Zhong-Lin Liu

  • Citations Per Year
Learn More
QEMU, an excellent PC simulator which emulates the entire hardware components, is widely used to construct virtual networks. But it's restricted by efficiency and security. In order to solve these problems, the authors design a new component for connecting multiple virtual machines (VMs) to the host machine so as to build an emulated network environment(More)
Malware is one of the most serious threats to the security of computer systems. Many approaches have been provided and various systems have been designed to detect intrusion from anomalous behavior of system calls which provide the interface between a process and the operating system. Though these techniques look quite effective, a key element seems to be(More)
The aim of reverse engineering (RE) is to draw out many kinds of information from existing software and using this information for system renovation and program understanding. But the potential and limitations of reverse engineering techniques is still a matter of a debate and investigation. Current reverse engineering technique focuses on regaining(More)
  • 1