Neural Nets Can Learn Function Type Signatures From Binaries

Zheng Leong Chua, Shiqi Shen, Prateek Saxena, Zhenkai Liang

26th USENIX Security Symposium (USENIX 2017), Vancouver, BC, Canada, August 2017

The "Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing

Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena and Zhenkai Liang

23rd ACM Conference on Computer and Communications Security (CCS 2016)

Preventing Page Faults from Telling your Secrets

Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, and Prateek Saxena

11th ACM Asia Conference on Computer and Communications Security (ASIACCS 2016)

Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks

Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang

37th IEEE Symposium on Security and Privacy (Oakland 2016), San Jose, CA, May 2016.

Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software

Hong Hu, Zheng Leong Chua, Zhenkai Liang, and Prateek Saxena

20th European Symposium on Research in Computer Security (ESORICS 2015), Vienna, Austria, September 2015

Automatic Generation of Data-Oriented Exploits

Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, and Zhenkai Liang

24th USENIX Security Symposium (USENIX 2015), Washington, D.C., US, August 2015

A look at targeted attacks through the lens of an NGO

Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda

23rd USENIX Security Symposium (USENIX 2014), San Diego, CA, US, August 2014

Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation

Vrizlynn L. L. Thing, Zheng Leong Chua

IFIP International Information Security and Privacy Conference (SEC), Auckland, New Zealand, July 2013