• 89 Citations
  • 3 h-Index
20122022
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Youzhi Bao is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 3 Similar Profiles
Transplants Engineering & Materials Science
Binary codes Engineering & Materials Science
Military operations Engineering & Materials Science
Vulnerability Mathematics
Dynamic Analysis Mathematics
Dynamic analysis Engineering & Materials Science
Semantics Engineering & Materials Science
Flow control Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2012 2019

  • 89 Citations
  • 3 h-Index
  • 4 Conference contribution
  • 1 Article

Matched and mismatched SOCs: A qualitative study on security operations center issues

Kokulu, F. B., Shoshitaishvili, Y., Soneji, A., Zhao, Z., Ahn, G. J., Bao, T. & Doupé, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1955-1970 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Managers
Security of data
Industry
Monitoring
2 Citations (Scopus)

How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games

Bao, T., Shoshitaishvili, Y., Wang, R., Kruegel, C., Vigna, G. & Brumley, D., Sep 25 2017, Proceedings - IEEE 30th Computer Security Foundations Symposium, CSF 2017. IEEE Computer Society, p. 7-21 15 p. 8049648

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Military operations
Game theory
Decision making
14 Citations (Scopus)

Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits

Bao, T., Wang, R., Shoshitaishvili, Y. & Brumley, D., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 824-839 16 p. 7958612

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Transplants
Remediation
Data storage equipment

BYTEWEIGHT: Learning to recognize functions in binary code

Bao, T., Burket, J., Woo, M., Turner, R. & Brumley, D., Jan 1 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 845-860 16 p. (Proceedings of the 23rd USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Reverse engineering
Flow control

Type-based dynamic taint analysis technology

Zhuge, J., Chen, L., Tian, F., Bao, Y. & Lu, X., Oct 1 2012, In : Qinghua Daxue Xuebao/Journal of Tsinghua University. 52, 10, p. 1320-1328+1334

Research output: Contribution to journalArticle

Vulnerability
Dynamic Analysis
Dynamic analysis
Semantics
Flow control

Projects 2017 2022