Mingyi Zhao
Mingyi Zhao
Snap Inc.
Verified email at snap.com
TitleCited byYear
Comparing different moving target defense techniques
J Xu, P Guo, M Zhao, RF Erbacher, M Zhu, P Liu
Proceedings of the First ACM Workshop on Moving Target Defense, 97-107, 2014
742014
An empirical study of web vulnerability discovery ecosystems
M Zhao, J Grossklags, P Liu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
422015
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs
T Maillart, M Zhao, J Grossklags, J Chuang
Journal of Cybersecurity 3 (2), 81-90, 2017
222017
An exploratory study of white hat behaviors in a web vulnerability disclosure program
M Zhao, J Grossklags, K Chen
Proceedings of the 2014 ACM workshop on security information workers, 51-58, 2014
182014
Risk assessment of buffer" Heartbleed" over-read vulnerabilities
J Wang, M Zhao, Q Zeng, D Wu, P Liu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
172015
Banishing misaligned incentives for validating reports in bug-bounty platforms
A Laszka, M Zhao, J Grossklags
European Symposium on Research in Computer Security, 161-178, 2016
142016
Heaptherapy: An efficient end-to-end solution against heap buffer overflows
Q Zeng, M Zhao, P Liu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
142015
Devising effective policies for bug-bounty platforms and security vulnerability discovery
M Zhao, A Laszka, J Grossklags
Journal of Information Policy 7, 372-418, 2017
102017
Enforcement of autonomous authorizations in collaborative distributed query evaluation
Q Zeng, M Zhao, P Liu, P Yadav, S Calo, J Lobo
IEEE Transactions on Knowledge and Data Engineering 27 (4), 979-992, 2014
92014
Empirical analysis and modeling of black-box mutational fuzzing
M Zhao, P Liu
International Symposium on Engineering Secure Software and Systems, 173-189, 2016
72016
The rules of engagement for bug bounty programs
A Laszka, M Zhao, A Malbari, J Grossklags
International Conference on Financial Cryptography and Data Security, 2018
32018
Crowdsourced security vulnerability discovery: Modeling and organizing bug-bounty programs
M Zhao, A Laszka, T Maillart, J Grossklags
The HCOMP Workshop on Mathematical Foundations of Human Computation, Austin …, 2016
32016
Towards collaborative query planning in multi-party database networks
M Zhao, P Liu, J Lobo
IFIP Annual Conference on Data and Applications Security and Privacy, 19-34, 2015
32015
Modeling and checking the security of DIFC system configurations
M Zhao, P Liu
Automated Security Management, 21-38, 2013
32013
Given Enough Eyeballs, All Bugs Are Shallow?
T Maillart, M Zhao, J Grossklags, J Chuang
Revisiting Eric Raymond with bug bounty markets, 2016
22016
Poster: Targeted Therapy for Program Bugs
Q Zeng, M Zhao, P Liu
the 35th IEEE Symposium on Security and Privacy, 2014
22014
Federating geovisual analytic tools for cyber security analysis
M Zhao, C Zhong, R Ciamaichelo, M Konek, N Sawant, NA Giacobe
2012 IEEE Conference on Visual Analytics Science and Technology (VAST), 303-304, 2012
22012
Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration
M Zhao
12016
Towards Agile Cyber Analysis: Leveraging Visualization as Functions in Collaborative Visual Analytics
C Zhong, M Zhao, G Xiao, J Xu
Proceedings of IEEE Symposium on Visual Analytics Science and Technology, 2013
12013
Decentralized Policy Confidentiality Preserving Query Planning in Coalition Networks
M Zhao, P Liu, F Ye, J Lobo
ACITA, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20