NEWS
Free Institutional Consultancy Services
New Feature: Compare Your Institution with the Previous Year
Find a Professional: Explore Experts Across 197 Disciplines in 220 Countries!
Find a Professional
Print Your Certificate
New! Young University / Institution Rankings 2025
New! Art & Humanities Rankings 2025
New! Social Sciences and Humanities Rankings 2025
Highly Cited Researchers 2025
AD
Scientific Index 2025
Scientist Rankings
University Rankings
Subject Rankings
Country Rankings
login
Login
person_add
Register
insights
H-Index Rankings
insights
i10 Productivity Rankings
format_list_numbered
Citation Rankings
subject
University Subject Rankings
school
Young Universities
format_list_numbered
Top 100 Scientists
format_quote
Top 100 Institutions
format_quote
Compare & Choose
local_fire_department
Country Reports
person
Find a Professional
Ping Chen
Pennsylvania State University - University Park / United States
Engineering & Technology / Computer Science
AD Scientific Index ID: 898628
Registration, Add Profile,
Premium Membership
Print Your Certificate
Ranking &
Analysis
Job
Experiences (0)
Education
Information (0)
Published Books (0)
Book Chapters (0)
Articles (0)
Presentations (0)
Lessons (0)
Projects (0)
Subject Leaders
Editorship, Referee &
Scientific Board (0 )
Patents /
Designs (0)
Academic Grants
& Awards (0)
Artistic
Activities (0)
Certificate / Course
/ Trainings (0)
Association &
Society Memberships (0)
Contact, Office
& Social Media
person_outline
Ping Chen's MOST POPULAR ARTICLES
1-)
DROP: Detecting return-oriented programming malicious codeP Chen, H Xiao, X Shen, X Yin, B Mao, L XieInternational Conference on Information Systems Security, 163-177, 20092802009
2-)
JITDefender: A defense against JIT spraying attacksP Chen, Y Fang, B Mao, L XieIFIP International Information Security Conference, 142-153, 2011632011
3-)
Automatic construction of jump-oriented programming shellcode (on the x86)P Chen, X Xing, B Mao, L Xie, X Shen, X YinProceedings of the 6th ACM Symposium on Information, Computer and …, 2011552011
4-)
Postmortem program analysis with {Hardware-Enhanced}{Post-Crash} artifactsJ Xu, D Mu, X Xing, P Liu, P Chen, B Mao26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017612017
5-)
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core DumpJ Xu, D Mu, P Chen, X Xing, P Wang, P LiuProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016572016
ARTICLES
Add your articles
We use cookies to personalize our website and offer you a better experience. If you accept cookies, we can offer you special services.
Cookie Policy
Accept