D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 34 Citations 5,269 130 World Ranking 8109 National Ranking 3779

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Programming language
  • Microsoft Windows

Zhiqiang Lin spends much of his time researching Computer security, Operating system, Malware, Code and Control flow. His research on Computer security often connects related areas such as Certificate. His work in the fields of Operating system, such as Virtual machine, Overhead, Call stack and Byte, overlaps with other areas such as Open Shortest Path First.

His Malware study combines topics in areas such as Binary code, Compiler, Offset and Source code. His Source code research is multidisciplinary, relying on both x86, Address space layout randomization and Parallel computing. His Code research is multidisciplinary, incorporating perspectives in Speculative execution and Branch predictor.

His most cited work include:

  • Binary stirring: self-randomizing instruction addresses of legacy x86 binary code (285 citations)
  • Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. (173 citations)
  • Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection (167 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Operating system, Software, Malware and Source code. His Computer security research is multidisciplinary, relying on both Speculative execution and Android. His research ties Embedded system and Operating system together.

His research in Malware tackles topics such as Kernel which are related to areas like Process. Zhiqiang Lin has included themes like Binary code, Control flow, Debugging and Compiler in his Source code study. His Rootkit research incorporates themes from Memory forensics and Data structure.

He most often published in these fields:

  • Computer security (38.76%)
  • Operating system (22.48%)
  • Software (15.50%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (38.76%)
  • Contact tracing (3.88%)
  • Mobile device (3.88%)

In recent papers he was focusing on the following fields of study:

Zhiqiang Lin mostly deals with Computer security, Contact tracing, Mobile device, Android and Computer network. His Computer security study combines topics in areas such as Software, Web page and Firmware. Zhiqiang Lin has researched Software in several fields, including Microarchitecture, Denial-of-service attack, Exploit, Speculative execution and Server.

His Contact tracing research spans across into fields like Real-time computing, Telecommunications engineering and Documentation. His Android research incorporates elements of Transparency and Internet privacy. The study of Computer network is intertwined with the study of Leverage in a number of ways.

Between 2019 and 2021, his most popular works were:

  • A study of the privacy of COVID-19 contact tracing apps (11 citations)
  • SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. (11 citations)
  • On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps. (6 citations)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Automatic reverse engineering of data structures from binary execution

Zhiqiang Lin;Xiangyu Zhang;Dongyan Xu.
annual information security symposium (2010)

531 Citations

Binary stirring: self-randomizing instruction addresses of legacy x86 binary code

Richard Wartell;Vishwath Mohan;Kevin W. Hamlen;Zhiqiang Lin.
computer and communications security (2012)

446 Citations

Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.

Zhiqiang Lin;Xuxian Jiang;Dongyan Xu;Xiangyu Zhang.
network and distributed system security symposium (2008)

304 Citations

Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection

Yangchun Fu;Zhiqiang Lin.
ieee symposium on security and privacy (2012)

254 Citations

IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.

Tielei Wang;Tao Wei;Zhiqiang Lin;Wei Zou.
network and distributed system security symposium (2009)

220 Citations

IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.

Jiongyi Chen;Wenrui Diao;Qingchuan Zhao;Chaoshun Zuo.
network and distributed system security symposium (2018)

214 Citations

SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps

David Sounthiraraj;Justin Sahs;Garrett Greenwood;Zhiqiang Lin.
network and distributed system security symposium (2014)

214 Citations

SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution

Guoxing Chen;Sanchuan Chen;Yuan Xiao;Yinqian Zhang.
ieee symposium on security and privacy (2020)

192 Citations

SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution

Guoxing Chen;Sanchuan Chen;Yuan Xiao;Yinqian Zhang.
arXiv: Cryptography and Security (2018)

149 Citations

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.

Zhiqiang Lin;Junghwan Rhee;Xiangyu Zhang;Dongyan Xu.
network and distributed system security symposium (2011)

136 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Zhiqiang Lin

Xiangyu Zhang

Xiangyu Zhang

Purdue University West Lafayette

Publications: 39

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 33

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 30

Dongyan Xu

Dongyan Xu

Purdue University West Lafayette

Publications: 28

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 26

Lucas Davi

Lucas Davi

University of Duisburg-Essen

Publications: 22

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 21

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 21

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 21

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 19

Xiapu Luo

Xiapu Luo

Hong Kong Polytechnic University

Publications: 19

Taesoo Kim

Taesoo Kim

Georgia Institute of Technology

Publications: 16

Heng Yin

Heng Yin

University of California, Riverside

Publications: 16

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 15

Michalis Polychronakis

Michalis Polychronakis

Stony Brook University

Publications: 15

Xiaofeng Wang

Xiaofeng Wang

Free University of Bozen-Bolzano

Publications: 15

Trending Scientists

Maurice Bruynooghe

Maurice Bruynooghe

KU Leuven

Ian Gorton

Ian Gorton

Northeastern University

Craig W Thompson

Craig W Thompson

University of Arkansas at Fayetteville

Maurice Schiff

Maurice Schiff

Institute of Labor Economics

Lars W. Liebmann

Lars W. Liebmann

Intel (United States)

Shuryo Nakai

Shuryo Nakai

University of British Columbia

Amanda J. Fosang

Amanda J. Fosang

Royal Children's Hospital

Klaus Scherrer

Klaus Scherrer

Université Paris Cité

Dennis R. Grayson

Dennis R. Grayson

University of Illinois at Chicago

Upal Ghosh

Upal Ghosh

University of Maryland, Baltimore County

Brenda M. DeVellis

Brenda M. DeVellis

University of North Carolina at Chapel Hill

Roni Reiter-Palmon

Roni Reiter-Palmon

University of Nebraska at Omaha

Francesca R. D'Amato

Francesca R. D'Amato

National Research Council (CNR)

Dietger Niederwieser

Dietger Niederwieser

Leipzig University

Nir Peled

Nir Peled

Ben-Gurion University of the Negev

Giovanni Carraro

Giovanni Carraro

University of Padua

Something went wrong. Please try again later.