What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zhiyun Qian
Google Scholar
69
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls.
Qing Deng
Juefei Pu
Zhaowei Tan
Zhiyun Qian
Srikanth V. Krishnamurthy
2025
conf/sp
SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection.
Keyu Man
Zhongjie Wang
Yu Hao
Shenghan Zheng
Xin'an Zhou
Yue Cao
Zhiyun Qian
2025
conf/sp
Redefining Indirect Call Analysis with KallGraph.
Guoren Li
Manu Sridharan
Zhiyun Qian
2025
conf/sp
SoK: Challenges and Paths Toward Memory Safety for eBPF.
Kaiming Huang
Mathias Payer
Zhiyun Qian
Jack Sampson
Gang Tan
Trent Jaeger
2025
conf/ndss
Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux Kernel.
Hang Zhang
Jangha Kim
Chuhong Yuan
Zhiyun Qian
Taesoo Kim
2025
conf/eurosp
The Danger of Packet Length Leakage: Off-path TCP/IP Hijacking Attacks Against Wireless and Mobile Networks.
Guancheng Li
Minghao Zhang
Jianjun Chen
Ge Dai
Pinji Chen
Huiming Liu
Yang Yu
Haixin Duan
Zhiyun Qian
2024
conf/ccs
Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects.
Kaiming Huang
Mathias Payer
Zhiyun Qian
Jack Sampson
Gang Tan
Trent Jaeger
2024
conf/ccs
Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks.
Xin'an Zhou
Qing Deng
Juefei Pu
Keyu Man
Zhiyun Qian
Srikanth V. Krishnamurthy
2024
conf/uss
OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget.
Rahul George
Mingming Chen
Kaiming Huang
Zhiyun Qian
Thomas La Porta
Trent Jaeger
2024
conf/uss
SymBisect: Accurate Bisection for Fuzzer-Exposed Vulnerabilities.
Zheng Zhang
Yu Hao
Weiteng Chen
Xiaochen Zou
Xingyu Li
Haonan Li
Yizhuo Zhai
Zhiyun Qian
Billy Lau
2024
conf/uss
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks.
Yizhuo Zhai
Zhiyun Qian
Chengyu Song
Manu Sridharan
Trent Jaeger
Paul L. Yu
Srikanth V. Krishnamurthy
2024
conf/sp
SyzGen++: Dependency Inference for Augmenting Kernel Driver Fuzzing.
Weiteng Chen
Yu Hao
Zheng Zhang
Xiaochen Zou
Dhilung Kirat
Shachee Mishra
Douglas Lee Schales
Jiyong Jang
Zhiyun Qian
2024
conf/eurosp
DNS Exfiltration Guided by Generative Adversarial Networks.
Abdulrahman Fahim
Shitong Zhu
Zhiyun Qian
Chengyu Song
Evangelos E. Papalexakis
Supriyo Chakraborty
Kevin S. Chan
Paul L. Yu
Trent Jaeger
Srikanth V. Krishnamurthy
2024
conf/ndss
SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem.
Xiaochen Zou
Yu Hao
Zheng Zhang
Juefei Pu
Weiteng Chen
Zhiyun Qian
2024
conf/ndss
K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel.
Zhengchuan Liang
Xiaochen Zou
Chengyu Song
Zhiyun Qian
2023
conf/uss
A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel.
Guoren Li
Hang Zhang
Jinmeng Zhou
Wenbo Shen
Yulei Sui
Zhiyun Qian
2023
conf/sp
SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.
Yu Hao
Guoren Li
Xiaochen Zou
Weiteng Chen
Shitong Zhu
Zhiyun Qian
Ardalan Amiri Sani
2022
conf/ccs
Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT.
Xin'an Zhou
Jiale Guan
Luyi Xing
Zhiyun Qian
2022
conf/uss
LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution.
Jian Liu
Lin Yi
Weiteng Chen
Chengyu Song
Zhiyun Qian
Qiuping Yi
2022
conf/uss
SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel.
Xiaochen Zou
Guoren Li
Weiteng Chen
Hang Zhang
Zhiyun Qian
2022
conf/uss
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
Xuewei Feng
Qi Li
Kun Sun
Zhiyun Qian
Gang Zhao
Xiaohui Kuang
Chuanpu Fu
Ke Xu
2022
conf/sp
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK.
Xuancheng Jin
Xuangan Xiao
Songlin Jia
Wang Gao
Dawu Gu
Hang Zhang
Siqi Ma
Zhiyun Qian
Juanru Li
2022
conf/ndss
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Xuewei Feng
Qi Li
Kun Sun
Ke Xu
Baojun Liu
Xiaofeng Zheng
Qiushi Yang
Haixin Duan
Zhiyun Qian
2022
conf/ndss
Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel.
Yizhuo Zhai
Yu Hao
Zheng Zhang
Weiteng Chen
Guoren Li
Zhiyun Qian
Chengyu Song
Manu Sridharan
Srikanth V. Krishnamurthy
Trent Jaeger
Paul L. Yu
2022
conf/ndss
The Taming of the Stack: Isolating Stack Data from Memory Errors.
Kaiming Huang
Yongzhe Huang
Mathias Payer
Zhiyun Qian
Jack Sampson
Gang Tan
Trent Jaeger
2021
conf/ccs
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison.
Zhongjie Wang
Shitong Zhu
Keyu Man
Pengxiong Zhu
Yu Hao
Zhiyun Qian
Srikanth V. Krishnamurthy
Tom La Porta
Michael J. De Lucia
2021
conf/ccs
Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels.
Hang Zhang
Weiteng Chen
Yu Hao
Guoren Li
Yizhuo Zhai
Xiaochen Zou
Zhiyun Qian
2021
conf/ccs
DNS Cache Poisoning Attack: Resurrections with Side Channels.
Keyu Man
Xin'an Zhou
Zhiyun Qian
2021
conf/ccs
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison.
Zhongjie Wang
Shitong Zhu
Keyu Man
Pengxiong Zhu
Yu Hao
Zhiyun Qian
Srikanth V. Krishnamurthy
Tom La Porta
Michael J. De Lucia
2021
conf/ccs
SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers.
Weiteng Chen
Yu Wang
Zheng Zhang
Zhiyun Qian
2021
conf/uss
An Investigation of the Android Kernel Patch Ecosystem.
Zheng Zhang
Hang Zhang
Zhiyun Qian
Billy Lau
2021
conf/uss
Undo Workarounds for Kernel Bugs.
Seyed Mohammadjavad Seyed Talebi
Zhihao Yao
Ardalan Amiri Sani
Zhiyun Qian
Daniel Austin
2021
conf/uss
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems.
Yu Tsung Lee
William Enck
Haining Chen
Hayawardh Vijayakumar
Ninghui Li
Zhiyun Qian
Daimeng Wang
Giuseppe Petracca
Trent Jaeger
2021
conf/uss
SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning.
Daimeng Wang
Zheng Zhang
Hang Zhang
Zhiyun Qian
Srikanth V. Krishnamurthy
Nael B. Abu-Ghazaleh
2021
conf/acsac
Eluding ML-based Adblockers With Actionable Adversarial Examples.
Shitong Zhu
Zhongjie Wang
Xun Chen
Shasha Li
Keyu Man
Umar Iqbal
Zhiyun Qian
Kevin S. Chan
Srikanth V. Krishnamurthy
Zubair Shafiq
Yu Hao
Guoren Li
Zheng Zhang
Xiaochen Zou
2020
conf/ccs
DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels.
Keyu Man
Zhiyun Qian
Zhongjie Wang
Xiaofeng Zheng
Youjun Huang
Haixin Duan
2020
conf/uss
KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities.
Weiteng Chen
Xiaochen Zou
Guoren Li
Zhiyun Qian
2020
conf/uss
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Xiaofeng Zheng
Chaoyi Lu
Jian Peng
Qiushi Yang
Dongjie Zhou
Baojun Liu
Keyu Man
Shuang Hao
Haixin Duan
Zhiyun Qian
2020
conf/sp
AdGraph: A Graph-Based Approach to Ad and Tracker Blocking.
Umar Iqbal
Peter Snyder
Shitong Zhu
Benjamin Livshits
Zhiyun Qian
Zubair Shafiq
2020
conf/ndss
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.
Zhongjie Wang
Shitong Zhu
Yue Cao
Zhiyun Qian
Chengyu Song
Srikanth V. Krishnamurthy
Kevin S. Chan
Tracy D. Braun
2019
conf/ccs
Principled Unearthing of TCP Side Channel Vulnerabilities.
Yue Cao
Zhongjie Wang
Zhiyun Qian
Chengyu Song
Srikanth V. Krishnamurthy
Paul L. Yu
2019
conf/nspw
Employing attack graphs for intrusion detection.
Frank Capobianco
Rahul George
Kaiming Huang
Trent Jaeger
Srikanth V. Krishnamurthy
Zhiyun Qian
Mathias Payer
Paul L. Yu
2019
conf/ndss
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
Daimeng Wang
Ajaya Neupane
Zhiyun Qian
Nael B. Abu-Ghazaleh
Srikanth V. Krishnamurthy
Edward J. M. Colbert
Paul L. Yu
2018
conf/ccs
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Geng Hong
Zhemin Yang
Sen Yang
Lei Zhang
Yuhong Nan
Zhibo Zhang
Min Yang
Yuan Zhang
Zhiyun Qian
Hai-Xin Duan
2018
conf/ccs
Invetter: Locating Insecure Input Validations in Android Services.
Lei Zhang
Zhemin Yang
Yuyu He
Zhenyu Zhang
Zhiyun Qian
Geng Hong
Yuan Zhang
Min Yang
2018
conf/ccs
Droid M+: Developer Support for Imbibing Android's New Permission Model.
Ioannis Gasparis
Azeem Aqil
Zhiyun Qian
Chengyu Song
Srikanth V. Krishnamurthy
Rajiv Gupta
Edward Colbert
2018
conf/ccs
Rendered Insecure: GPU Side Channel Attacks are Practical.
Hoda Naghibijouybari
Ajaya Neupane
Zhiyun Qian
Nael B. Abu-Ghazaleh
2018
conf/uss
Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.
Seyed Mohammadjavad Seyed Talebi
Hamid Tavakoli
Hang Zhang
Zheng Zhang
Ardalan Amiri Sani
Zhiyun Qian
2018
conf/uss
Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets.
Weiteng Chen
Zhiyun Qian
2018
conf/uss
Precise and Accurate Patch Presence Test for Binaries.
Hang Zhang
Zhiyun Qian
2018
conf/sp
Static Evaluation of Noninterference Using Approximate Model Counting.
Ziqiao Zhou
Zhiyun Qian
Michael K. Reiter
Yinqian Zhang
2018
conf/ndss
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis.
Shitong Zhu
Xunchao Hu
Zhiyun Qian
Zubair Shafiq
Heng Yin
2017
journals/popets
Detecting Anti Ad-blockers in the Wild.
Muhammad Haris Mughees
Zhiyun Qian
Zubair Shafiq
2017
conf/uss
Detecting Android Root Exploits by Learning from Root Providers.
Ioannis Gasparis
Zhiyun Qian
Chengyu Song
Srikanth V. Krishnamurthy
2016
conf/ccs
Android ION Hazard: the Curse of Customizable Memory Management System.
Hang Zhang
Dongdong She
Zhiyun Qian
2016
conf/ccs
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.
Zheran Fang
Weili Han
Dong Li
Zeqing Guo
Danhao Guo
Xiaoyang Sean Wang
Zhiyun Qian
Hao Chen
2016
conf/ccs
The Misuse of Android Unix Domain Sockets and Security Implications.
Yuru Shao
Jason Ott
Yunhan Jack Jia
Zhiyun Qian
Zhuoqing Morley Mao
2016
conf/uss
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous.
Yue Cao
Zhiyun Qian
Zhongjie Wang
Tuan Dao
Srikanth V. Krishnamurthy
Lisa M. Marvel
2016
conf/ndss
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Yuru Shao
Qi Alfred Chen
Zhuoqing Morley Mao
Jason Ott
Zhiyun Qian
2015
conf/ccs
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Qi Alfred Chen
Zhiyun Qian
Yunhan Jack Jia
Yuru Shao
Zhuoqing Morley Mao
2015
conf/ccs
Discover and Tame Long-running Idling Processes in Enterprise Systems.
Jun Wang
Zhiyun Qian
Zhichun Li
Zhenyu Wu
Junghwan Rhee
Xia Ning
Peng Liu
Guofei Jiang
2015
conf/ccs
Android Root and its Providers: A Double-Edged Sword.
Hang Zhang
Dongdong She
Zhiyun Qian
2015
conf/ndss
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Kangjie Lu
Zhichun Li
Vasileios P. Kemerlis
Zhenyu Wu
Long Lu
Cong Zheng
Zhiyun Qian
Wenke Lee
Guofei Jiang
2014
conf/uss
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.
Qi Alfred Chen
Zhiyun Qian
Zhuoqing Morley Mao
2012
conf/ccs
Collaborative TCP sequence number inference attack: how to crack sequence number under a second.
Zhiyun Qian
Zhuoqing Morley Mao
Yinglian Xie
2012
conf/sp
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security.
Zhiyun Qian
Zhuoqing Morley Mao
2012
conf/ndss
You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.
Zhiyun Qian
Zhaoguang Wang
Qiang Xu
Zhuoqing Morley Mao
Ming Zhang
Yi-Min Wang
2010
conf/sp
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique.
Zhiyun Qian
Zhuoqing Morley Mao
Yinglian Xie
Fang Yu
2010
conf/ndss
On Network-level Clusters for Spam Detection.
Zhiyun Qian
Zhuoqing Morley Mao
Yinglian Xie
Fang Yu
Coauthors
Abdulrahman Fahim
(1)
Ajaya Neupane
(2)
Ardalan Amiri Sani
(3)
Azeem Aqil
(1)
Baojun Liu
(2)
Benjamin Livshits
(1)
Billy Lau
(2)
Chaoyi Lu
(1)
Chengyu Song
(9)
Chuanpu Fu
(1)
Chuhong Yuan
(1)
Cong Zheng
(1)
Daimeng Wang
(3)
Danhao Guo
(1)
Daniel Austin
(1)
Dawu Gu
(1)
Dhilung Kirat
(1)
Dong Li
(1)
Dongdong She
(2)
Dongjie Zhou
(1)
Douglas Lee Schales
(1)
Edward Colbert
(1)
Edward J. M. Colbert
(1)
Evangelos E. Papalexakis
(1)
Fang Yu
(2)
Frank Capobianco
(1)
Gang Tan
(3)
Gang Zhao
(1)
Ge Dai
(1)
Geng Hong
(2)
Giuseppe Petracca
(1)
Guancheng Li
(1)
Guofei Jiang
(2)
Guoren Li
(8)
Hai-Xin Duan
(1)
Haining Chen
(1)
Haixin Duan
(4)
Hamid Tavakoli
(1)
Hang Zhang
(11)
Hao Chen
(1)
Haonan Li
(1)
Hayawardh Vijayakumar
(1)
Heng Yin
(1)
Hoda Naghibijouybari
(1)
Huiming Liu
(1)
Ioannis Gasparis
(2)
Jack Sampson
(3)
Jangha Kim
(1)
Jason Ott
(2)
Jiale Guan
(1)
Jian Liu
(1)
Jian Peng
(1)
Jianjun Chen
(1)
Jinmeng Zhou
(1)
Jiyong Jang
(1)
Juanru Li
(1)
Juefei Pu
(3)
Jun Wang
(1)
Junghwan Rhee
(1)
Kaiming Huang
(5)
Kangjie Lu
(1)
Ke Xu
(2)
Kevin S. Chan
(3)
Keyu Man
(8)
Kun Sun
(2)
Lei Zhang
(2)
Lin Yi
(1)
Lisa M. Marvel
(1)
Long Lu
(1)
Luyi Xing
(1)
Manu Sridharan
(3)
Mathias Payer
(4)
Michael J. De Lucia
(2)
Michael K. Reiter
(1)
Min Yang
(2)
Ming Zhang
(1)
Minghao Zhang
(1)
Mingming Chen
(1)
Muhammad Haris Mughees
(1)
Nael B. Abu-Ghazaleh
(3)
Ninghui Li
(1)
Paul L. Yu
(6)
Peng Liu
(1)
Pengxiong Zhu
(2)
Peter Snyder
(1)
Pinji Chen
(1)
Qi Alfred Chen
(3)
Qi Li
(2)
Qiang Xu
(1)
Qing Deng
(2)
Qiuping Yi
(1)
Qiushi Yang
(2)
Rahul George
(2)
Rajiv Gupta
(1)
Sen Yang
(1)
Seyed Mohammadjavad Seyed Talebi
(2)
Shachee Mishra
(1)
Shasha Li
(1)
Shenghan Zheng
(1)
Shitong Zhu
(8)
Shuang Hao
(1)
Siqi Ma
(1)
Songlin Jia
(1)
Srikanth V. Krishnamurthy
(16)
Supriyo Chakraborty
(1)
Taesoo Kim
(1)
Thomas La Porta
(1)
Tom La Porta
(2)
Tracy D. Braun
(1)
Trent Jaeger
(9)
Tuan Dao
(1)
Umar Iqbal
(2)
Vasileios P. Kemerlis
(1)
Wang Gao
(1)
Weili Han
(1)
Weiteng Chen
(11)
Wenbo Shen
(1)
Wenke Lee
(1)
William Enck
(1)
Xia Ning
(1)
Xiaochen Zou
(9)
Xiaofeng Zheng
(3)
Xiaohui Kuang
(1)
Xiaoyang Sean Wang
(1)
Xin'an Zhou
(4)
Xingyu Li
(1)
Xuancheng Jin
(1)
Xuangan Xiao
(1)
Xuewei Feng
(2)
Xun Chen
(1)
Xunchao Hu
(1)
Yang Yu
(1)
Yi-Min Wang
(1)
Yinglian Xie
(3)
Yinqian Zhang
(1)
Yizhuo Zhai
(4)
Yongzhe Huang
(1)
Youjun Huang
(1)
Yu Hao
(10)
Yu Tsung Lee
(1)
Yu Wang
(1)
Yuan Zhang
(2)
Yue Cao
(4)
Yuhong Nan
(1)
Yulei Sui
(1)
Yunhan Jack Jia
(2)
Yuru Shao
(3)
Yuyu He
(1)
Zeqing Guo
(1)
Zhaoguang Wang
(1)
Zhaowei Tan
(1)
Zhemin Yang
(2)
Zheng Zhang
(9)
Zhengchuan Liang
(1)
Zhenyu Wu
(2)
Zhenyu Zhang
(1)
Zheran Fang
(1)
Zhibo Zhang
(1)
Zhichun Li
(2)
Zhihao Yao
(1)
Zhiyun Qian
(69)
Zhongjie Wang
(8)
Zhuoqing Morley Mao
(9)
Ziqiao Zhou
(1)
Zubair Shafiq
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to