default search action
Jiang Ming 0002
Person information
- affiliation: Tulane Univerity, Department of Computer Science, New Orleans, LA, USA
- affiliation (former): University of Texas at Arlington, Department of Computer Science and Engineering, TX, USA
- affiliation (former, PhD 2016): Pennsylvania State University, State College, PA, USA
- affiliation (former): Singapore Management University, School of Information Systems, Singapore
Other persons with the same name
- Jiang Ming — disambiguation page
- Jiang Ming 0001 — University of Iowa, Iowa City, IA, USA
- Jiang Ming 0004 — Lawrence Livermore National Laboratory, CA, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c42]Lin Jiang, Feiyu Zhang, Jiang Ming:
Towards Intelligent Automobile Cockpit via A New Container Architecture. NSDI 2024: 205-219 - 2023
- [j11]Mengfei Ren, Xiaolei Ren, Huadong Feng, Jiang Ming, Yu Lei:
Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing. DTRAP 4(1): 9:1-9:24 (2023) - [j10]Lei Zhao, Keyang Jiang, Yuncong Zhu, Lina Wang, Jiang Ming:
Capturing Invalid Input Manipulations for Memory Corruption Diagnosis. IEEE Trans. Dependable Secur. Comput. 20(2): 917-930 (2023) - [j9]Chenke Luo, Jiang Ming, Jianming Fu, Guojun Peng, Zhetao Li:
Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics Testing. IEEE Trans. Inf. Forensics Secur. 18: 3891-3905 (2023) - [c41]Shijia Li, Jiang Ming, Pengda Qiu, Qiyuan Chen, Lanqing Liu, Huaifeng Bao, Qiang Wang, Chunfu Jia:
PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection. CCS 2023: 3078-3092 - [c40]Mengfei Ren, Haotian Zhang, Xiaolei Ren, Jiang Ming, Yu Lei:
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference. ESORICS (2) 2023: 467-486 - [c39]Erika A. Leal, Cimone Wright-Hamor, Joseph B. Manzano, Nicholas J. Multari, Kevin J. Barker, David O. Manz, Jiang Ming:
Assessing Risk in High Performance Computing Attacks. ICISSP 2023: 793-803 - [c38]Erika A. Leal, Binlin Cheng, TuQuynh Nguyen, Alfredo Gutierrez Garcia, Nathan Cabero, Jiang Ming:
Leveraging Hardware Performance Counters for Efficient Classification of Binary Packers. TrustCom 2023: 1859-1864 - [c37]Binlin Cheng, Erika A. Leal, Haotian Zhang, Jiang Ming:
On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling. USENIX Security Symposium 2023: 7481-7498 - 2022
- [c36]Haotian Zhang, Mengfei Ren, Yu Lei, Jiang Ming:
One size does not fit all: security hardening of MIPS embedded systems via static binary debloating for shared libraries. ASPLOS 2022: 255-270 - [c35]Shijia Li, Chunfu Jia, Pengda Qiu, Qiyuan Chen, Jiang Ming, Debin Gao:
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators. NDSS 2022 - [c34]Wen Li, Jiang Ming, Xiapu Luo, Haipeng Cai:
PolyCruise: A Cross-Language Dynamic Information Flow Analysis. USENIX Security Symposium 2022: 2513-2530 - 2021
- [c33]Wenna Song, Jiang Ming, Lin Jiang, Yi Xiang, Xuanchen Pan, Jianming Fu, Guojun Peng:
Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization. CCS 2021: 2858-2874 - [c32]Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng:
App's Auto-Login Function Security Testing via Android OS-Level Virtualization. ICSE 2021: 1683-1694 - [c31]Xiaolei Ren, Michael Ho, Jiang Ming, Yu Lei, Li Li:
Unleashing the hidden power of compiler optimization on binary code difference: an empirical study. PLDI 2021: 142-157 - [c30]Dongpeng Xu, Binbin Liu, Weijie Feng, Jiang Ming, Qilong Zheng, Jing Li, Qiaoyan Yu:
Boosting SMT solver performance on mixed-bitwise-arithmetic expressions. PLDI 2021: 651-664 - [c29]Binbin Liu, Junfu Shen, Jiang Ming, Qilong Zheng, Jing Li, Dongpeng Xu:
MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation. USENIX Security Symposium 2021: 1701-1718 - [c28]Binlin Cheng, Jiang Ming, Erika A. Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion:
Obfuscation-Resilient Executable Payload Extraction From Packed Malware. USENIX Security Symposium 2021: 3451-3468 - [c27]Mengfei Ren, Xiaolei Ren, Huadong Feng, Jiang Ming, Yu Lei:
Z-Fuzzer: device-agnostic fuzzing of Zigbee protocol implementation. WISEC 2021: 347-358 - [i4]Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng:
App's Auto-Login Function Security Testing via Android OS-Level Virtualization. CoRR abs/2103.03511 (2021) - [i3]Xiaolei Ren, Michael Ho, Jiang Ming, Yu Lei, Li Li:
Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical Study. CoRR abs/2103.12357 (2021) - 2020
- [j8]Wenna Song, Jiang Ming, Han Yan, Yi Xiang, Yuan Chen, Yuan Luo, Kun He, Guojun Peng:
Android Data-Clone Attack via Operating System Customization. IEEE Access 8: 199733-199746 (2020) - [j7]Hui Xu, Yangfan Zhou, Jiang Ming, Michael R. Lyu:
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security. Cybersecur. 3(1): 9 (2020) - [c26]Chen Cao, Le Guan, Jiang Ming, Peng Liu:
Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation. ACSAC 2020: 746-759 - [c25]Lei Zhao, Yuncong Zhu, Jiang Ming, Yichen Zhang, Haotian Zhang, Heng Yin:
PatchScope: Memory Object Centric Patch Diffing. CCS 2020: 149-165 - [c24]Luman Shi, Jiang Ming, Jianming Fu, Guojun Peng, Dongpeng Xu, Kun Gao, Xuanchen Pan:
VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing. CCS 2020: 535-549
2010 – 2019
- 2019
- [c23]Li Wang, Dongpeng Xu, Jiang Ming, Yu Fu, Dinghao Wu:
MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus. SPRO@CCS 2019: 15-26 - [c22]Yiru Zhao, Wanfeng Ge, Wenxin Li, Run Wang, Lei Zhao, Jiang Ming:
Capturing the Persistence of Facial Expression Features for Deepfake Video Detection. ICICS 2019: 630-645 - [c21]Luman Shi, Jianming Fu, Zhengwei Guo, Jiang Ming:
"Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps. MobiSys 2019: 222-235 - 2018
- [j6]Dong Wang, Xiaosong Zhang, Jiang Ming, Ting Chen, Chao Wang, Weina Niu:
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device. Wirel. Commun. Mob. Comput. 2018: 7849065:1-7849065:15 (2018) - [c20]Mohsin Junaid, Jiang Ming, David Chenho Kung:
StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification. ACSAC 2018: 198-209 - [c19]Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion:
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. CCS 2018: 395-411 - [c18]Dongpeng Xu, Jiang Ming, Yu Fu, Dinghao Wu:
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. CCS 2018: 442-458 - [c17]Armon Barton, Matthew Wright, Jiang Ming, Mohsen Imani:
Towards Predicting Efficient and Anonymous Tor Circuits. USENIX Security Symposium 2018: 429-444 - [i2]Armon Barton, Mohsen Imani, Jiang Ming, Matthew Wright:
Towards Predicting Efficient and Anonymous Tor Circuits. CoRR abs/1805.01977 (2018) - 2017
- [j5]Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu:
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection. IEEE Trans. Software Eng. 43(12): 1157-1177 (2017) - [j4]Jiang Ming, Dongpeng Xu, Dinghao Wu:
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization. J. Comput. Virol. Hacking Tech. 13(3): 167-178 (2017) - [j3]Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Impeding behavior-based malware analysis via replacement attacks to malware specifications. J. Comput. Virol. Hacking Tech. 13(3): 193-207 (2017) - [c16]Dongpeng Xu, Jiang Ming, Dinghao Wu:
Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping. IEEE Symposium on Security and Privacy 2017: 921-937 - [c15]Jiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu:
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking. USENIX Security Symposium 2017: 253-270 - 2016
- [j2]Jiang Ming, Fangfang Zhang, Dinghao Wu, Peng Liu, Sencun Zhu:
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection. IEEE Trans. Reliab. 65(4): 1647-1664 (2016) - [c14]Gaoyao Xiao, Jun Wang, Peng Liu, Jiang Ming, Dinghao Wu:
Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics. CODASPY 2016: 277-284 - [c13]Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, Dinghao Wu:
Translingual Obfuscation. EuroS&P 2016: 128-144 - [c12]Dongpeng Xu, Jiang Ming, Dinghao Wu:
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method. ISC 2016: 323-342 - [c11]Jiang Ming, Dinghao Wu, Jun Wang, Gaoyao Xiao, Peng Liu:
StraightTaint: decoupled offline symbolic taint analysis. ASE 2016: 308-319 - [c10]Jiang Ming, Dinghao Wu:
BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling. SCAM 2016: 61-66 - [i1]Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, Dinghao Wu:
Translingual Obfuscation. CoRR abs/1601.00763 (2016) - 2015
- [j1]Yufei Jiang, Nan Yu, Jiang Ming, Sanghoon Lee, Jason DeGraw, John Yen, John I. Messner, Dinghao Wu:
Automatic building information model query generation. J. Inf. Technol. Constr. 20: 518-535 (2015) - [c9]Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications. ACNS 2015: 497-517 - [c8]Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu:
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code. CCS 2015: 757-768 - [c7]Jiang Ming, Dongpeng Xu, Dinghao Wu:
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference. SEC 2015: 416-430 - [c6]Jiang Ming, Dinghao Wu, Gaoyao Xiao, Jun Wang, Peng Liu:
TaintPipe: Pipelined Symbolic Taint Analysis. USENIX Security Symposium 2015: 65-80 - 2014
- [c5]Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu:
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection. SIGSOFT FSE 2014: 389-400 - 2012
- [c4]Jiang Ming, Meng Pan, Debin Gao:
iBinHunt: Binary Hunting with Inter-procedural Control Flow. ICISC 2012: 92-109 - 2011
- [c3]Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao:
Linear Obfuscation to Combat Symbolic Execution. ESORICS 2011: 210-226 - [c2]Jiang Ming, Haibin Zhang, Debin Gao:
Towards ground truthing observations in gray-box anomaly detection. NSS 2011: 25-32
2000 – 2009
- 2009
- [c1]Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia:
Denial-of-Service Attacks on Host-Based Generic Unpackers. ICICS 2009: 241-253
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 20:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint