Dongrui Zeng
Dongrui Zeng
Palo Alto Networks
Verified email at
Cited by
Cited by
Additive manufacturing: A machine learning model of process-structure-property linkages for machining behavior of Ti-6Al-4V
X Gong, D Zeng, W Groeneveld-Meijer, G Manogharan
Mater Sci Add Manuf 1 (6), 1-16, 2022
Refining Indirect Call Targets at the Binary Level
SH Kim, C Sun, D Zeng, G Tan
The Network and Distributed System Security Symposium (NDSS) 2021, 2021
Program-mandering: Quantitative privilege separation
S Liu, D Zeng, Y Huang, F Capobianco, S McCamant, T Jaeger, G Tan
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
DeepCatra: Learning flow‐and graph‐based behaviours for Android malware detection
Y Wu, J Shi, P Wang, D Zeng, C Sun
IET Information Security 17 (1), 118-130, 2023
ReCFA: Resilient Control-Flow Attestation
Y Zhang, X Liu, C Sun, D Zeng, G Tan, X Kan, S Ma
Annual Computer Security Applications Conference, 311-322, 2021
From debugging-information based binary-level type inference to cfg generation
D Zeng, G Tan
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
Abslearn: a gnn-based framework for aliasing and buffer-size information retrieval
K Liang, J Tan, D Zeng, Y Huang, X Huang, G Tan
Pattern Analysis and Applications 26 (3), 1171-1189, 2023
Motion characteristics of cavitation bubble near the rigid wall with the driving of acoustic wave
X Ye, A Zhang, D Zeng
China Ocean Engineering 29 (1), 17-32, 2015
Numerical simulation of bubble dynamics in an elastic vessel
S Wang, A Zhang, Y Liu, D Zeng
The European Physical Journal E 36, 1-7, 2013
MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies
D Zeng, B Niu, G Tan
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2022
Binpointer: towards precise, sound, and scalable binary-level pointer analysis
SH Kim, D Zeng, C Sun, G Tan
Proceedings of the 31st ACM SIGPLAN International Conference on Compiler …, 2022
podft: On Accelerating Dynamic Taint Analysis with Precise Path Optimization
Z Tian, C Sun, D Zeng, G Tan
Proceedings of NDSS Workshop on Binary Analysis Research (San Diego, CA), 2023
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data‐flow analysis
C Sun, X Xu, Y Wu, D Zeng, G Tan, S Ma, P Wang
IET Information Security 17 (4), 582-597, 2023
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code
C Sun, Y Ma, D Zeng, G Tan, S Ma, Y Wu
IEEE Transactions on Dependable and Secure Computing 20 (2), 1461-1475, 2022
{LibScan}: Towards More Precise {Third-Party} Library Identification for Android Applications
Y Wu, C Sun, D Zeng, G Tan, S Ma, P Wang
32nd USENIX Security Symposium (USENIX Security 23), 3385-3402, 2023
Evaluating the Attack Surface of Control Flow Integrity
D Zeng
The Pennsylvania State University, 2021
The system can't perform the operation now. Try again later.
Articles 1–16