Follow
Ping Chen
Ping Chen
Verified email at ist.psu.edu - Homepage
Title
Cited by
Year
SQLaser: Detecting DBMS Logic Bugs with Clause-Guided Fuzzing
J Wei, P Chen, K Lu, J Dai, X Sun
arXiv preprint arXiv:2407.04294, 2024
2024
HuntFUZZ: Enhancing Error Handling Testing through Clustering Based Fuzzing
J Wei, P Chen, J Dai, X Sun, Z Zhang, C Xu, Y Wanga
arXiv preprint arXiv:2407.04297, 2024
2024
Secure Device-to-Device Communication in IoT: Fuzzy Identity from Wireless Channel State Information for Identity-Based Encryption
B Zhang, T Zhang, Z Xi, P Chen, J Wei, Y Liu
Electronics 13 (5), 984, 2024
2024
DSLR–: A low-overhead data structure layout randomization for defending data-oriented programming
J Wei, P Chen
Journal of Computer Security, 1-26, 2023
2023
HARM: Hardware-assisted continuous re-randomization for microcontrollers
J Shi, L Guan, W Li, D Zhang, P Chen, N Zhang
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 520-536, 2022
132022
Method to input content in a structured manner with real-time assistance and validation
K Chen, P Chen, MJ Dutch, B Chen, CH Claudatos, F Shao
US Patent 11,288,449, 2022
12022
Semantics-preserving reinforcement learning attack against graph neural networks for malware detection
L Zhang, P Liu, YH Choi, P Chen
IEEE Transactions on Dependable and Secure Computing 20 (2), 1390-1402, 2022
392022
A co-design adaptive defense scheme with bounded security damages against heartbleed-like attacks
Z Hu, P Chen, M Zhu, P Liu
IEEE Transactions on Information Forensics and Security 16, 4691-4704, 2021
42021
On convergence rates of game theoretic reinforcement learning algorithms
Z Hu, M Zhu, P Chen, P Liu
Automatica 104, 90-101, 2019
102019
Measuring performance of storage system
Z Yang, C Fan, P Chen, X Chen, H Chen
US Patent 10,203,907, 2019
12019
Set-based bugs discovery system via SQL query
P Chen, K Chen, J Tao, MJ Dutch, M Chamness, B Chen
US Patent 10,146,605, 2018
2018
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks
P Chen, Z Hu, J Xu, M Zhu, P Liu
Cybersecurity 1, 1-13, 2018
72018
System for discovering bugs using interval algebra query language
K Chen, J Tao, P Chen, MJ Dutch, M Chamness, WD Andruss, B Chen, ...
US Patent 10,061,681, 2018
2018
ROPNN: Detection of ROP payloads using deep neural networks
X Li, Z Hu, Y Fu, P Chen, M Zhu, P Liu
arXiv preprint arXiv:1807.11110, 2018
112018
What you see is not what you get! thwarting just-in-time rop with chameleon
P Chen, J Xu, Z Hu, X Xing, M Zhu, B Mao, P Liu
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
92017
Dancing with wolves: Towards practical event-driven vmm monitoring
L Deng, P Liu, J Xu, P Chen, Q Zeng
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017
262017
Postmortem program analysis with {Hardware-Enhanced}{Post-Crash} artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017
562017
Towards a science for adaptive defense: Revisit server protection
Z Hu, P Chen, Y Lu, M Zhu, P Liu
2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016
12016
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
542016
Demo: A Symbolic N-Variant System
PL Jun Xu, Pinyao Guo, Bo Chen, Robert F Erbacher, Ping Chen
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 65-68, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20