Follow
Rui Qiao
Title
Cited by
Cited by
Year
ANVIL: Software-based protection against next-generation rowhammer attacks
ZB Aweke, SF Yitbarek, R Qiao, R Das, M Hicks, Y Oren, T Austin
ACM SIGPLAN Notices 51 (4), 743-755, 2016
1682016
A new approach for rowhammer attacks
R Qiao, M Seaborn
2016 IEEE international symposium on hardware oriented security and trust …, 2016
1042016
A platform for secure static binary instrumentation
M Zhang, R Qiao, N Hasabnis, R Sekar
Proceedings of the 10th ACM SIGPLAN/SIGOPS international conference on …, 2014
942014
Function interface analysis: A principled approach for function recognition in COTS binaries
R Qiao, R Sekar
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
482017
NORAX: Enabling execute-only memory for COTS binaries on AArch64
Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ...
2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017
452017
A principled approach for rop defense
R Qiao, M Zhang, R Sekar
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
312015
Checking correctness of code generator architecture specifications
N Hasabnis, R Qiao, R Sekar
2015 IEEE/ACM International Symposium on Code Generation and Optimization …, 2015
122015
Effective function recovery for cots binaries using interface verification
R Qiao, R Sekar
Technical report, Secure Systems Lab, 2016
102016
Reetuparna Das, Matthew Hicks, Yossi Oren, and Todd M. Austin. ANVIL: software-based protection against next-generation rowhammer attacks
ZB Aweke, SF Yitbarek, R Qiao
Proceedings of the Twenty-First International Conference on Architectural …, 0
8
Accurate Recovery of Functions in COTS Binaries
R Qiao
State University of New York at Stony Brook, 2017
42017
Surprise simulation using fuzzy logic
R Qiao, X Zhong, S Yang, H He
International Conference on Intelligent Computing, 110-119, 2013
22013
Inter-Network Crosstalk and Communication Solutions for Self-Adaptive Nodes Build Self-Organizing Network
X Zhong, C Chen, Y Zhu, R Qiao
IOP Conference Series: Materials Science and Engineering 452 (4), 042027, 2018
12018
Graph pattern matching through model checking
R Qiao, X Zhong, L Zhang, H He
2015 8th International Conference on Database Theory and Application (DTA), 1-5, 2015
12015
Fuzzy Logic Model of Surprise.
R Qiao, Y Feng, X Zhong, Q Liu, H He
J. Comput. 9 (11), 2761-2770, 2014
12014
Graph Pattern Matching: Capturing Bisimilar Subgraph
R Qiao, K Feng, H He, X Zhong
International Journal of Pattern Recognition and Artificial Intelligence 35 …, 2021
2021
Rice Dwarf Virus Small RNA Profiles in Rice and Leafhopper Reveal Distinct Patterns in Cross-Kingdom Hosts
Y Wang, R Qiao, C Wei, Y Li
Viruses 11 (9), 847, 2019
2019
Problem: code generator bugs
N Hasabnis, R Qiao, R Sekar
International Symposium on Code Generation and Optimization (CGO), 2015
2015
An emotion understanding system
R Qiao, H He, J Gu, M Liu, Y Feng, X Zhong
The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014 …, 2014
2014
Research and Design of Intelligent Library Management System under Big Data Platform
Z Chen, Y Zhu, C Chen, X Zhong, R Qiao
DTA 2015
R Qiao, X Zhong, L Zhang, H He
The system can't perform the operation now. Try again later.
Articles 1–20