scispace - formally typeset
Z

Zhenkai Liang

Researcher at National University of Singapore

Publications -  111
Citations -  5343

Zhenkai Liang is an academic researcher from National University of Singapore. The author has contributed to research in topics: Web page & Web application. The author has an hindex of 30, co-authored 100 publications receiving 4560 citations. Previous affiliations of Zhenkai Liang include Stony Brook University & Carnegie Mellon University.

Papers
More filters
Book ChapterDOI

BitBlaze: A New Approach to Computer Security via Binary Analysis

TL;DR: An overview of the BitBlaze project, a new approach to computer security via binary analysis that focuses on building a unified binary analysis platform and using it to provide novel solutions to a broad spectrum of different security problems.
Proceedings ArticleDOI

Jump-oriented programming: a new class of code-reuse attack

TL;DR: This paper introduces a new class of code-reuse attack, called jump-oriented programming, which eliminates the reliance on the stack and ret instructions (including ret-like instructions such as pop+jmp) seen in return- oriented programming without sacrificing expressive power.
Proceedings ArticleDOI

Polyglot: automatic extraction of protocol message format using dynamic binary analysis

TL;DR: This paper proposes a new approach to protocol reverse engineering using program binaries, shadowing, which uses dynamic analysis and is based on a unique intuition - the way that an implementation of the protocol processes the received application data reveals a wealth of information about the protocol message format.
Proceedings ArticleDOI

Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks

TL;DR: This paper builds 3 end-to-end attacks to bypass randomization defenses without leaking addresses, to run a network bot which takes commands from the attacker, and to alter the memory permissions, demonstrating how the expressiveness offered by DOP significantly empowers the attacker.
Book ChapterDOI

Automatically Identifying Trigger-based Behavior in Malware

TL;DR: Malware often contains hidden behavior which is only activated when properly triggered, and such behavior trigger-based behavior is called trigger- based behavior.