publications
ROLoad: Securing Sensitive Operations with Pointee Integrity
Protect sensitive operations with hardware support.
Protect sensitive operations with hardware support.
Bypass virtual protections towards AEG.
Finding vulnerabilities in embedded systems
Manipulate heap layouts automatically.
This work explored the vulnerabilities of the chain-based authentication structure in the email ecosystem. We conducted a large-scale analysis of 30 popular email services and 23 email clients.
Exploit vulnerabilities in blockchains
Mitigate port-oriented programming attacks for macOS
Generate adversarial Chinese texts with Glyph and Pinyin mutation.