Follow
Rui Qiao
Title
Cited by
Cited by
Year
ANVIL: Software-based protection against next-generation rowhammer attacks
ZB Aweke, SF Yitbarek, R Qiao, R Das, M Hicks, Y Oren, T Austin
ACM SIGPLAN Notices 51 (4), 743-755, 2016
2472016
A new approach for rowhammer attacks
R Qiao, M Seaborn
2016 IEEE international symposium on hardware oriented security and trust …, 2016
1482016
A platform for secure static binary instrumentation
M Zhang, R Qiao, N Hasabnis, R Sekar
Proceedings of the 10th ACM SIGPLAN/SIGOPS international conference on …, 2014
1042014
NORAX: Enabling execute-only memory for COTS binaries on AArch64
Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ...
2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017
642017
Function interface analysis: A principled approach for function recognition in COTS binaries
R Qiao, R Sekar
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
582017
A principled approach for rop defense
R Qiao, M Zhang, R Sekar
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
372015
Checking correctness of code generator architecture specifications
N Hasabnis, R Qiao, R Sekar
2015 IEEE/ACM International Symposium on Code Generation and Optimization …, 2015
142015
Effective function recovery for cots binaries using interface verification
R Qiao, R Sekar
Secure Syst. Lab, 2016
122016
Reetuparna Das, Matthew Hicks, Yossi Oren, and Todd M. Austin. ANVIL: software-based protection against next-generation rowhammer attacks
ZB Aweke, SF Yitbarek, R Qiao
Proceedings of the Twenty-First International Conference on Architectural …, 0
5
Accurate Recovery of Functions in COTS Binaries
R Qiao
State University of New York at Stony Brook, 2017
32017
Graph pattern matching through model checking
R Qiao, X Zhong, L Zhang, H He
2015 8th International Conference on Database Theory and Application (DTA), 1-5, 2015
22015
Surprise simulation using fuzzy logic
R Qiao, X Zhong, S Yang, H He
Intelligent Computing Theories and Technology: 9th International Conference …, 2013
22013
Graph pattern matching: Capturing bisimilar subgraph
R Qiao, K Feng, H He, X Zhong
International Journal of Pattern Recognition and Artificial Intelligence 35 …, 2021
12021
Fuzzy Logic Model of Surprise.
R Qiao, Y Feng, X Zhong, Q Liu, H He
J. Comput. 9 (11), 2761-2770, 2014
12014
Design and implementation of intelligent question and answer electronic dictionary in the context of big data
R Qiao, X Zhong
2023 3rd Asia-Pacific Conference on Communications Technology and Computer …, 2023
2023
RIPPB: A Robust and Improved PBFT Protocol for Blockchain
M Ding, H He, R Qiao, X Zhou
2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA …, 2022
2022
Problem: code generator bugs
N Hasabnis, R Qiao, R Sekar
International Symposium on Code Generation and Optimization (CGO), 2015
2015
An emotion understanding system
R Qiao, H He, J Gu, M Liu, Y Feng, X Zhong
The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014 …, 2014
2014
Research and Design of Intelligent Library Management System under Big Data Platform
Z Chen, Y Zhu, C Chen, X Zhong, R Qiao
DTA 2015
R Qiao, X Zhong, L Zhang, H He
The system can't perform the operation now. Try again later.
Articles 1–20