Publications for Zhichun Li

  • Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems

    Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (CIKM 2017), Pan Pacific, Singapore
    pp. 707-715, 2017

    Boxiang Dong, Zhengzhang Chen, Hui (Wendy) Wang, Lu-An Tang, Kai Zhang, Ying Lin, Wei Cheng, Zhichun Li, Haifeng Chen
    11/27/2017
  • High Fidelity Data Reduction for Big Data Security Dependency Analyses

    The 23rd ACM Conference on Computer and Communications Security (CCS 2016)
    pp. 504-516, 2016

    Zhang Xu, Zhenyu Wu, Zhichun Li, Xusheng Xiao, Kangkook Jee, Junghwan Rhee, Fengyuan Xu, Haining Wang, Guofei Jiang
    10/28/2016
  • Detecting Stack Layout Corruptions with Robust Stack Unwinding

    The 19th International Symposium on Research in Attacks (RAID 2016)
    Springer Publishing ISBN: 978-3-319-45719-2; pp. 71-94, 2016

    Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang
    09/21/2016
  • Behavior Query Discovery in System-Generated Temporal Graphs

    The 42nd International Conference on Bery Large Data Bases (VLDB 2016)
    Vol. 9, No. 4; pp. 240-251, 2015

    Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifen Yan, Ambuj Singh , Guofei Jiang
    09/09/2016
  • SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps

    Proceedings of the 24th USENIX Security Symposium, Washington, DC
    pp. 977-992, 2015

    Jianjun Huang , Zhichun Li , Xusheng Xiao , Zhenyu Wu , Kangjie Lu , Xiangyu Zhang , Guofei Jiang
    08/12/2015
  • Discover and Tame Long-running Idling Processes in Enterprise Systems

    ASIACCS 2015 -- 10th ACM Symposium on Information, Computer and Communications Security , Singapore, China
    ACM 978-1-4503-3245-3/15/04; pp. 543-554, 2015

    Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee , Xia Ning, Peng Liu, Guofei Jiang
    04/15/2015
  • Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting

    NDSS Symposium 2015 -- The 2015 Network and Distributed System Security , San Diego, CA
    Proceedings of the NDSS 2015 Symposium

    Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang
    02/09/2015
  • CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities

    Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012)
    ACM, pp. 229-240; 2012

    Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang
    10/16/2012

NetShield: Matching with a Large Vulnerability Signature Ruleset for High Performance Network Defense
ACM SIGCOMM
Zhichun Li and Gao Xia and Hongyu Gao and Yi Tang and Yan Chen and Bin Liu and Junchen Jiang and Yuezhou Lv
2010