Follow
Zhui Deng
Title
Cited by
Cited by
Year
{X-Force}:{Force-Executing} binary programs for security applications
F Peng, Z Deng, X Zhang, D Xu, Z Lin, Z Su
23rd USENIX Security Symposium (USENIX Security 14), 829-844, 2014
1442014
Spider: Stealthy binary program instrumentation and debugging via hardware virtualization
Z Deng, X Zhang, D Xu
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
1382013
Process implanting: A new active introspection framework for virtualization
Z Gu, Z Deng, D Xu, X Jiang
2011 IEEE 30th International Symposium on Reliable Distributed Systems, 147-156, 2011
1002011
iris: Vetting private api abuse in ios applications
Z Deng, B Saltaformaggio, X Zhang, D Xu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
752015
Bistro: Binary component extraction and embedding for software security applications
Z Deng, X Zhang, D Xu
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
552013
Introlib: Efficient and transparent library call introspection for malware forensics
Z Deng, D Xu, X Zhang, X Jiang
Digital Investigation 9, S13-S23, 2012
362012
Drip: A framework for purifying trojaned kernel drivers
Z Gu, WN Sumner, Z Deng, X Zhang, D Xu
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
112013
Determining the similarity of binary executables
A Agarwal, F Peng, Z Deng
US Patent 10,685,113, 2020
102020
Guest-transparent instruction authentication for self-patching kernels
DM Stanley, Z Deng, D Xu, R Porter, S Snyder
MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012
52012
Binary program instrumentation and debugging
X Zhang, Z Deng, D Xu
US Patent 9,817,745, 2017
2017
Binary component extraction and embedding
X Zhang, Z Deng, D Xu
US Patent App. 14/595,922, 2016
2016
vMocity: Traveling VMs across Heterogeneous Clouds
C Cheng, Z Deng, Z Gu, D Xu
2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), 101-110, 2016
2016
Binary instrumentation and transformation for software security applications
Z Deng
Purdue University, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–13