default search action
Bing Mao 0001
Person information
- affiliation (PhD 1997): Nanjing University, State Key Laboratory for Novel Software Technology, Nanjing, China
Other persons with the same name
- Bing Mao — disambiguation page
- Bing Mao 0002 — Shenzhen University, Shenzhen, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c54]Zhengjie Du, Yuekang Li, Yaowen Zheng, Xiaohan Zhang, Cen Zhang, Yi Liu, Sheikh Mahbub Habib, Xinghua Li, Linzhang Wang, Yang Liu, Bing Mao:
Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations. WWW 2024: 1668-1679 - [i8]Xiaohan Zhang, Cen Zhang, Xinghua Li, Zhengjie Du, Yuekang Li, Yaowen Zheng, Yeting Li, Bing Mao, Yang Liu, Robert H. Deng:
A Survey of Protocol Fuzzing. CoRR abs/2401.01568 (2024) - [i7]Haiyang Wei, Zhengjie Du, Haohui Huang, Yue Liu, Guang Cheng, Linzhang Wang, Bing Mao:
Inferring State Machine from the Protocol Implementation via Large Langeuage Model. CoRR abs/2405.00393 (2024) - 2023
- [j11]Chengbin Pang, Hongbin Liu, Yifan Wang, Neil Zhenqiang Gong, Bing Mao, Jun Xu:
Generation-based fuzzing? Don't build a new generator, reuse! Comput. Secur. 129: 103178 (2023) - [j10]Ligeng Chen, Yi Qian, Yuyang Wang, Bing Mao:
Nimbus++: Revisiting Efficient Function Signature Recovery with Depth Data Analysis. Int. J. Softw. Eng. Knowl. Eng. 33(10): 1537-1565 (2023) - [j9]Xuguo Wang, Ligeng Chen, Yuyang Wang, Hao Huang, Bing Mao:
EVaDe: Efficient and Lightweight Mirai Variants Detection via Approximate Largest Submatrix Search. Int. J. Softw. Eng. Knowl. Eng. 33(10): 1599-1618 (2023) - [c53]Chengbin Pang, Tiantai Zhang, Xuelan Xu, Linzhang Wang, Bing Mao:
OCFI: Make Function Entry Identification Hard Again. ISSTA 2023: 804-815 - [c52]Jianhao Xu, Luca Di Bartolomeo, Flavio Toffalini, Bing Mao, Mathias Payer:
WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches. SP 2023: 1271-1288 - [c51]Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, Bing Mao:
Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs. USENIX Security Symposium 2023: 3655-3672 - 2022
- [c50]Zhengjie Du, Yuekang Li, Yang Liu, Bing Mao:
Windranger: A Directed Greybox Fuzzer driven by Deviation Basic Blocks. ICSE 2022: 2440-2451 - [c49]Yi Qian, Ligeng Chen, Yuyang Wang, Bing Mao:
Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing and Multi-Task Learning. QRS 2022: 454-463 - [c48]Ligeng Chen, Zhongling He, Hao Wu, Yuhang Gong, Bing Mao:
AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method. TrustCom 2022: 217-224 - [c47]Chengbin Pang, Tiantai Zhang, Ruotong Yu, Bing Mao, Jun Xu:
Ground Truth for Binary Disassembly is Not Easy. USENIX Security Symposium 2022: 2479-2495 - [c46]Ligeng Chen, Zhongling He, Hao Wu, Fengyuan Xu, Yi Qian, Bing Mao:
DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy. SANER 2022: 112-122 - [i6]Ligeng Chen, Zhongling He, Hao Wu, Yuhang Gong, Bing Mao:
AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method. CoRR abs/2208.14221 (2022) - [i5]Yi Qian, Ligeng Chen, Yuyang Wang, Bing Mao:
Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing and Multi-Task Learning. CoRR abs/2211.04219 (2022) - 2021
- [j8]Dongliang Mu, Yunlan Du, Jianhao Xu, Jun Xu, Xinyu Xing, Bing Mao, Peng Liu:
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis. IEEE Trans. Software Eng. 47(9): 1929-1942 (2021) - [c45]Chengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis, Bing Mao, Jun Xu:
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask. SP 2021: 833-851 - [c44]Ligeng Chen, Jian Guo, Zhongling He, Dongliang Mu, Bing Mao:
RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability. TrustCom 2021: 91-98 - [i4]Ligeng Chen, Jian Guo, Zhongling He, Dongliang Mu, Bing Mao:
RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability. CoRR abs/2110.12989 (2021) - 2020
- [c43]Ligeng Chen, Zhongling He, Bing Mao:
CATI: Context-Assisted Type Inference from Stripped Binaries. DSN 2020: 88-98 - [c42]Yunlan Du, Zhenyu Ning, Jun Xu, Zhilong Wang, Yueh-Hsun Lin, Fengwei Zhang, Xinyu Xing, Bing Mao:
HART: Hardware-Assisted Kernel Module Tracing on Arm. ESORICS (1) 2020: 316-337 - [i3]Sijia Geng, Yuekang Li, Yunlan Du, Jun Xu, Yang Liu, Bing Mao:
An Empirical Study on Benchmarks of Artificial Software Vulnerabilities. CoRR abs/2003.09561 (2020) - [i2]Chengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis, Bing Mao, Jun Xu:
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask. CoRR abs/2007.14266 (2020)
2010 – 2019
- 2019
- [j7]Lingyun Situ, Linzhang Wang, Yang Liu, Bing Mao, Xuandong Li:
Automatic Detection and Repair Recommendation for Missing Checks. J. Comput. Sci. Technol. 34(5): 972-992 (2019) - [c41]Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. AsiaCCS 2019: 633-645 - [c40]Dongliang Mu, Wenbo Guo, Alejandro Cuevas, Yueqi Chen, Jinxuan Gai, Xinyu Xing, Bing Mao, Chengyu Song:
RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis. ASE 2019: 924-935 - [i1]Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. CoRR abs/1905.10499 (2019) - 2018
- [c39]Chengbin Pang, Yunlan Du, Bing Mao, Shanqing Guo:
Mapping to Bits: Efficiently Detecting Type Confusion Errors. ACSAC 2018: 518-528 - [c38]Zhilong Wang, Xuhua Ding, Chengbin Pang, Jian Guo, Jun Zhu, Bing Mao:
To Detect Stack Buffer Overflow with Polymorphic Canaries. DSN 2018: 243-254 - [c37]Yixiao Gao, Yuchen Yang, Chen Tian, Jiaqi Zheng, Bing Mao, Guihai Chen:
DCQCN+: Taming Large-Scale Incast Congestion in RDMA over Ethernet Networks. ICNP 2018: 110-120 - [c36]Lingyun Situ, Liang Zou, Linzhang Wang, Yang Liu, Bing Mao, Xuandong Li:
Detecting missing checks for identifying insufficient attack protections. ICSE (Companion Volume) 2018: 238-239 - [c35]Lingyun Situ, Linzhang Wang, Yang Liu, Bing Mao, Xuandong Li:
Vanguard: Detecting Missing Checks for Prognosing Potential Vulnerabilities. Internetware 2018: 5:1-5:10 - [c34]Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang:
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities. USENIX Security Symposium 2018: 919-936 - 2017
- [j6]Yongfeng Li, Jinbin Ouyang, Bing Mao, Kai Ma, Shanqing Guo:
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks. EAI Endorsed Trans. Security Safety 4(11): e2 (2017) - [j5]Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Impeding behavior-based malware analysis via replacement attacks to malware specifications. J. Comput. Virol. Hacking Tech. 13(3): 193-207 (2017) - [c33]Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu:
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon. DSN 2017: 451-462 - [c32]Junjie Tang, Xingmin Cui, Ziming Zhao, Shanqing Guo, Xin-Shun Xu, Chengyu Hu, Tao Ban, Bing Mao:
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps. ICST 2017: 492-499 - [c31]Dongliang Mu, Jia Guo, Wenbiao Ding, Zhilong Wang, Bing Mao, Lei Shi:
ROPOB: Obfuscating Binary Code via Return Oriented Programming. SecureComm 2017: 721-737 - [c30]Jun Zhu, Weiping Zhou, Zhilong Wang, Dongliang Mu, Bing Mao:
DiffGuard: Obscuring Sensitive Information in Canary Based Protections. SecureComm 2017: 738-751 - [c29]Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, Bing Mao:
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. USENIX Security Symposium 2017: 17-32 - 2016
- [c28]Yongfeng Li, Jinbin Ouyang, Shanqing Guo, Bing Mao:
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling. SecureComm 2016: 637-654 - 2015
- [c27]Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications. ACNS 2015: 497-517 - [c26]Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu:
A Practical Approach for Adaptive Data Structure Layout Randomization. ESORICS (1) 2015: 69-89 - [c25]Yongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao:
Detection, Classification and Characterization of Android Malware Using API Data Dependency. SecureComm 2015: 23-40 - [c24]Dan Ping, Xin Sun, Bing Mao:
TextLogger: inferring longer inputs on touch screen using motion sensors. WISEC 2015: 24:1-24:12 - 2014
- [c23]Rui Wu, Ping Chen, Peng Liu, Bing Mao:
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs. DSN 2014: 574-585 - [c22]Wenbiao Ding, Xiao Xing, Ping Chen, Zhi Xin, Bing Mao:
Automatic construction of printable return-oriented programming payload. MALWARE 2014: 18-25 - [c21]Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie:
Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph. SEC 2014: 142-155 - [c20]Xuerui Pan, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang:
Defensor: Lightweight and Efficient Security-Enhanced Framework for Android. TrustCom 2014: 260-267 - [c19]Tong Shen, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang:
Detect Android Malware Variants Using Component Based Topology Graph. TrustCom 2014: 406-413 - 2013
- [j4]Ping Chen, Rui Wu, Bing Mao:
JITSafe: a framework against Just-in-time spraying attacks. IET Inf. Secur. 7(4): 283-292 (2013) - [c18]Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie:
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware. AsiaCCS 2013: 353-358 - 2012
- [j3]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:
Replacement attacks: automatically evading behavior-based software birthmark. Int. J. Inf. Sec. 11(5): 293-304 (2012) - [c17]Rui Wu, Ping Chen, Bing Mao, Li Xie:
RIM: A Method to Defend from JIT Spraying Attack. ARES 2012: 143-148 - [c16]Ping Chen, Dongyan Xu, Bing Mao:
CloudER: a framework for automatic software vulnerability location and patching in the cloud. AsiaCCS 2012: 50 - [c15]Feifei Wang, Ping Chen, Bing Mao, Li Xie:
RandHyp: Preventing Attacks via Xen Hypercall Interface. SEC 2012: 138-149 - 2011
- [c14]Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen, Xinchun Yin:
Automatic construction of jump-oriented programming shellcode (on the x86). AsiaCCS 2011: 20-29 - [c13]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:
Replacement Attacks on Behavior Based Software Birthmark. ISC 2011: 1-16 - [c12]Ping Chen, Yi Fang, Bing Mao, Li Xie:
JITDefender: A Defense against JIT Spraying Attacks. SEC 2011: 142-153 - 2010
- [c11]Ping Chen, Xiao Xing, Bing Mao, Li Xie:
Return-Oriented Rootkit without Returns (on the x86). ICICS 2010: 340-354 - [c10]Ping Chen, Xiao Xing, Hao Han, Bing Mao, Li Xie:
Efficient Detection of the Return-Oriented Programming Malicious Code. ICISS 2010: 140-155 - [c9]Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie:
Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation. ISC 2010: 181-195
2000 – 2009
- 2009
- [c8]Ping Chen, Yi Wang, Zhi Xin, Bing Mao, Li Xie:
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. ARES 2009: 208-215 - [c7]Yi Wang, Ping Chen, Yi Ge, Bing Mao, Li Xie:
Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. ARES 2009: 349-354 - [c6]Ping Chen, Hao Han, Yi Wang, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie:
IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program. ICICS 2009: 336-345 - [c5]Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie:
DROP: Detecting Return-Oriented Programming Malicious Code. ICISS 2009: 163-177 - 2006
- [c4]Zhiqiang Lin, Bing Mao, Li Xie:
A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. ARES 2006: 348-357 - [c3]Nai Xia, Bing Mao, Qingkai Zeng, Li Xie:
Efficient and Practical Control Flow Monitoring for Program Security. ASIAN 2006: 90-104 - [c2]Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie:
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. ISC 2006: 17-31 - 2005
- [j2]Zhiqiang Lin, Chao Wang, Bing Mao, Li Xie:
A policy flexible architecture for secure operating system. ACM SIGOPS Oper. Syst. Rev. 39(3): 24-33 (2005) - 2004
- [j1]Jiannong Cao, Ying Liu, Li Xie, Bing Mao, Kang Zhang:
The design and implementation of a runtime system for graph-oriented parallel and distributed programming. J. Syst. Softw. 72(3): 389-399 (2004)
1990 – 1999
- 1999
- [c1]Chengkai Li, Bing Mao, Daoxu Chen, Li Xie:
Object Mapping for Layered Cooperative Systems. TOOLS (31) 1999: 67-76
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 21:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint