Author image not provided
 Peng Liu

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.21
Citation Count709
Publication count136
Publication years1998-2017
Available for download54
Average downloads per article441.07
Downloads (cumulative)23,818
Downloads (12 Months)3,757
Downloads (6 Weeks)417
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


136 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 136
Result page: 1 2 3 4 5 6 7

Sort by:

1 published by ACM
December 2017 ACSAC 2017: Proceedings of the 33rd Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 75,   Downloads (12 Months): 75,   Downloads (Overall): 75

Full text available: PDFPDF
The increasing growth of cybercrimes targeting mobile devices urges an efficient malware analysis platform. With the emergence of evasive malware, which is capable of detecting that it is being analyzed in virtualized environments, bare-metal analysis has become the definitive resort. Existing works mainly focus on extracting the malicious behaviors exposed ...
Keywords: Flash-based Block Device, Snapshot, Bare-metal Analysis, Evasive Malware

2 published by ACM
October 2017 MTD '17: Proceedings of the 2017 Workshop on Moving Target Defense
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 15,   Downloads (12 Months): 28,   Downloads (Overall): 28

Full text available: PDFPDF
Emerging zero-day vulnerabilities in information and communications technology systems make cyber defenses very challenging. In particular, the defender faces uncertainties of; e.g., system states and the locations and the impacts of vulnerabilities. In this paper, we study the defense problem on a computer network that is modeled as a partially ...
Keywords: moving target defense, bayesian attack graphs, network security, pomdp, adaptive cyber defense, online learning

3 published by ACM
June 2017 MobiSys '17: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 13,   Downloads (12 Months): 87,   Downloads (Overall): 87

Full text available: PDFPDF
Android Application Framework is an integral and foundational part of the Android system. Each of the 1.4 billion Android devices relies on the system services of Android Framework to manage applications and system resources. Given its critical role, a vulnerability in the framework can be exploited to launch large-scale cyber ...
Keywords: concolic execution, exploit generation, symbolic execution, android framework, vulnerability discovery

4 published by ACM
December 2016 ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security Applications
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 16,   Downloads (12 Months): 93,   Downloads (Overall): 113

Full text available: PDFPDF
Conventional overwriting-based and encryption-based secure deletion schemes can only sanitize data. However, the past existence of the deleted data may leave artifacts in the layout at all layers of a computing system. These structural artifacts may be utilized by the adversary to infer sensitive information about the deleted data or ...
Keywords: NAND flash, flash translation layer, truely secure deletion

5 published by ACM
November 2016 SenSys '16: Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 22,   Downloads (12 Months): 222,   Downloads (Overall): 296

Full text available: PDFPDF
Nowadays, auto insurance companies set personalized insurance rate based on data gathered directly from their customers' cars. In this paper, we show such a personalized insurance mechanism -- wildly adopted by many auto insurance companies -- is vulnerable to exploit. In particular, we demonstrate that an adversary can leverage off-the-shelf ...
Keywords: Telematics Device, Mixtures of Regression Models, Fraud Detection

6 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 20,   Downloads (12 Months): 574,   Downloads (Overall): 1,000

Full text available: PDFPDF
Android is the most commonly used mobile device operation system. The core of Android, the System Server (SS), is a multi-threaded process that provides most of the system services. Based on a new understanding of the security risks introduced by the callback mechanism in system services, we have discovered a ...
Keywords: denial of service, vulnerability detection, mobile security, synchronous callback, taint analysis

7 published by ACM
October 2016 MTD '16: Proceedings of the 2016 ACM Workshop on Moving Target Defense
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 87,   Downloads (Overall): 148

Full text available: PDFPDF
This demo paper describes an approach to detect memory corruption attacks using artificial diversity. Our approach conducts offline symbolic execution of multiple variants of a system to identify paths which diverge in different variants. In addition, we build an efficient input matcher to check whether an online input matches the ...
Keywords: n-variant, symbolic execution, diversification

8 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 10,   Downloads (12 Months): 151,   Downloads (Overall): 229

Full text available: PDFPDF
The 2016 MTD (Moving Target Defense) workshop seeks to bring together researchers from academia, government, and industry to report on the latest research efforts on moving-target defense, and to have productive discussion and constructive debate on this topic. It is a single day workshop co-located with ACM CCS (Conference on ...
Keywords: cybersecurity, moving target defense

9 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 32,   Downloads (12 Months): 395,   Downloads (Overall): 617

Full text available: PDFPDF
After a program has crashed and terminated abnormally, it typically leaves behind a snapshot of its crashing state in the form of a core dump. While a core dump carries a large amount of information, which has long been used for software debugging, it barely serves as informative debugging aids ...
Keywords: core dump, vulnerability analysis, memory corruption

10 published by ACM
August 2016 ASE 2016: Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 17,   Downloads (12 Months): 124,   Downloads (Overall): 182

Full text available: PDFPDF
Taint analysis has been widely applied in ex post facto security applications, such as attack provenance investigation, computer forensic analysis, and reverse engineering. Unfortunately, the high runtime overhead imposed by dynamic taint analysis makes it impractical in many scenarios. The key obstacle is the strict coupling of program execution and ...
Keywords: Decoupling, Taint analysis, Offline, Symbolic taint analysis

11 published by ACM
May 2016 ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 8,   Downloads (12 Months): 68,   Downloads (Overall): 164

Full text available: PDFPDF
Securely removing data from modern computing systems is challenging, as past existence of the deleted data may leave artifacts in the layout at all layers of a computing system, which can be utilized by the adversary to infer information about the deleted data. Conventional overwriting-based and encryption-based solutions are not ...
Keywords: NAND flash, flash translation layer, secure deletion

12
April 2016 ESSoS 2016: Proceedings of the 8th International Symposium on Engineering Secure Software and Systems - Volume 9639
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Black-box mutational fuzzing is a simple yet effective method for finding software vulnerabilities. In this work, we collect and analyze fuzzing campaign data of 60,000 fuzzing runs, 4,000 crashes and 363 unique bugs, from multiple Linux programs using CERT Basic Fuzzing Framework. Motivated by the results of empirical analysis, we ...
Keywords: Empirical analysis, Software vulnerability, Stochastic modeling, Mutational fuzzing

13 published by ACM
March 2016 CODASPY '16: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5,   Downloads (12 Months): 37,   Downloads (Overall): 105

Full text available: PDFPDF
We introduce a novel Data Flow Analysis (DFA) technique, called PoL-DFA (Program-object Level Data Flow Analysis), to analyze the dynamic data flows of server programs. PoL-DFA symbolically analyzes every instruction in the execution trace of a process to keep track of the data flows among program objects (e.g., integers, structures, ...
Keywords: information flow control, usage control, information accountability

14
January 2016 International Journal of Information and Computer Security: Volume 8 Issue 4, January 2016
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 0

Existing techniques, such as state roll-back or replay can preserve as much accumulated 'state' as possible when one application is compromised. However, when operating system kernel is compromised, e.g., driver vulnerability exploitation, the default behaviour of most commodity operating systems today is to reboot from a clean initial state. All ...
Keywords: driver code vulnerability, operating system replicas, persistent data, virtualisation, intrusion response, transactional applications, critical memory regions, intrusion detection, service continuity, driver diversity, output validation, service availability

15 published by ACM
December 2015 ACSAC 2015: Proceedings of the 31st Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 8,   Downloads (12 Months): 69,   Downloads (Overall): 386

Full text available: PDFPDF
Although the input validation vulnerabilities play a critical role in web application security, such vulnerabilities are so far largely neglected in the Android security research community. We found that due to the unique Framework Code layer, Android devices do need specific input validation vulnerability analysis in system services. In this ...

16 published by ACM
October 2015 CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 15,   Downloads (12 Months): 181,   Downloads (Overall): 1,058

Full text available: PDFPDF
The Android OS not only dominates 78.6% of the worldwide smartphone market in 2014, but importantly has been widely used for mission critical tasks (e.g., medical devices, auto/aircraft navigators, embedded in satellite project). The core of Android, System Server (SS), is a multi-threaded process that contains most of the system ...
Keywords: android, vulnerability, mobile security, denial of service

17 published by ACM
October 2015 SafeConfig '15: Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 35,   Downloads (Overall): 131

Full text available: PDFPDF
Cyber attacks inevitably generate impacts towards relevant missions. However, concrete methods to accurately evaluate such impacts are rare. In this paper, we propose a probabilistic approach based on Bayesian networks for quantitative mission impact assessment. A System Object Dependency Graph (SODG) is first built to capture the intrusion propagation process ...
Keywords: system object dependency graph, Bayesian network, mission impact assessment

18 published by ACM
October 2015 CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 10,   Downloads (12 Months): 118,   Downloads (Overall): 517

Full text available: PDFPDF
In recent years, many organizations have established bounty programs that attract white hat hackers who contribute vulnerability reports of web systems. In this paper, we collect publicly available data of two representative web vulnerability discovery ecosystems (Wooyun and HackerOne) and study their characteristics, trajectory, and impact. We find that both ...
Keywords: monetary incentives, vulnerability discovery, bug bounty, vulnerability disclosure

19
September 2015 Proceedings, Part I, of the 20th European Symposium on Computer Security -- ESORICS 2015 - Volume 9326
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

Attackers often corrupt data structures to compromise software systems. As a countermeasure, data structure layout randomization has been proposed. Unfortunately, existing techniques require manual designation of randomize-able data structures without guaranteeing the correctness and keep the layout unchanged at runtime. We present a system, called SALADS, that automatically translates a ...

20
August 2015 SEC'15: Proceedings of the 24th USENIX Conference on Security Symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 17

An app market's vetting process is expected to be scalable and effective. However, today's vetting mechanisms are slow and less capable of catching new threats. In our research, we found that a more powerful solution can be found by exploiting the way Android malware is constructed and disseminated, which is ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us