代表性论文:
(1). Yan Wang; Chao Zhang; Xiaobo Xiang; Zixuan Zhao; Wenjie Li; Xiaorui Gong; Bingchang Liu; Kaixiang Chen; Wei Zou, Revery: from Proof-of-Concept to Exploitable (One Step towards Automatic Exploit Generation), ACM Conference on Computer and Communications Security (CCS’18), 2018.10.15-2018.10.19
(2). Binchang Liu; Wei Huo; Chao Zhang; Wenchao Li; Feng Li; Aihua Piao; Wei Zou, αDiff: Cross-Version Binary Code Similarity Detection with DNN, IEEE/ACM Automated Software Engineering (ASE’18), 2018.09.3-2018.9.7
(3). Shuitao Gan; Chao Zhang; Xiaojun Qin; Xuwen Tu; Kang Li; Zhongyu Pei; Zuoning Chen, CollAFL: Coverage Sensitive Fuzzing, IEEE Security & Privacy 2018 (IEEE S&P’18), 2018.5.21-2018.5.23
(4). Xiangkun Jia, Chao Zhang*, Purui Su*, Yi Yang, Huafeng Huang, Dengguo Feng. Towards Efficient Heap Overflow Discovery. In USENIX Security Symposium 2017 (Security’17) 2017.8.16-2017.8.18
(5). Chao Zhang; Scott A. Carr; Tongxin Li; Yu Ding; Chengyu Song; Mathias Payer; Dawn Song, VTrust: Regaining Trust on Virtual Calls, Network and Distributed System Security Symposium (NDSS’16), San Diego, CA, 2016.2.21-2016.2.24
(6). Chao Zhang; Chengyu Song; Kevin Zhijie Chen; Zhaofeng Chen; Dawn Song, VTint: Protecting Virtual Function Tables' Integrity., Network and Distributed System Security (NDSS’15), San Diego, CA, 2015.2.8-2015.2.11
(7). Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski. Exploiting and Protecting Dynamic Code Generation. In the Network and Distributed System Security Symposium (NDSS’15), San Diego, CA, Feb 2015
(8). Chao Zhang, Mehrdad Niknami, Kevin Zhijie Chen, Chengyu Song, Zhaofeng Chen, Dawn Song. JITScope: Protecting Web Users from Control-Flow Hijacking Attacks. In the IEEE Conference on Computer Communications (InfoCom’15), Hong Kong, China, April 2015
(9). Chao Zhang; Tao Wei; Zhaofeng Chen; Lei Duan; Laszlo Szekeres; Stephen McCamant; Dawn Song; Wei Zou, Practical control flow integrity and randomization for binary executables, IEEE Symposium on Security and Privacy (IEEE S&P’13), San Francisco, 2013.5.19-2013.5.22
(10). Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Wei Zou, Zhenkai Liang. A Framework to Eliminate Backdoors from Response Computable Authentication. In the 33rd IEEE Symposium on Security and Privacy (IEEE S&P’12), San Francisco, CA, May 2012.