Jiang Ming
Jiang Ming
Verified email at - Homepage
Cited by
Cited by
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection
L Luo, J Ming, D Wu, P Liu, S Zhu
22nd ACM SIGSOFT International Symposium on the Foundations of Software …, 2014
iBinHunt: Binary Hunting with Inter-Procedural Control Flow
J Ming, M Pan, D Gao
15th Annual International Conference on Information Security and Cryptology …, 2012
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
J Ming, D Xu, Y Jiang, D Wu
26th USENIX Security Symposium (USENIX Security’17)., 2017
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
J Ming, D Xu, L Wang, D Wu
22nd ACM Conference on Computer and Communications Security (CCS'15), 2015
TaintPipe: Pipelined Symbolic Taint Analysis
J Ming, DinghaoWu, G Xiao, J Wang, P Liu
24th USENIX Security Symposium (USENIX Security’15), 2015
Linear Obfuscation to Combat Symbolic Execution
Z Wang, J Ming, C Jia, D Gao
16th European Symposium on Research in Computer Security (ESORICS’11), 2011
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping
D Xu, J Ming, D Wu
38th IEEE Symposium on Security and Privacy (S&P'17), 2017
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost
B Cheng*, J Ming*, J Fu, G Peng, T Chen, X Zhang, JY Marion
25th ACM Conference on Computer and Communications Security (CCS'18)., 2018
Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation
C Cao, L Guan, J Ming, P Liu
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
D Xu, J Ming, D Wu
19th Information Security Conference (ISC'16), 2016
VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification
D Xu, J Ming, Y Fu, D Wu
25th ACM Conference on Computer and Communications Security (CCS'18), 2018
StraightTaint: Decoupled Offline Symbolic Taint Analysis
J Ming, D Wu, J Wang, G Xiao, P Liu
31st IEEE/ACM International Conference on Automated Software Engineering …, 2016
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference
J Ming, D Xu, D Wu
30th IFIP TC-11 SEC International Information Security and Privacy …, 2015
Windranger: A directed greybox fuzzer driven by deviation basic blocks
Z Du, Y Li, Y Liu, B Mao
Proceedings of the 44th International Conference on Software Engineering …, 2022
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
H Xu, Y Zhou, J Ming, M Lyu
Cybersecurity 3, 1-18, 2020
Unleashing the hidden power of compiler optimization on binary code difference: An empirical study
X Ren, M Ho, J Ming, Y Lei, L Li
Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021
Impeding Behavior-based Malware Analysis via Replacement Attacks to Malware Specifications
J Ming, Z Xin, P Lan, D Wu, P Liu, B Mao
Journal of Computer Virology and Hacking Techniques, 2016
Deviation-Based Obfuscation-Resilient Program Equivalence Checking with Application to Software Plagiarism Detection
J Ming, F Zhang, D Wu, P Liu, S Zhu
IEEE Transactions on Reliability 65 (4), 2016
BIM Server Requirements to Support the Energy Efficient Building Lifecycle
Y Jiang, J Ming, D Wu, J Yen, P Mitra, JI Messner, R Leicht
2012 ASCE International Conference on Computing in Civil Engineering, 2012
The system can't perform the operation now. Try again later.
Articles 1–20