Follow
Mingwei Zhang
Mingwei Zhang
Senior Software Engineer, Google
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Control Flow Integrity for COTS Binaries.
M Zhang, R Sekar
USENIX Security Symposium (USENIX Security 13), 337-352, 2013
778*2013
Function as a service (FaaS) system enhancements
MR Haghighat, K Doshi, AJ Herdrich, A Mohan, RR Iyer, M Sun, K Bhuyan, ...
US Patent 11,922,220, 2024
1172024
A Platform For Secure Static Binary Instrumentation
M Zhang, R Qiao, N Hasabnis, R Sekar
ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environment …, 2014
1012014
A robust and efficient defense against use-after-free exploits via concurrent pointer sweeping
D Liu, M Zhang, H Wang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
532018
Sgxelide: enabling enclave code secrecy via self-modification
E Bauman, H Wang, M Zhang, Z Lin
Proceedings of the 2018 International Symposium on Code Generation and …, 2018
422018
Encoded inline capabilities
M LeMay, DM Durham, ME Kounavis, BE Huntley, V Shanbhogue, ...
US Patent 10,860,709, 2020
402020
A Principled Approach for ROP Defense
R Qiao, M Zhang, R Sekar
Annual Computer Security Applications Conference (ACSAC), 2015
352015
Systems and methods for increasing security on computing systems that launch application containers
D Marino, P Efstathopoulos, M Zhang
US Patent 9,729,579, 2017
332017
Crypto-enforced capabilities for isolation
M LeMay, DD Durham, M Zhang, V Shanbhogue
US Patent 10,706,164, 2020
292020
POSTER: Semi-supervised classification for dynamic android malware detection
L Chen, M Zhang, CY Yang, R Sahita
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
272017
Protecting cots binaries from disclosure-guided code reuse attacks
M Zhang, M Polychronakis, R Sekar
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
252017
Harbormaster: Policy Enforcement for Containers
M Zhang, D Marino, P Efstathopoulos
International Conference on Cloud Computing Technology and Science (CloudCom), 2015
242015
Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency
D Liu, X Gao, M Zhang, H Wang, A Stavrou
192017
Technologies for untrusted code execution with processor sandbox support
M Zhang, M Sun, RL Sahita, C Zhang, X Li
US Patent 11,055,401, 2021
132021
Network traffic analysis using refined bayesian reasoning to detect flooding and port scan attacks
D Liu, M Zhang, T Li
International Conference on Advanced Computer Theory and Engineering, 2008 …, 2008
122008
eXecutable-Only-Memory-Switch (XOM-Switch): Hiding Your Code From Advanced Code Reuse Attacks in One Shot
M Zhang, R Sahita, D Liu
Black Hat Asia, 2018
102018
Securing untrusted code using memory protection key and control flow integrity
M Zhang, R Sahita
US Patent 10,810,305, 2020
92020
Malicious object detection in a runtime environment
M Zhang, X Li, RL Sahita, A Subramanian, AS Kanhere, CY Yang, Y Gai
US Patent 10,552,609, 2020
62020
Apparatuses, methods, and systems for instructions to compartmentalize code
R Sahita, D Gupta, V Shanbhogue, D Hansen, JW Brandt, J Nuzman, ...
US Patent 11,029,957, 2021
42021
Technologies to defeat secure enclave side-channel attacks using fault-oriented programming
M Zhang, RL Sahita
US Patent 10,579,791, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20