Selected Publications
CGO 2018 |
"Resilient Decentralized Android Application Repackaging Detection Using Logic Bombs" Qiang Zeng, Lannan Luo, Zhiyun Qian, Xiaojiang Du, and Zhoujun Li. International Symposium on Code Generation and Optimization, 2018. >> [PDF] [Slides] |
MobiSys 2017 |
"System Service Call-oriented Symbolic Execution of Android
Framework with Applications to Vulnerability Discovery and
Exploit Generation" Lannan Luo*, Qiang Zeng*, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, and Peng Liu. ( *Co-first authors) The 15th ACM International Conference on Mobile Systems, Applications, and Services, 2017. >> [PDF] [Slides] [Code] |
ICSE 2016 |
"SolMiner: Mining Distinct Solutions in Programs" Lannan Luo and Qiang Zeng. The 38th International Conference on Software Engineering, SEET track, 2016. >> [PDF] |
DSN 2015 |
"HeapTherapy: An Efficient End-to-end Solution against Heap Buffer Overflows" Qiang Zeng*, Mingyi Zhao*, and Peng Liu. ( *Co-first authors) The 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015. >> [PDF] |
DSN 2015 |
"Risk Assessment of Buffer 'Heartbleed' Over-read Vulnerabilities" (Practical Experience Report) Jun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, and Peng Liu. The 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015. >> [PDF] |
TKDE 2014 |
"Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation." Qiang Zeng, Mingyi Zhao, Peng Liu, Poonam Yadav, Seraphin Calo, and Jorge Lobo. IEEE Transactions on Knowledge and Data Engineering (TKDE), 2014. >> [PDF] |
CGO 2014 |
"DeltaPath: Precise and Scalable Calling Context Encoding." Qiang Zeng, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, and Peng Liu. International Symposium on Code Generation and Optimization (CGO), 2014. >> [PDF] [Slides] |
NDSS 2012 |
"Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring." Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, and Changzhen Hu. The 19th Annual Network and Distributed System Security Symposium (NDSS), 2012. >> [PDF] [Slides] |
PLDI 2011 |
"Cruiser: Concurrent Heap Buffer Overflow Monitoring Using Lock-free Data Structures." Qiang Zeng, Dinghao Wu, and Peng Liu. The 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2011. >> [PDF] [Slides] [Code] |
Other Publications
CNS 2018 |
"e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices." Haotian Chi, Longfei Wu, Xiaojiang Du, Qiang Zeng, and Paul Ratazzi. IEEE Conference on Communications and Network Security, 2018. >> To appear |
ICICS 2017 |
"Deobfuscation of Virtualization-obfuscated Code through Symbolic Execution and Compilation Optimization." Mingyue Liang, Zhoujun Li, Qiang Zeng, and Zhejun Fang. The 19th International Conference on Information and Communications Security, 2017. >> [PDF] |
Usenix Security 2017 |
"Deobfuscation of Virtualization-based Obfuscated Binary." Mingyue Liang, Zhoujun Li, Qiang Zeng, and Zhejun Fang. The 26th USENIX Security Symposium (Poster Session), 2017. |
Tech Report 2017 |
"On the Robustness of Stochastic Stealthy Network Against Android App Repackaging." Ravshanbek Norboev, Zakia Hossain, Lannan Luo, and Qiang Zeng Technical Report, 2017. >> [PDF] |
Tech Report 2014 |
"Tailored Application-specific System Call Tables." Qiang Zeng, Zhi Xin, Dinghao Wu, Peng Liu, and Bing Mao. Technical Report, 2014. >> [PDF] |
Oakland 2014 |
"Targeted Therapy for Program Bugs." Qiang Zeng, Mingyi Zhao, and Peng Liu. The 35th IEEE Symposium on Security and Privacy (Poster Session), 2014. >> [PDF] |
Book Chapter 2013 |
"Software Cruising: A New Technology for Building Concurrent Software Monitor." Dinghao Wu, Peng Liu, Qiang Zeng, and Donghai Tian. Invited paper, Secure Cloud Computing, Advances in Information Security Series, Springer, 2013. |
ACITA 2012 |
"Safe Query Processing for Pairwise Authorizations in Coalition Networks." Qiang Zeng, Jorge Lobo, Peng Liu, Seraphin Calo, and Poonam Yadav. The 6th Annual Conference of International Technology Alliance (ACITA), 2012. >> [PDF] [Slides] |
Patent 2013 |
"Method for Guarding a Monitoring Scope and Interpreting Partial Control Flow Contex." Junghwan Rhee, Hui Zhang, Nipun Arora, Geoff Jiang, and Qiang Zeng. Provisional application No.: 61/805,809, filed 2013. |
Patent 2012 |
"Log-driven Deployed Systems Monitoring with Relative Calling Context Encoding." Junghwan Rhee, Hui Zhang, Nipun Arora, Geoff Jiang, Kenji Yoshihira, and Qiang Zeng. Provisional application No.: 61/694,009, filed 2012. |