default search action
Qingkai Zeng 0002
Person information
- affiliation: Nanjing University, Nanjing, China
Other persons with the same name
- Qingkai Zeng — disambiguation page
- Qingkai Zeng 0001 — University of Notre Dame, Notre Dame, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Zicheng Wang, Tiejin Chen, Qinrun Dai, Yueqi Chen, Hua Wei, Qingkai Zeng:
When eBPF Meets Machine Learning: On-the-fly OS Kernel Compartmentalization. CoRR abs/2401.05641 (2024) - [i1]Yinggang Guo, Zicheng Wang, Weiheng Bai, Qingkai Zeng, Kangjie Lu:
BULKHEAD: Secure, Scalable, and Efficient Kernel Compartmentalization with PKS. CoRR abs/2409.09606 (2024) - 2023
- [c26]Rui Sun, Yinggang Guo, Zicheng Wang, Qingkai Zeng:
AttnCall: Refining Indirect Call Targets in Binaries with Attention. ESORICS (4) 2023: 391-409 - [c25]Zicheng Wang, Yueqi Chen, Qingkai Zeng:
PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel. USENIX Security Symposium 2023: 4193-4210 - 2022
- [j7]Jaryn Shen, Qingkai Zeng:
The count-min sketch is vulnerable to offline password-guessing attacks. Int. J. Inf. Comput. Secur. 18(1/2): 27-39 (2022) - [c24]Yinggang Guo, Zicheng Wang, Bingnan Zhong, Qingkai Zeng:
Formal Modeling and Security Analysis for Intra-level Privilege Separation. ACSAC 2022: 88-101 - [c23]Bingnan Zhong, Zicheng Wang, Yinggang Guo, Qingkai Zeng:
CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware Feature. SEC 2022: 270-286 - 2021
- [j6]Chao Su, Qingkai Zeng:
Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures. Secur. Commun. Networks 2021: 5559552:1-5559552:15 (2021) - [c22]Chao Su, Xuhua Ding, Qingkai Zeng:
Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions. DSN 2021: 326-337 - [c21]Bingnan Zhong, Qingkai Zeng:
SecPT: Providing Efficient Page Table Protection based on SMAP Feature in an Untrusted Commodity Kernel. TrustCom 2021: 215-223
2010 – 2019
- 2019
- [j5]Jaryn Shen, Qingkai Zeng:
CSPS: catchy short passwords making offline and online attacks impossible. Int. J. Inf. Comput. Secur. 11(3): 255-274 (2019) - [c20]Jaryn Shen, Timothy T. Yuen, Kim-Kwang Raymond Choo, Qingkai Zeng:
AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords. ACISP 2019: 514-532 - 2018
- [j4]Qingsong Zhao, Qingkai Zeng, Ximeng Liu, Huanliang Xu:
Simulation-based security of function-hiding inner product encryption. Sci. China Inf. Sci. 61(4): 048102:1-048102:3 (2018) - [j3]Qingsong Zhao, Qingkai Zeng, Ximeng Liu:
Improved Construction for Inner Product Functional Encryption. Secur. Commun. Networks 2018: 6561418:1-6561418:12 (2018) - [c19]Jaryn Shen, Kim-Kwang Raymond Choo, Qingkai Zeng:
Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attacks. ICDF2C 2018: 204-221 - 2017
- [c18]Qingsong Zhao, Qingkai Zeng, Ximeng Liu:
Efficient Inner Product Encryption with Simulation-Based Security. ICICS 2017: 162-171 - [c17]Yao Liu, Qingkai Zeng, Pinghai Yuan:
Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing. SecureComm 2017: 571-584 - [c16]Yao Liu, Qingkai Zeng, Pinghai Yuan:
NodeLeaper: Lower Overhead Oblivious AVL Tree. TrustCom/BigDataSE/ICESS 2017: 487-493 - [c15]Liang Deng, Peng Liu, Jun Xu, Ping Chen, Qingkai Zeng:
Dancing with Wolves: Towards Practical Event-driven VMM Monitoring. VEE 2017: 83-96 - 2016
- [j2]Liang Deng, Qingkai Zeng:
Exception-oriented programming: retrofitting code-reuse attacks to construct kernel malware. IET Inf. Secur. 10(6): 418-424 (2016) - [c14]Hao Sun, Xiangyu Zhang, Yunhui Zheng, Qingkai Zeng:
IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions. ICSE 2016: 1051-1062 - [c13]Weiguang Wang, Hao Sun, Qingkai Zeng:
SeededFuzz: Selecting and Generating Seeds for Directed Fuzzing. TASE 2016: 49-56 - 2015
- [j1]Hao Sun, Chao Su, Yue Wang, Qingkai Zeng:
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis. Int. J. Softw. Eng. Knowl. Eng. 25(9-10): 1573-1594 (2015) - [c12]Hao Sun, Xiangyu Zhang, Chao Su, Qingkai Zeng:
Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability. AsiaCCS 2015: 483-494 - [c11]Pinghai Yuan, Qingkai Zeng, Xuhua Ding:
Hardware-Assisted Fine-Grained Code-Reuse Attack Detection. RAID 2015: 66-85 - [c10]Liang Deng, Qingkai Zeng, Yao Liu:
ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries. SEC 2015: 386-400 - [c9]Yue Wang, Hao Sun, Qingkai Zeng:
Statically-Guided Fork-based Symbolic Execution for Vulnerability Detection. SEKE 2015: 536-539 - [c8]Hao Sun, Chao Su, Yue Wang, Qingkai Zeng:
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis. SEKE 2015: 601-606 - [c7]Weiguang Wang, Qingkai Zeng:
Evaluating Initial Inputs for Concolic Testing. TASE 2015: 47-54 - [c6]Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng:
Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses. TrustCom/BigDataSE/ISPA (1) 2015: 190-197 - 2014
- [c5]Pinghai Yuan, Qingkai Zeng, Yao Liu:
Using Machine Language Model for Mimimorphic Malware Detection. ISC 2014: 490-501 - [c4]Bing Chen, Qingkai Zeng, Weiguang Wang:
Crashmaker: an improved binary concolic testing tool for vulnerability detection. SAC 2014: 1257-1263 - [c3]Liang Deng, Qingkai Zeng, Weiguang Wang, Yao Liu:
EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor. TrustCom 2014: 300-309 - 2012
- [c2]Weiguang Wang, Qingkai Zeng, Aditya P. Mathur:
A Security Assurance Framework Combining Formal Verification and Security Functional Testing. QSIC 2012: 136-139
2000 – 2009
- 2006
- [c1]Nai Xia, Bing Mao, Qingkai Zeng, Li Xie:
Efficient and Practical Control Flow Monitoring for Program Security. ASIAN 2006: 90-104
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-16 23:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint