Bing Mao
Bing Mao
Computer Science, Nanjing University
Verified email at nju.edu.cn
Title
Cited by
Cited by
Year
DROP: Detecting return-oriented programming malicious code
P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie
International Conference on Information Systems Security, 163-177, 2009
2642009
Role-based access control model for CSCW systems
C Li, Y Zhan, B Mao, L Xie
RUAN JIAN XUE BAO 11 (7), 931-937, 2000
79*2000
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware
Y Zhongyang, Z Xin, B Mao, L Xie
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
702013
Detecting code reuse in android applications using component-based control flow graph
X Sun, Y Zhongyang, Z Xin, B Mao, L Xie
IFIP international information security conference, 142-155, 2014
672014
JITDefender: A defense against JIT spraying attacks
P Chen, Y Fang, B Mao, L Xie
IFIP International Information Security Conference, 142-153, 2011
582011
AutoPaG: towards automated software patch generation with source code root cause identification and repair
Z Lin, X Jiang, D Xu, B Mao, L Xie
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
582007
Automatic construction of jump-oriented programming shellcode (on the x86)
P Chen, X Xing, B Mao, L Xie, X Shen, X Yin
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
482011
设计计算机辅助协同工作系统的几个关键技术
茅兵, 杜兴, 谢立
计算机研究与发展 33 (4), 241-247, 1996
46*1996
Efficient detection of the return-oriented programming malicious code
P Chen, X Xing, H Han, B Mao, L Xie
International Conference on Information Systems Security, 140-155, 2010
452010
访问控制研究综述
赵亮, 茅兵, 谢立
计算机工程 30 (2), 1-2, 2004
45*2004
System call redirection: A practical approach to meeting real-world virtual machine introspection needs
R Wu, P Chen, P Liu, B Mao
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
442014
Textlogger: inferring longer inputs on touch screen using motion sensors
D Ping, X Sun, B Mao
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
412015
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th {USENIX} Security Symposium ({USENIX} Security 18), 919-936, 2018
402018
Brick: A binary tool for run-time detecting and locating integer-based vulnerability
P Chen, Y Wang, Z Xin, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 208-215, 2009
392009
A practical approach for adaptive data structure layout randomization
P Chen, J Xu, Z Lin, D Xu, B Mao, P Liu
European Symposium on Research in Computer Security, 69-89, 2015
352015
JITSafe: a framework against Just-in-time spraying attacks
P Chen, R Wu, B Mao
IET Information Security 7 (4), 283-292, 2013
342013
Detection, classification and characterization of android malware using api data dependency
Y Li, T Shen, X Sun, X Pan, B Mao
International Conference on Security and Privacy in Communication Systems, 23-40, 2015
322015
Detect android malware variants using component based topology graph
T Shen, Y Zhongyang, Z Xin, B Mao, H Huang
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
322014
A DAG-based security policy conflicts detection method
Y Jian, M Bing, X Li
Journal of Computer Research and Development 42 (7), 1108, 2005
302005
一种基于有向图模型的安全策略冲突检测方法
姚键, 茅兵, 谢立
计算机研究与发展 42 (7), 1108, 2005
282005
The system can't perform the operation now. Try again later.
Articles 1–20