​
Login / Signup
Ping Chen
ORCID
Publication Activity (10 Years)
Years Active: 2009-2021
Publications (10 Years): 11
Top Topics
Neural Network
Countermeasures
Automatic Construction
Previously Learned
Top Venues
CoRR
DSN
CIC
AsiaCCS
</>
Publications
</>
Zhisheng Hu
,
Ping Chen
,
Minghui Zhu
,
Peng Liu
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks.
IEEE Trans. Inf. Forensics Secur.
16 (2021)
Xusheng Li
,
Zhisheng Hu
,
Haizhou Wang
,
Yiwei Fu
,
Ping Chen
,
Minghui Zhu
,
Peng Liu
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics.
J. Comput. Secur.
28 (5) (2020)
Zhisheng Hu
,
Minghui Zhu
,
Ping Chen
,
Peng Liu
On convergence rates of game theoretic reinforcement learning algorithms.
Autom.
104 (2019)
Xusheng Li
,
Zhisheng Hu
,
Yiwei Fu
,
Ping Chen
,
Minghui Zhu
,
Peng Liu
ROPNN: Detection of ROP Payloads Using Deep Neural Networks.
CoRR
(2018)
Ping Chen
,
Zhisheng Hu
,
Jun Xu
,
Minghui Zhu
,
Peng Liu
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks.
Cybersecur.
1 (1) (2018)
Jun Xu
,
Dongliang Mu
,
Xinyu Xing
,
Peng Liu
,
Ping Chen
,
Bing Mao
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
USENIX Security Symposium
(2017)
Ping Chen
,
Jun Xu
,
Zhisheng Hu
,
Xinyu Xing
,
Minghui Zhu
,
Bing Mao
,
Peng Liu
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
DSN
(2017)
Liang Deng
,
Peng Liu
,
Jun Xu
,
Ping Chen
,
Qingkai Zeng
Dancing with Wolves: Towards Practical Event-driven VMM Monitoring.
VEE
(2017)
Jun Xu
,
Pinyao Guo
,
Bo Chen
,
Robert F. Erbacher
,
Ping Chen
,
Peng Liu
Demo: A Symbolic N-Variant System.
MTD@CCS
(2016)
Jun Xu
,
Dongliang Mu
,
Ping Chen
,
Xinyu Xing
,
Pei Wang
,
Peng Liu
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
CCS
(2016)
Zhisheng Hu
,
Ping Chen
,
Yang Lu
,
Minghui Zhu
,
Peng Liu
Towards a Science for Adaptive Defense: Revisit Server Protection.
CIC
(2016)
Ping Chen
,
Jun Xu
,
Jun Wang
,
Peng Liu
Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack.
CoRR
(2015)
Ping Chen
,
Jun Xu
,
Zhiqiang Lin
,
Dongyan Xu
,
Bing Mao
,
Peng Liu
A Practical Approach for Adaptive Data Structure Layout Randomization.
ESORICS (1)
(2015)
Rui Wu
,
Ping Chen
,
Peng Liu
,
Bing Mao
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
DSN
(2014)
Wenbiao Ding
,
Xiao Xing
,
Ping Chen
,
Zhi Xin
,
Bing Mao
Automatic construction of printable return-oriented programming payload.
MALWARE
(2014)
Ping Chen
,
Rui Wu
,
Bing Mao
JITSafe: a framework against Just-in-time spraying attacks.
IET Inf. Secur.
7 (4) (2013)
Feifei Wang
,
Ping Chen
,
Bing Mao
,
Li Xie
RandHyp: Preventing Attacks via Xen Hypercall Interface.
SEC
(2012)
Rui Wu
,
Ping Chen
,
Bing Mao
,
Li Xie
RIM: A Method to Defend from JIT Spraying Attack.
ARES
(2012)
Ping Chen
,
Dongyan Xu
,
Bing Mao
CloudER: a framework for automatic software vulnerability location and patching in the cloud.
AsiaCCS
(2012)
Ping Chen
,
Yi Fang
,
Bing Mao
,
Li Xie
JITDefender: A Defense against JIT Spraying Attacks.
SEC
(2011)
Ping Chen
,
Xiao Xing
,
Bing Mao
,
Li Xie
,
Xiaobin Shen
,
Xinchun Yin
Automatic construction of jump-oriented programming shellcode (on the x86).
AsiaCCS
(2011)
Ping Chen
,
Xiao Xing
,
Bing Mao
,
Li Xie
Return-Oriented Rootkit without Returns (on the x86).
ICICS
(2010)
Ping Chen
,
Xiao Xing
,
Hao Han
,
Bing Mao
,
Li Xie
Efficient Detection of the Return-Oriented Programming Malicious Code.
ICISS
(2010)
Yi Wang
,
Ping Chen
,
Yi Ge
,
Bing Mao
,
Li Xie
Traffic Controller: A Practical Approach to Block Network Covert Timing Channel.
ARES
(2009)
Ping Chen
,
Yi Wang
,
Zhi Xin
,
Bing Mao
,
Li Xie
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability.
ARES
(2009)
Ping Chen
,
Hao Han
,
Yi Wang
,
Xiaobin Shen
,
Xinchun Yin
,
Bing Mao
,
Li Xie
IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program.
ICICS
(2009)
Ping Chen
,
Hai Xiao
,
Xiaobin Shen
,
Xinchun Yin
,
Bing Mao
,
Li Xie
DROP: Detecting Return-Oriented Programming Malicious Code.
ICISS
(2009)