Follow
Zhenpeng Lin
Zhenpeng Lin
Verified email at u.northwestern.edu - Homepage
Title
Cited by
Cited by
Year
A systematic study of elastic objects in kernel exploitation
Y Chen, Z Lin, X Xing
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
312020
GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs
Z Lin, Y Chen, Y Wu, C Yu, D Mu, X Xing, K Li
2022 IEEE Symposium on Security and Privacy (SP), 1217-1234, 2022
192022
Dirtycred: Escalating privilege in linux kernel
Z Lin, Y Wu, X Xing
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
142022
An In-depth Analysis of Duplicated Linux Kernel Bug Reports.
D Mu, Y Wu, Y Chen, Z Lin, C Yu, X Xing, G Wang
NDSS, 2022
52022
Mitigating Security Risks in Linux with {KLAUS}: A Method for Evaluating Patch Correctness
Y Wu, Z Lin, Y Chen, DK Le, D Mu, X Xing
32nd USENIX Security Symposium (USENIX Security 23), 4247-4264, 2023
22023
Your Trash Kernel Bug, My Precious 0-day
Z Lin, Y Chen, X Xing, K Li
Blackhat Europe, 38, 2021
22021
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections
K Zeng, Z Lin, K Lu, X Xing, R Wang, A Doupé, Y Shoshitaishvili, T Bao
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
2023
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs
Z Liu, Z Lin, Y Chen, Y Wu, Y Zou, D Mu, X Xing
IEEE Transactions on Dependable and Secure Computing, 2023
2023
Towards Understanding and Reducing Exploitability of Linux Kernel Bugs
Z Lin
Northwestern University, 2023
2023
Increasing Exploitability via Elastic Kernel Objects
Z Lin
2022
CAMP: Compiler and Allocator-based Heap Memory Protection
Z Lin, Z Yu, Z Guo, S Campanoni, P Dinda, X Xing
The system can't perform the operation now. Try again later.
Articles 1–11