[go: up one dir, main page]

Follow
Jiang Ming
Jiang Ming
Verified email at tulane.edu - Homepage
Title
Cited by
Cited by
Year
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection
L Luo, J Ming, D Wu, P Liu, S Zhu
22nd ACM SIGSOFT International Symposium on the Foundations of Software …, 2014
3182014
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
1772017
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
J Ming, D Xu, Y Jiang, D Wu
26th USENIX Security Symposium (USENIX Security’17)., 2017
1752017
iBinHunt: Binary Hunting with Inter-Procedural Control Flow
J Ming, M Pan, D Gao
15th Annual International Conference on Information Security and Cryptology …, 2012
1542012
TaintPipe: Pipelined Symbolic Taint Analysis
J Ming, DinghaoWu, G Xiao, J Wang, P Liu
24th USENIX Security Symposium (USENIX Security’15), 2015
1202015
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
J Ming, D Xu, L Wang, D Wu
22nd ACM Conference on Computer and Communications Security (CCS'15), 2015
1162015
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping
D Xu, J Ming, D Wu
38th IEEE Symposium on Security and Privacy (S&P'17), 2017
1142017
Windranger: A directed greybox fuzzer driven by deviation basic blocks
Z Du, Y Li, Y Liu, B Mao
Proceedings of the 44th International Conference on Software Engineering …, 2022
1072022
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost
B Cheng*, J Ming*, J Fu, G Peng, T Chen, X Zhang, JY Marion
25th ACM Conference on Computer and Communications Security (CCS'18)., 2018
1012018
Linear Obfuscation to Combat Symbolic Execution
Z Wang, J Ming, C Jia, D Gao
16th European Symposium on Research in Computer Security (ESORICS’11), 2011
992011
Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation
C Cao, L Guan, J Ming, P Liu
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
932020
Unleashing the hidden power of compiler optimization on binary code difference: an empirical study
X Ren, M Ho, J Ming, Y Lei, L Li
Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021
812021
VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification
D Xu, J Ming, Y Fu, D Wu
25th ACM Conference on Computer and Communications Security (CCS'18), 2018
782018
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
H Xu, Y Zhou, J Ming, M Lyu
Cybersecurity 3 (1), 9, 2020
772020
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
D Xu, J Ming, D Wu
19th Information Security Conference (ISC'16), 2016
692016
StraightTaint: Decoupled Offline Symbolic Taint Analysis
J Ming, D Wu, J Wang, G Xiao, P Liu
31st IEEE/ACM International Conference on Automated Software Engineering …, 2016
672016
{PolyCruise}: A {Cross-Language} dynamic information flow analysis
W Li, J Ming, X Luo, H Cai
31st USENIX Security Symposium (USENIX Security 22), 2513-2530, 2022
652022
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference
J Ming, D Xu, D Wu
30th IFIP TC-11 SEC International Information Security and Privacy …, 2015
572015
{Obfuscation-Resilient} executable payload extraction from packed malware
B Cheng, J Ming, EA Leal, H Zhang, J Fu, G Peng, JY Marion
30th USENIX Security Symposium (USENIX Security 21), 3451-3468, 2021
562021
{MBA-Blast}: Unveiling and simplifying mixed {Boolean-Arithmetic} obfuscation
B Liu, J Shen, J Ming, Q Zheng, J Li, D Xu
30th USENIX Security Symposium (USENIX Security 21), 1701-1718, 2021
522021
The system can't perform the operation now. Try again later.
Articles 1–20