Bing Mao
Bing Mao
Computer Science, Nanjing University
Verified email at
Cited by
Cited by
DROP: Detecting return-oriented programming malicious code
P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018
Detecting code reuse in android applications using component-based control flow graph
X Sun, Y Zhongyang, Z Xin, B Mao, L Xie
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
Role-based access control model for CSCW systems
C Li, Y Zhan, B Mao, L Xie
RUAN JIAN XUE BAO 11 (7), 931-937, 2000
AutoPaG: towards automated software patch generation with source code root cause identification and repair
Z Lin, X Jiang, D Xu, B Mao, L Xie
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask
C Pang, R Yu, Y Chen, E Koskinen, G Portokalidis, B Mao, J Xu
2021 IEEE symposium on security and privacy (SP), 833-851, 2021
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware
Y Zhongyang, Z Xin, B Mao, L Xie
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
JITDefender: A defense against JIT spraying attacks
P Chen, Y Fang, B Mao, L Xie
Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011
Automatic construction of jump-oriented programming shellcode (on the x86)
P Chen, X Xing, B Mao, L Xie, X Shen, X Yin
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
Postmortem Program Analysis with {Hardware-Enhanced}{Post-Crash} Artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017
A practical approach for adaptive data structure layout randomization
P Chen, J Xu, Z Lin, D Xu, B Mao, P Liu
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
System call redirection: A practical approach to meeting real-world virtual machine introspection needs
R Wu, P Chen, P Liu, B Mao
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
Efficient detection of the return-oriented programming malicious code
P Chen, X Xing, H Han, B Mao, L Xie
Information Systems Security: 6th International Conference, ICISS 2010 …, 2010
Textlogger: inferring longer inputs on touch screen using motion sensors
D Ping, X Sun, B Mao
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
Ptrix: Efficient hardware-assisted fuzzing for cots binary
Y Chen, D Mu, J Xu, Z Sun, W Shen, X Xing, L Lu, B Mao
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
Brick: A binary tool for run-time detecting and locating integer-based vulnerability
P Chen, Y Wang, Z Xin, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 208-215, 2009
Windranger: A directed greybox fuzzer driven by deviation basic blocks
Z Du, Y Li, Y Liu, B Mao
Proceedings of the 44th International Conference on Software Engineering …, 2022
Impeding behavior-based malware analysis via replacement attacks to malware specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
Journal of Computer Virology and Hacking Techniques 13, 193-207, 2017
Detect android malware variants using component based topology graph
T Shen, Y Zhongyang, Z Xin, B Mao, H Huang
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
JITSafe: a framework against Just‐in‐time spraying attacks
P Chen, R Wu, B Mao
IET Information Security 7 (4), 283-292, 2013
The system can't perform the operation now. Try again later.
Articles 1–20