• 104 Citations
  • 4 h-Index
20122019

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Youzhi Bao is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 2 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 104 Citations
  • 4 h-Index
  • 4 Conference contribution
  • 1 Article

Matched and mismatched SOCs: A qualitative study on security operations center issues

Kokulu, F. B., Shoshitaishvili, Y., Soneji, A., Zhao, Z., Ahn, G. J., Bao, T. & Doupé, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1955-1970 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
  • 1 Scopus citations

    How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games

    Bao, T., Shoshitaishvili, Y., Wang, R., Kruegel, C., Vigna, G. & Brumley, D., Sep 25 2017, Proceedings - IEEE 30th Computer Security Foundations Symposium, CSF 2017. IEEE Computer Society, p. 7-21 15 p. 8049648

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 4 Scopus citations

    Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits

    Bao, T., Wang, R., Shoshitaishvili, Y. & Brumley, D., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 824-839 16 p. 7958612. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 17 Scopus citations

    BYTEWEIGHT: Learning to recognize functions in binary code

    Bao, T., Burket, J., Woo, M., Turner, R. & Brumley, D., Jan 1 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 845-860 16 p. (Proceedings of the 23rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 77 Scopus citations

    Type-based dynamic taint analysis technology

    Zhuge, J., Chen, L., Tian, F., Bao, Y. & Lu, X., Oct 2012, In : Qinghua Daxue Xuebao/Journal of Tsinghua University. 52, 10, p. 1320-1328+1334

    Research output: Contribution to journalArticle

  • 5 Scopus citations

    Projects