当前位置: X-MOL首页全球导师 国内导师 › 张超

个人简介

教育背景 理学学士(数学),北京大学,中国,2004.9-2008.7 理学博士(计算机),北京大学,中国,2008.9-2013.7 工作履历 博士后,UC Berkeley,美国,2013.9-2016.9 副教授,清华大学,中国,2016.11-今 社会兼职 清华大学副教授,博士生导师 中国科学院·信息工程研究所·客座研究员(客座博导) 中国科学院·软件所·客座研究员 中国科学院·网络测评技术重点实验室·学术委员会委员 计算机学会·YOCSEF·委员 人工智能学会·人工智能与安全专委会·常务委员 Cybersecurity(Springer)期刊编委 IEEE S&P,CCS,RAID,ASIACCS等学术会议TPC 奖励与荣誉 中国区35岁以下科技创新35人(MIT TR35 China,2018) 中国计算机学会“青年人才发展计划”(2017) DARPA CGC 自动化攻防初赛防护第一名(2015),决赛攻击第二名(2016) Defcon CTF夺旗攻防赛第二名(2016)第五名(2015,2017) Microsoft BlueHat Prize Contest 特别提名奖(2012)

研究领域

软件与系统安全 漏洞、攻防、恶意代码 AI与安全 物联网及区块链等应用安全 软件分析、虚拟化等技术

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

SHAPFUZZ: Efficient Fuzzing via Shapley-Guided Byte Selection Kunpeng Zhang, Xiaogang Zhu†, Xiao Xi, Minhui Xue, Chao Zhang, Sheng Wen To appear in Network and Distributed System Security Symposium (NDSS’24), San Diego, California, Feb 2024 Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild Zhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu, Jia Zhang, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, and Min Yang To appear in ACM Conference on Computer and Communications Security (CCS’23), Copenhagen, Denmark, Nov 2023 One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training Jianshuo Dong, Han Qiu, Yiming Li, Tianwei Zhang, Yuanjie Li, Zeqi Lai, Chao Zhang, Shu-Tao Xia To appear in International Conference on Computer Vision (ICCV’23), Paris, France, Oct 2023 One Simple API Can Cause Hundreds of Bugs: An Analysis of Refcounting Bugs in All Modern Linux Kernels Liang He, Purui Su, Chao Zhang, Yan Cai, Jinxin Ma To appear in 29th ACM Symposium on Operating Systems Principles (SOSP’23), Koblenz, Germany, Oct 2023 Thunderkaller: Profiling and Improving the Performance of Syzkaller Yang Lan, Di Jin, Zhun Wang, Wende Tan, Zheyu Ma, Chao Zhang* To appear in 38th IEEE/ACM International Conference on Automated Software Engineering (ASE’23), Kirchberg, Luxembourg, Sep 2023 KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations Tingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, and Chao Zhang* To appear in 32nd USENIX Security Symposium (Sec’23), ANAHEIM, CA, USA, Aug 2023 DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing Ming Yuan, Bodong Zhao, Penghui Li, Jiashuo Liang, Xinhui Han, Xiapu Luo, and Chao Zhang* To appear in 32nd USENIX Security Symposium (Sec’23), ANAHEIM, CA, USA, Aug 2023 MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, and Chao Zhang* To appear in 32nd USENIX Security Symposium (Sec’23), ANAHEIM, CA, USA, Aug 2023 AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, and Chao Zhang* To appear in 32nd USENIX Security Symposium (Sec’23), ANAHEIM, CA, USA, Aug 2023 Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference Yun Li, Yifan Song, Yufei Duan, Zhicong Huang, Cheng Hong, and Chao Zhang To appear in 32nd USENIX Security Symposium (Sec’23), ANAHEIM, CA, USA, Aug 2023 AlphaEXP: An Expert System for Identifying Security-Sensitive Kernel Objects Ruipeng Wang, Kaixiang Chen, Chao Zhang, Siliang Qin, Zulie Pan, Shenglin Xu, Min Zhang, Qianyu Li, and Yang Li To appear in 32nd USENIX Security Symposium (Sec’23), ANAHEIM, CA, USA, Aug 2023 Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, and Chao Zhang To appear in 32nd USENIX Security Symposium (Sec’23), ANAHEIM, CA, USA, Aug 2023 Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack Run Guo, Jianjun Chen, Yihang Wang, Keran Mu, Baojun Liu, Xiang Li, Chao Zhang, Haixin Duan, Jianping Wu To appear in 32nd USENIX Security Symposium (Sec’23), ANAHEIM, CA, USA, Aug 2023 PTStore: Lightweight Architectural Support for Page Table Isolation Wende Tan, Yangyu Chen, Yuan Li, Ying Liu, Jianping Wu, Yu Ding, and Chao Zhang* In Design Automation Conference (DAC’23), San Francisco, CA, USA, July 9-13 2023 MPass: Bypassing Learning-based Static Malware Detectors Jialai Wang, Wenjie Qu, Yi Rong, Han Qiu, Qi Li, Zongpeng Li, and Chao Zhang In Design Automation Conference (DAC’23), San Francisco, CA, USA, July 9-13 2023 1dFuzz: Reproduce 1-day Vulnerabilities with Directed Differential Fuzzing Songtao Yang, Yubo He, Kaixiang Chen, Zheyu Ma, Xiapu Luo, Yong Xie, Jianjun Chen, and Chao Zhang* In ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA’23), Seattle, Washington, United States, July 2023 RaceBench: A Triggerable and Observable Concurrency Bug Benchmark Jiashuo Liang, Ming Yuan, Zhanzhao Ding, Siqi Ma, Xinhui Han*, and Chao Zhang In ACM Conference on Computer and Communications Security (ASIACCS’23), Melbourne Australia, July 2023 Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning Wenyu Zhu, Zhiyao Feng, Zihan Zhang, Jianjun Chen, Zhijian Ou, Min Yang, Chao Zhang* In IEEE Security & Privacy 2023 (IEEE S&P’23), San Francisco, CA, May 2023 ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing Sicong Cao, Biao He, Xiaobing Sun, Yu Ouyang, Chao Zhang, Xiaoxue Wu, Ting Su, Lili Bo, Bin Li, Chuanlei Ma, Jiajia Li, and Tao Wei In IEEE Security & Privacy 2023 (IEEE S&P’23), San Francisco, CA, May 2023 RoChBert: Towards Robust BERT Fine-tuning for Chinese Zihan Zhang, Jinfeng Li, Ning Shi, Bo Yuan, Xiangyu Liu, Rong Zhang, Hui Xue, Donghong Sun, Chao Zhang* In the 2022 Conference on Empirical Methods in Natural Language Processing (EMNLP-findings’22), Abu Dhabi, Dec 2022 PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication Yuan Li, Wende Tan, Zhizheng Lv, Songtao Yang, Mathias Payer, Ying Liu, Chao Zhang* In ACM Conference on Computer and Communications Security (CCS’22), Los Angeles, CA, USA, Nov 2022 Evocatio: Conjuring Bug Capabilities from a Single PoC Zhiyuan Jiang, Shuitao Gan, Adrian Herrera, Flavio Toffalini, Lucio Romerio, Chaojing Tang, Manuel Egele, Chao Zhang, Mathias Payer In ACM Conference on Computer and Communications Security (CCS’22), Los Angeles, CA, USA, Nov 2022 HTFuzz: Heap Operation Sequence Sensitive Fuzzing Yuanping Yu, Xiangkun Jia, Yuwei Liu, Yanhao Wang, Qian Sang, Chao Zhang, Purui Su In 37th IEEE/ACM International Conference on Automated Software Engineering (ASE’22), Oakland Center, Michigan, United States, Oct 2022 StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing Bodong Zhao, Zheming Li, Shisong Qin, Zheyu Ma, Ming Yuan, Wenyu Zhu, Zhihong Tian, Chao Zhang* In 31st USENIX Security Symposium (Sec’22), BOSTON, MA, USA, Aug 2022 AutoDA: Automated Decision-based Iterative Adversarial Attacks Qi-An Fu, Yinpeng Dong, Hang Su, Jun Zhu*, Chao Zhang In 31st USENIX Security Symposium (Sec’22), BOSTON, MA, USA, Aug 2022 jTrans: Jump-Aware Transformer for Binary Code Similarity Detection Hao Wang, Wenjie Qu, Gilad Katz, Wenyu Zhu, Zeyu Gao, Han Qiu, Jianwei Zhuge, Chao Zhang* In the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA’22), Daejeon, South Korea, July 2022 BET: Black-box Efficient Testing for Convolutional Neural Networks Jialai Wang, Han Qiu*, Yi Rong, Hengkai Ye, Qi Li, Zongpeng Li, Chao Zhang*. In the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA’22), Daejeon, South Korea, July 2022 PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation Zheyu Ma, Bodong Zhao, Letu Ren, Zheming Li, Siqi Ma, Xiapu Luo, Chao Zhang* In the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA’22), Daejeon, South Korea, July 2022 NCScope: Hardware-Assisted Analyzer for Native Code in Android Apps Hao Zhou, Shuohan Wu, Xiapu Luo*, Ting Wang, Yajin Zhou, Chao Zhang, Haipeng Cai In the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA’22), Daejeon, South Korea, July 2022 Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange Pengcheng Xia, Haoyu Wang*, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu In ACM SIGMETRICS 2022, Mumbai, India, June 2022 面向缓解机制评估的自动化信息泄漏方法 杨松涛,陈凯翔,王准,张超* 中国软件大会系统软件安全论坛, 西安,2021年12月 An Empirical Study on Implicit Constraints in Smart Contract Static Analysis Tingting Yin, Chao Zhang*, Yuandong Ni, Yixiong Wu, Taiyu Wong, Xiapu Luo, Zheming Li, Yu Guo In 44th International Conference on Software Engineering (ICSE-SEIP 2022), Pittsburgh, PA, USA, May 2022 ROLoad: Securing Sensitive Operations with Pointee Integrity Wende Tan, Yuan Li, Chao Zhang*, Xingman Chen, Songtao Yang, Ying Liu, Jianping Wu In Design Automation Conference (DAC’21), San Francisco, Dec 2021 Igor: Crash Deduplication Through Root-Cause Clustering Zhiyuan Jiang, Xiyue Jiang, Ahmad Hazimeh, Chaojing Tang, Chao Zhang*, Mathias Payer In the ACM Conference on Computer and Communications Security (CCS’21), virtual, Nov 2021 ZKCPlus: Optimized Fair-exchange Protocol Supporting Practical and Flexible Data Exchange Yun Li, Cun Ye, Yuguang Hu, Ivring Morpheus, Yu Guo, Chao Zhang*, Yupeng Zhang, Zhipeng Sun, Yiwen Lu, Haodi Wang In the ACM Conference on Computer and Communications Security (CCS’21), virtual, Nov 2021 VScape: Assessing and Escaping Virtual Call Protections Kaixiang Chen, Chao Zhang*, Tingting Yin, Xingman Chen, Lei Zhao In USENIX Security (Sec’21), virtual, Aug 2021 MAZE: Towards Automated Heap Feng Shui Yan Wang, Chao Zhang*, Zixuan Zhao, Bolun Zhang, Xiaorui Gong, Wei Zou In USENIX Security (Sec’21), virtual, Aug 2021 Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems Libo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan, Hong Hu, Jiaqi Linghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue In in USENIX Security (Sec’21), virtual, Aug 2021 RAProducer: Efficiently Diagnose and Reproduce Data Race Bugs for Binaries via Trace Analysis Ming Yuan, Yeseop Lee, Chao Zhang*, Yun Li, Yan Cai, Bodong Zhao In the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA’21), virtual, July 2021 iDEV: Exploring and Exploiting Semantic Deviations in ARM Instruction Processing Shisong Qin, Chao Zhang*, Kaixiang Chen, Zheming Li In the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA’21), virtual, July 2021 ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition Wei Xie, Chao Zhang, Penfei Wang, Zhenhua Wang, Qiang Yang In the 16th ACM ASIA Conference on Computer and Communications Security (ASIACCS’21), virtual, June 2021 Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software Bugs Guorui Yu, Shibin Zhao, Chao Zhang*, Zhiniang Peng, Yuandong Ni and Xinhui Han* In IEEE Conference on Computer Communications (INFOCOM’21), virtual, May 2021 POP and PUSH: Demystifying and Defending against (Mach) Port-Oriented Programming Min Zheng, Xiaolong Bai, Yajin Zhou, Chao Zhang, and Fuping Qu In the Network and Distributed System Security Symposium (NDSS’21), virtual, Feb 2021 12. CANCloak: Deceiving Two ECUs with One Frame Li Yue, Zheming Li, Tingting Yin, Chao Zhang* In Workshop on Automotive and Autonomous Vehicle Security (AutoSec’21), virtual, Feb 2021 1. Finding Cracks in Shields: On the Security of Control Flow Integrity Mechanisms Yuan Li, Mingzhe Wang, Chao Zhang*, Xingman Chen, Songtao Yang, Ying Liu In the ACM Conference on Computer and Communications Security (CCS’20), virtual, Nov 2020 Argot: Generating Adversarial Readable Chinese Texts Zihan Zhang, Mingxuan Liu, Chao Zhang*, Yiming Zhang, Zhou Li, Qi Li, Haixin Duan, Donghong Sun. In the 29th International Joint Conference on Artificial Intelligence (IJCAI’20), virtual, Jan 2021 3. FANS: Fuzzing Android Native System Services via Automated Interface Analysis Baozheng Liu, Chao Zhang*, Guang Gong, Yishun Zeng, Haifeng Ruan, Jianwei Zhuge*. In the 29th USENIX Security Symposium (Sec’20), virtual, Aug 2020 4. GreyOne: Data-Flow Sensitive Fuzzing Shuitao Gan, Chao Zhang*, Xiaojun Qin, Peng Chen, Bodong Zhao, Zuoning Chen In the 29th USENIX Security Symposium (Sec’20), virtual, Aug 2020 A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons Learned Bingchang Liu, Guozhu Meng*, Wei Zou, Qi Gong, Feng Li, Min Lin, Dandan Sun, Wei Huo, Chao Zhang. In the International Conference on Software Engineering (ICSE 2020), virtual, July 2020 6. DRAMD: Detect Advanced DRAM-based Stealthy Communication Channels with Neural Networks Zhiyuan Lv, Youjian Zhao, Chao Zhang*, Haibin Li In the IEEE Conference on Computer Communications (INFOCOM’20), virtual, July 2020 SRFuzzer: An Automatic Fuzzing Framework for Physical SOHO Router Devices to Discover Multi-Type Vulnerabilities Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Haoliang Lu, Longquan Liu, Chen Wang, and Dandan Sun, Chao Zhang, Baoxu Liu In the 35th Annual Computer Security Applications Conference (ACSAC’19) Fuzzing IPC with Knowledge Inference Kun Yang, Hanqing Zhao, Chao Zhang*, Jianwei Zhuge and Haixin Duan In the 38th International Symposium on Reliable Distributed Systems (SRDS’19) MOPT: Optimized Mutation Scheduling for Fuzzers Chenyang Lyu, Shouling Ji*, Chao Zhang*, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah In the 28th USENIX Security Symposium (Sec’19), Santa Clara, CA, Aug 2019 Revery: from Proof-of-Concept to Exploitable (One Step towards Automatic Exploit Generation) Yan Wang, Chao Zhang*, Xiaobo Xiang, Zixuan Zhao, Wenjie Li, Xiaorui Gong*, Bingchang Liu, Kaixiang Chen, Wei Zou In the ACM Conference on Computer and Communications Security (CCS’18), Toronto, Canada, Oct 2018 Abusing CDNs for Fun and Profit: Security Issues in CDNs’ Origin Validation Run Guo, Jianjun Chen, Baojun Liu, Jia Zhang*, Chao Zhang*, Haixin Duan, Tao Wan, Jian Jiang, Shuang Hao, Yaoqi Jia In 37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), Bahia, Brazil, Oct 2018 αDiff: Cross-Version Binary Code Similarity Detection with DNN Bingchang Liu, Wei Huo*, Chao Zhang*, Wenchao Li, Feng Li, Aihua Piao, Wei Zou In IEEE/ACM Automated Software Engineering (ASE’18), Montpellier, France, Sep 2018 ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software Kun Yang, Yuan Deng, Chao Zhang, Jianwei Zhuge and Haixin Duan In Information Security Conference (ISC’18), London, UK, Sep 2018 CollAFL: Path Sensitive Fuzzing Shuitao Gan, Chao Zhang*, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, Zuoning Chen In IEEE Security & Privacy 2018 (IEEE S&P’18), San Francisco, CA, May 2018 Towards Efficient Heap Overflow Discovery Xiangkun Jia, Chao Zhang*, Purui Su*, Yi Yang, Huafeng Huang, Dengguo Feng In the 26th {USENIX} Security Symposium (Sec’17), Vancouver, BC, Aug 2017 VTrust: Regaining Trust on Virtual Calls Chao Zhang, Scott A. Carr, Tongxin Li, Yu Ding, Chengyu Song, Mathias Payer, Dawn Song In the Network and Distributed System Security Symposium (NDSS’16), San Diego, CA, Feb 2016 VTint: Protecting Virtual Function Tables’ Integrity Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaofeng Chen, Dawn Song In the Network and Distributed System Security Symposium (NDSS’15), San Diego, CA, Feb 2015 Exploiting and Protecting Dynamic Code Generation Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski In the Network and Distributed System Security Symposium (NDSS’15), San Diego, CA, Feb 2015 JITScope: Protecting Web Users from Control-Flow Hijacking Attacks Chao Zhang, Mehrdad Niknami, Kevin Zhijie Chen, Chengyu Song, Zhaofeng Chen, Dawn Song In the 34th Annual IEEE International Conference on Computer Communications (INFOCOM’15), Hong Kong, China, April 2015 The Store-and-Flood Distributed Reflective Denial of Service Attack Bingshuang Liu, Skyler Berg, Jun Li, Tao Wei, Chao Zhang, Xinhui Han In the 23rd International Conference on Computer Communications and Networks (ICCCN‘14), Shanghai, China, Aug 2014 Android Low Entropy Demystified Yu Ding, Zhuo Peng, Yuanyuan Zhou, Chao Zhang In IEEE International Conference on Communications (ICC’14), Sydney, Australia, June 2014 Splider: A Split-based Crawler of the BT-DHT Network and its Applications Bingshuang Liu, Shidong Wu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang, Yu Chen, Chen Li In the 11th Annual IEEE Consumer Communications & Networking Conference (CCNC’14), Las Vegas, Nevada, Jan 2014 Practical Control Flow Integrity & Randomization for Binary Executables Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, Wei Zou. In the 34th IEEE Symposium on Security & Privacy (IEEE S&P’13), San Francisco, CA, May 2013. Protecting Function Pointers in Binary Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres. In the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS’13), Hangzhou, China, May 2013. A Framework to Eliminate Backdoors from Response Computable Authentication Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Wei Zou, Zhenkai Liang. In the 33rd IEEE Symposium on Security and Privacy (IEEE S&P’12), San Francisco, CA, May 2012. IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time Chao Zhang, Tielei Wang, Tao Wei, Yu Chen, Wei Zou. In the 15th European Symposium on Research in Computer Security (ESORICS’10), Athens, Greece, Sep. 2010. NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing Shisong Qin, Fan Hu, Zheyu Ma, Bodong Zhao, Tingting Yin, Chao Zhang* Accepted by ACM Transactions on Software Engineering and Methodology (TOSEM), 2023 Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration Ruipeng Wang, Kaixiang Chen, Zulie Pan, Yuwei Li, Qianyu Li, Yang Li, Min Zhang, Chao Zhang Computers & Security (COSE), 2023, 124: 102995 TAICHI: Transform Your Secret Exploits Into Mine From a Victim’s Perspective Zhongyu Pei, Xingman Chen, Songtao Yang, Haixin Duan, Chao Zhang* Accepted by Transactions on Dependable and Secure Computing (TDSC), 2022 Automatic Generation of Adversarial Readable Chinese Texts Mingxuan Liu, Zihan Zhang, Chao Zhang*, Zhou Li, Qi Li, Haixin Duan*, Donghong Sun In Transactions on Dependable and Secure Computing (TDSC), 20(2): 1756-1770 (2023) BATscope:比特币恶意地址及混币交易识别 王大宇,殷婷婷,李赟,秦嗣量,任歆,罗夏朴,王浩宇,尹霞,张超* Accepted by 信息安全学报 CAMFuzz: Explainable Fuzzing with Local Interpretation Ji Shi, Wei Zou, Chao Zhang*, Lingxiao Tan, Yanyan Zou, Yue Peng, Wei Huo Cybersecurity 5, 17 (2022) 面向缓解机制评估的自动化信息泄漏方法 杨松涛,陈凯翔,王准,张超* 软件学报, 2022, 33(6):0 Path Sensitive Fuzzing for Native Applications Shuitao Gan, Chao Zhang*, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, and Zuoning Chen In Transactions on Dependable and Secure Computing (TDSC), vol. 19, no. 3, pp. 1544-1561, 1 May-June 2022 Windows平台恶意软件智能检测综述 汪嘉来, 张超*, 戚旭衍, 荣易. 计算机研究与发展, 2021, 58(5): 977-994 ESRFuzzer: An Enhanced Fuzzing Framework for Physical SOHO Router Devices to Discover Multi-Type Vulnerabilities Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Longquan Liu, Yanyan Zou*, Chao Zhang, Baoxu Liu. Cybersecur, 4, 24 (2021) 智能合约安全漏洞研究综述 倪远东, 张超*, 殷婷婷 信息安全学报, 2020, 5(3): 78-99 程序逆向分析在软件供应链污染检测中的应用:研究综述 武振华,张超*,孙贺,颜学雄 计算机应用, 2020 40(1): 103-115 From Proof-of-Concept to Exploitable (One Step towards Automatic Exploitability Assessment) Wang, Yan, Wei Wu, Chao Zhang, Xinyu Xing, Xiaorui Gong*, and Wei Zou. Cybersecurity, 2, 12 (2019) 程序分析研究进展 张健,张超,玄跻峰,熊英飞,王千祥,梁彬,李炼,窦文生,陈振邦,陈立前,蔡彦 软件学报,2019,30(1):0 Fuzzing: a survey Jun Li, Bodong Zhao, Chao Zhang* Cybersecurity, 2018 1(1) Glibc 堆利用的若干方法 裴中煜, 张超*, 段海新 信息安全学报, 2018, 3(1): 1-15 二进制程序中的use-after-free漏洞检测技术 韩心慧, 魏爽, 叶佳奕, 张超, 叶志远 清华大学学报(自然科学版), 2017, 57(10): 1022-1029 基于敏感字符的 SQL注入攻击防御方法 张慧琳, 丁羽, 张利华, 段镭, 张超, 韦韬, 李冠成, 韩心慧 计算机研究与发展,2016, 53(10): 2262-2276 Accurate and Efficient Exploit Capture and Classification Yu Ding, Tao Wei, Hui Xue, Yulong Zhang, Chao Zhang, Xinhui Han In SCIENCE CHINA Information Sciences (SCIS), 2017 60 052110:3 SF-DRDoS: The store-and-flood distributed reflective denial of service attack Bingshuang Liu, Jun Li, Tao Wei, Skyler Berg, Jiayi Ye, Chen Li, Chao Zhang, Jianyu Zhang, Xinhui Han In Computer Communications, 2015, 69: 107-115 Improving lookup reliability in Kad Bingshuang Liu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang In Peer-to-Peer Networking and Applications (PPNA), 2015, 8(1) Using Type Analysis in Compiler to Eliminate Integer-Overflow-to-Buffer-Overflow Threat. Chao Zhang, Wei Zou, Tielei Wang, Yu Chen, Tao Wei. In Journal of Computer Security (JCS), Vol. 19, No. 6, Dec. 2011

推荐链接
down
wechat
bug