The SCEAS System
Navigation Menu

Search the dblp DataBase


Zhenkai Liang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhenkai Liang, R. Sekar
    Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:215-224 [Conf]
  2. Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
    Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:182-191 [Conf]
  3. Zhenkai Liang, R. Sekar
    Fast and automated generation of attack signatures: a basis for building self-protecting servers. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:213-222 [Conf]
  4. V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang
    An Approach for Secure Software Installation. [Citation Graph (0, 0)][DBLP]
    LISA, 2002, pp:219-226 [Conf]
  5. Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
    One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  6. Zhenkai Liang, R. Sekar, Daniel C. DuVarney
    Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2005, pp:375-378 [Conf]

  7. Polyglot: automatic extraction of protocol message format using dynamic binary analysis. [Citation Graph (, )][DBLP]

  8. Expanding Malware Defense by Securing Software Installations. [Citation Graph (, )][DBLP]

  9. AGIS: Towards automatic generation of infection signatures. [Citation Graph (, )][DBLP]

  10. BitBlaze: A New Approach to Computer Security via Binary Analysis. [Citation Graph (, )][DBLP]

  11. Test generation to expose changes in evolving programs. [Citation Graph (, )][DBLP]

  12. HookFinder: Identifying and Understanding Malware Hooking Behaviors. [Citation Graph (, )][DBLP]

  13. Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. [Citation Graph (, )][DBLP]

  14. Darwin: an approach for debugging evolving programs. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002