIGMETRICS (Abstracts) 2019: 75-76 - [c46]Shitong Zhu, Umar Iqbal, Zhongjie Wang, Zhiyun Qian, Zubair Shafiq, Weiteng Chen:
ShadowBlock: A Lightweight and Stealthy Adblocking Browser. WWW 2019: 2483-2493 - 2018
- [j4]Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel:
Off-Path TCP Exploits of the Challenge ACK Global Rate Limit. IEEE/ACM Trans. Netw. 26(2): 765-778 (2018) - [c45]Ioannis Gasparis, Azeem Aqil, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Rajiv Gupta, Edward Colbert:
Droid M+: Developer Support for Imbibing Android's New Permission Model. AsiaCCS 2018: 765-776 - [c44]Lei Zhang, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian, Geng Hong, Yuan Zhang, Min Yang:
Invetter: Locating Insecure Input Validations in Android Services. CCS 2018: 1165-1178 - [c43]Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, Hai-Xin Duan:
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. CCS 2018: 1701-1713 - [c42]Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh:
Rendered Insecure: GPU Side Channel Attacks are Practical. CCS 2018: 2139-2153 - [c41]Qiang Zeng, Lannan Luo, Zhiyun Qian, Xiaojiang Du, Zhoujun Li:
Resilient decentralized Android application repackaging detection using logic bombs. CGO 2018: 50-61 - [c40]Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Patrick D. McDaniel:
IotSan: fortifying the safety of IoT systems. CoNEXT 2018: 191-203 - [c39]Jingyu Hua, Hongyi Sun, Zhenyu Shen, Zhiyun Qian, Sheng Zhong:
Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information. INFOCOM 2018: 1700-1708 - [c38]Yue Cao, Ahmed Osama Fathy Atya, Shailendra Singh, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Prashant Krishnamurthy, Lisa M. Marvel:
A Framework for MIMO-based Packet Header Obfuscation. INFOCOM 2018: 1763-1771 - [c37]Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, Heng Yin:
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis. NDSS 2018 - [c36]Ahmad Darki, Chun-Yu Chuang, Michalis Faloutsos, Zhiyun Qian, Heng Yin:
RARE: A Systematic Augmented Router Emulation for Malware Analysis. PAM 2018: 60-72 - [c35]Ziqiao Zhou, Zhiyun Qian, Michael K. Reiter, Yinqian Zhang:
Static Evaluation of Noninterference Using Approximate Model Counting. IEEE Symposium on Security and Privacy 2018: 514-528 - [c34]Seyed Mohammadjavad Seyed Talebi, Hamid Tavakoli, Hang Zhang, Zheng Zhang, Ardalan Amiri Sani, Zhiyun Qian:
Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems. USENIX Security Symposium 2018: 291-307 - [c33]Hang Zhang, Zhiyun Qian:
Precise and Accurate Patch Presence Test for Binaries. USENIX Security Symposium 2018: 887-902 - [c32]Weiteng Chen, Zhiyun Qian:
Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets. USENIX Security Symposium 2018: 1581-1598 - [i4]Umar Iqbal, Zubair Shafiq, Peter Snyder, Shitong Zhu, Zhiyun Qian, Benjamin Livshits:
AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking. CoRR abs/1805.09155 (2018) - [i3]Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Patrick D. McDaniel:
IoTSan: Fortifying the Safety of IoT Systems. CoRR abs/1810.09551 (2018) - 2017
- [j3]Alan Quach, Zhongjie Wang, Zhiyun Qian:
Investigation of the 2016 Linux TCP Stack Vulnerability at Scale. Proc. ACM Meas. Anal. Comput. Syst. 1(1): 4:1-4:19 (2017) - [j2]Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq:
Detecting Anti Ad-blockers in the Wild. Proc. Priv. Enhancing Technol. 2017(3): 130 (2017) - [c31]Xing Liu, Feng Qian, Zhiyun Qian:
Selective HTTPS traffic manipulation at middleboxes for BYOD devices. ICNP 2017: 1-10 - [c30]Ali Munir, Zhiyun Qian, Zubair Shafiq, Alex X. Liu, Franck Le:
Multipath TCP traffic diversion attacks and countermeasures. ICNP 2017: 1-10 - [c29]Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy:
Your state is not mine: a closer look at evading stateful internet censorship. Internet Measurement Conference 2017: 114-127 - [c28]Umar Iqbal, Zubair Shafiq, Zhiyun Qian:
The ad wars: retrospective measurement and analysis of anti-adblock filter lists. Internet Measurement Conference 2017: 171-183 - [c27]Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D. McDaniel, Lisa M. Marvel:
Malicious co-residency on the cloud: Attacks and defense. INFOCOM 2017: 1-9 - [c26]Arash Alavi, Alan Quach, Hang Zhang, Bryan Marsh, Farhan Ul Haq, Zhiyun Qian, Long Lu, Rajiv Gupta:
Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts. PAM 2017: 100-112 - [c25]Alan Quach, Zhongjie Wang, Zhiyun Qian:
Investigation of the 2016 Linux TCP Stack Vulnerability at Scale. SIGMETRICS (Abstracts) 2017: 8 - [c24]Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy:
Detecting Android Root Exploits by Learning from Root Providers. USENIX Security Symposium 2017: 1129-1144 - [c23]Ahmed Atya, Azeem Aqil, Karim Khalil, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas F. La Porta:
Stalling Live Migrations on the Cloud. WOOT 2017 - 2016
- [c22]Yuru Shao, Jason Ott, Yunhan Jack Jia, Zhiyun Qian, Zhuoqing Morley Mao:
The Misuse of Android Unix Domain Sockets and Security Implications. CCS 2016: 80-91 - [c21]Zheran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, Hao Chen:
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps. AsiaCCS 2016: 747-758 - [c20]Hang Zhang, Dongdong She, Zhiyun Qian:
Android ION Hazard: the Curse of Customizable Memory Management System. CCS 2016: 1663-1674 - [c19]Karim Khalil, Zhiyun Qian, Paul L. Yu, Srikanth V. Krishnamurthy, Ananthram Swami:
Optimal Monitor Placement for Detection of Persistent Threats. GLOBECOM 2016: 1-6 - [c18]Yuru Shao, Qi Alfred Chen, Zhuoqing Morley Mao, Jason Ott, Zhiyun Qian:
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework. NDSS 2016 - [c17]Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel:
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous. USENIX Security Symposium 2016: 209-225 - [i2]Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq, Karishma Dash, Pan Hui:
A First Look at Ad-block Detection: A New Arms Race on the Web. CoRR abs/1605.05841 (2016) - 2015
- [j1]Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifeng Yan, Ambuj K. Singh, Guofei Jiang:
Behavior Query Discovery in System-Generated Temporal Graphs. Proc. VLDB Endow. 9(4): 240-251 (2015) - [c16]Qi Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru Shao, Zhuoqing Morley Mao:
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks. CCS 2015: 388-400 - [c15]Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Xia Ning, Peng Liu, Guofei Jiang:
Discover and Tame Long-running Idling Processes in Enterprise Systems. AsiaCCS 2015: 543-554 - [c14]Hang Zhang, Dongdong She, Zhiyun Qian:
Android Root and its Providers: A Double-Edged Sword. CCS 2015: 1093-1104 - [c13]Zhiyong Shan, Iulian Neamtiu, Zhiyun Qian, Don J. Torrieri:
Proactive restart as cyber maneuver for Android. MILCOM 2015: 19-24 - [c12]Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang:
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. NDSS 2015 - [i1]Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifeng Yan, Ambuj K. Singh, Guofei Jiang:
Behavior Query Discovery in System-Generated Temporal Graphs. CoRR abs/1511.05911 (2015) - 2014
- [c11]Qi Alfred Chen, Zhiyun Qian, Zhuoqing Morley Mao:
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks. USENIX Security Symposium 2014: 1037-1052 - 2013
- [c10]Sanae Rosen, Zhiyun Qian, Zhuoqing Morley Mao:
AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users. CODASPY 2013: 221-232 - 2012
- [b1]Zhiyun Qian:
Discover, Analyze, and Validate Attacks with Introspective Side Channels. University of Michigan, USA, 2012 - [c9]Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie:
Collaborative TCP sequence number inference attack: how to crack sequence number under a second. CCS 2012: 593-604 - [c8]Zhiyun Qian, Zhaoguang Wang, Qiang Xu, Zhuoqing Morley Mao, Ming Zhang, Yi-Min Wang:
You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks. NDSS 2012 - [c7]Zhiyun Qian, Zhuoqing Morley Mao:
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security. IEEE Symposium on Security and Privacy 2012: 347-361 - 2011
- [c6]Zhiyun Qian, Zhuoqing Morley Mao, Ammar Rayes, David Jaffe:
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks. SecureComm 2011: 1-18 - [c5]Zhaoguang Wang, Zhiyun Qian, Qiang Xu, Zhuoqing Morley Mao, Ming Zhang:
An untold story of middleboxes in cellular networks. SIGCOMM 2011: 374-385 - 2010
- [c4]Lide Zhang, Birjodh Tiwana, Zhiyun Qian, Zhaoguang Wang, Robert P. Dick, Zhuoqing Morley Mao, Lei Yang:
Accurate online power estimation and automatic battery behavior based power model generation for smartphones. CODES+ISSS 2010: 105-114 - [c3]Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu:
On Network-level Clusters for Spam Detection. NDSS 2010 - [c2]Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu:
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. IEEE Symposium on Security and Privacy 2010: 207-222
2000 – 2009
- 2009
- [c1]Feng Qian, Zhiyun Qian, Zhuoqing Morley Mao, Atul Prakash:
Ensemble: Community-Based Anomaly Detection for Popular Applications. SecureComm 2009: 163-184
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint