Chengyu Song
Chengyu Song
Verified email at - Homepage
Cited by
Cited by
Spectre Returns! Speculation Attacks using the Return Stack Buffer
EM Koruyeh, KN Khasawneh, C Song, N Abu-Ghazaleh
USENIX Workshop on Offensive Technologies (WOOT), 2018
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation
Y Zheng, A Davanian, H Yin, C Song, H Zhu, L Sun
28th USENIX Security Symposium, 2019
Preventing Use-after-free with Dangling Pointers Nullification
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
Symposium on Network and Distributed System Security (NDSS), 2015
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks
K Lu, C Song, B Lee, SP Chung, T Kim, W Lee
2015 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2015
Studying malicious websites and the underground economy on the Chinese web
J Zhuge, T Holz, C Song, J Guo, X Han, W Zou
Managing information risk and the economics of security, 225-244, 2009
HDFI: Hardware-Assisted Data-flow Isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 2016
IotSan: fortifying the safety of IoT systems
DT Nguyen, C Song, Z Qian, SV Krishnamurthy, EJM Colbert, P McDaniel
International Conference on emerging Networking EXperiments and Technologies …, 2018
Enforcing Kernel Security Invariants with Data Flow Integrity
C Song, B Lee, K Lu, W Harris, T Kim, W Lee
Symposium on Network and Distributed System Security (NDSS), 2016
VTint: Defending virtual function tables' integrity
C Zhang, C Song, KZ Chen, Z Chen, D Song
Symposium on Network and Distributed System Security (NDSS), 2015
Safespec: Banishing the spectre of a meltdown with leakage-free speculation
KN Khasawneh, EM Koruyeh, C Song, D Evtyushkin, D Ponomarev, ...
2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019
Efficient Protection of Path-Sensitive Control Security
R Ding, C Qian, C Song, B Harris, T Kim, W Lee
26th USENIX Security Symposium (USENIX Security 17), 2017
Cross-checking semantic correctness: The case of finding file system bugs
C Min, S Kashyap, B Lee, C Song, T Kim
25th Symposium on Operating Systems Principles (SOSP), 361-377, 2015
Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems
S Li, A Neupane, S Paul, C Song, SV Krishnamurthy, AKR Chowdhury, ...
Symposium on Network and Distributed System Security (NDSS), 2019
Toward engineering a secure android ecosystem: A survey of existing techniques
M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ...
ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016
A11y attacks: Exploiting accessibility in operating systems
Y Jang, C Song, SP Chung, T Wang, W Lee
2014 ACM SIGSAC Conference on Computer and Communications Security (CCS …, 2014
Mimesis Aegis: A Mimicry Privacy Shield–A System’s Approach to Data Privacy on Public Cloud
B Lau, S Chung, C Song, Y Jang, W Lee, A Boldyreva
23rd USENIX conference on Security Symposium, 33-48, 2014
Collecting autonomous spreading malware using high-interaction honeypots
J Zhuge, T Holz, X Han, C Song, W Zou
Information and Communications Security: 9th International Conference, ICICS …, 2007
VTrust: Regaining Trust on Virtual Calls
C Zhang, SA Carr, T Li, Y Ding, C Song, M Payer, D Song
Symposium on Network and Distributed System Security (NDSS), 2016
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing
J Wang, Y Duan, W Song, H Yin, C Song
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
Type Casting Verification: Stopping an Emerging Attack Vector
B Lee, C Song, T Kim, W Lee
24th USENIX Security Symposium (USENIX Security 15), 2015
The system can't perform the operation now. Try again later.
Articles 1–20