Zhiqiang Lin spends much of his time researching Computer security, Operating system, Malware, Code and Control flow. His research on Computer security often connects related areas such as Certificate. His work in the fields of Operating system, such as Virtual machine, Overhead, Call stack and Byte, overlaps with other areas such as Open Shortest Path First.
His Malware study combines topics in areas such as Binary code, Compiler, Offset and Source code. His Source code research is multidisciplinary, relying on both x86, Address space layout randomization and Parallel computing. His Code research is multidisciplinary, incorporating perspectives in Speculative execution and Branch predictor.
His primary areas of investigation include Computer security, Operating system, Software, Malware and Source code. His Computer security research is multidisciplinary, relying on both Speculative execution and Android. His research ties Embedded system and Operating system together.
His research in Malware tackles topics such as Kernel which are related to areas like Process. Zhiqiang Lin has included themes like Binary code, Control flow, Debugging and Compiler in his Source code study. His Rootkit research incorporates themes from Memory forensics and Data structure.
Zhiqiang Lin mostly deals with Computer security, Contact tracing, Mobile device, Android and Computer network. His Computer security study combines topics in areas such as Software, Web page and Firmware. Zhiqiang Lin has researched Software in several fields, including Microarchitecture, Denial-of-service attack, Exploit, Speculative execution and Server.
His Contact tracing research spans across into fields like Real-time computing, Telecommunications engineering and Documentation. His Android research incorporates elements of Transparency and Internet privacy. The study of Computer network is intertwined with the study of Leverage in a number of ways.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Automatic reverse engineering of data structures from binary execution
Zhiqiang Lin;Xiangyu Zhang;Dongyan Xu.
annual information security symposium (2010)
Binary stirring: self-randomizing instruction addresses of legacy x86 binary code
Richard Wartell;Vishwath Mohan;Kevin W. Hamlen;Zhiqiang Lin.
computer and communications security (2012)
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Zhiqiang Lin;Xuxian Jiang;Dongyan Xu;Xiangyu Zhang.
network and distributed system security symposium (2008)
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
Yangchun Fu;Zhiqiang Lin.
ieee symposium on security and privacy (2012)
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Tielei Wang;Tao Wei;Zhiqiang Lin;Wei Zou.
network and distributed system security symposium (2009)
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Jiongyi Chen;Wenrui Diao;Qingchuan Zhao;Chaoshun Zuo.
network and distributed system security symposium (2018)
SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps
David Sounthiraraj;Justin Sahs;Garrett Greenwood;Zhiqiang Lin.
network and distributed system security symposium (2014)
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution
Guoxing Chen;Sanchuan Chen;Yuan Xiao;Yinqian Zhang.
ieee symposium on security and privacy (2020)
SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution
Guoxing Chen;Sanchuan Chen;Yuan Xiao;Yinqian Zhang.
arXiv: Cryptography and Security (2018)
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Zhiqiang Lin;Junghwan Rhee;Xiangyu Zhang;Dongyan Xu.
network and distributed system security symposium (2011)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Purdue University West Lafayette
Purdue University West Lafayette
The University of Texas at Dallas
The Ohio State University
The Ohio State University
Texas A&M University
PeckShield
University of California, Riverside
The Open University
The University of Texas at Dallas
KU Leuven
Northeastern University
University of Arkansas at Fayetteville
Institute of Labor Economics
Intel (United States)
University of British Columbia
Royal Children's Hospital
Université Paris Cité
University of Illinois at Chicago
University of Maryland, Baltimore County
University of North Carolina at Chapel Hill
University of Nebraska at Omaha
National Research Council (CNR)
Leipzig University
Ben-Gurion University of the Negev
University of Padua