Publication List
Conference and Workshop
Kernel Auditing using Augmented Reference Behavior Analysis and Virtualized Selective Tracing.
In the 47th IEEE Symposium on Security and Privacy (S&P), 2026.
PromoGuardian: Detecting Promotion Abuse Fraud with Multi-Relation Fused Graph Neural Networks.
In the 47th IEEE Symposium on Security and Privacy (S&P), 2026.
RSafe: Incentivizing proactive reasoning to build robust and adaptive LLM safeguards.
In the 39th Annual Conference on Neural Information Processing Systems (NeurIPS), 2025.
Improving LLM-based Log Parsing by Learning from Errors in Reasoning Traces.
In the 40th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2025.
Propagation-Based Vulnerability Impact Assessment for Software Supply Chains.
In the 40th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2025.
PsyScam: A Benchmark for Psychological Techniques in Real-World Scams.
In the 2025 Conference on Empirical Methods in Natural Language Processing (EMNLP), 2025.
TAPPecker: TAP Logic Inference and Violation Detection in Heterogeneous Smart Home Systems.
In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2025.
TANS: A Chess-Inspired Notation System for Strategy Analysis of Tennis Games.
In the 2nd International Sports Analytics Conference and Exhibition (ISACE), 2025.
Distinguished Paper AwardSignals and Symptoms: ICS Attack Dataset from Railway Cyber Range.
In the 11th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems, 2025.
Evaluating Disassembly Errors With Only Binaries.
In the 20th ACM ASIA Conference on Computer and Communications Security (AsiaCCS), 2025.
Fuzzing the PHP Interpreter via Dataflow Fusion.
In the 34th USENIX Security Symposium, 2025.
Distinguished Paper AwardYour Scale Factors are My Weapon: Targeted Bit-Flip Attacks on Vision Transformers via Scale Factor Manipulation..
In the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2025.
Fork State-Aware Differential Fuzzing for Blockchain Consensus Implementations.
In International Conference on Software Engineering (ICSE), 2025.
Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines.
In European Conference on Computer Systems (EuroSys), 2025.
Scrutinizer: Towards Secure Forensics on Compromised TrustZone.
In the 32nd Annual Network and Distributed System Security Symposium (NDSS), 2025.
UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications.
In the 32nd Annual Network and Distributed System Security Symposium (NDSS), 2025.
ProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics of Provenance Graphs.
In the 32nd Annual Network and Distributed System Security Symposium (NDSS), 2025.
From Observations to Insights: Constructing Effective Cyberattack Provenance with PROVCON.
In Workshop on SOC Operations and Construction (WOSOC) 2025, 2025.
VulZoo: A Comprehensive Vulnerability Intelligence Dataset (Tool Demonstration Track).
In the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2024.
MaskDroid: Robust Android Malware Detection with Masked Graph Representations.
In the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2024.
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches.
In ACM SIGSAC Conference on Computer and Communications Security (CCS), 2024.
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities.
In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2024.
Best Practical Paper AwardCrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning.
In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2024.
UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation.
In the 33rd USENIX Security Symposium, 2024.
Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation.
In International Conference on Software Engineering (ICSE), 2024.
Evaluating Disassembly Ground Truth Through Dynamic Tracing.
In Workshop on Binary Analysis Research (BAR), 2024.
Securing Web Inputs Using Parallel Session Attachments.
In International Conference on Security and Privacy in Communication Networks (SecureComm), 2023.
Learning Graph-based Code Representations for Source-level Functional Similarity Detection.
In International Conference on Software Engineering (ICSE), 2023.
PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability.
In the 17th ACM ASIA Conference on Computer and Communications Security (CCS), 2022.
Extensible Virtual Call Integrity.
In the 27th European Symposium on Research in Computer Security (ESORICS), 2022.
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
In the 27th European Symposium on Research in Computer Security (ESORICS), 2022.
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation.
In the 31st USENIX Security Symposium, 2022.
FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries.
In the 31st USENIX Security Symposium, 2022.
TeLL: Log Level Suggestions via Modeling Multi-level Code Block Information.
In the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2022.
RecIPE: Revisiting the Evaluation of Memory Error Defenses.
In the 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS), 2022.
ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records.
In the 2022 IEEE Symposium on Security and Privacy (S&P), 2022.
Identifying privacy weaknesses from multi-party trigger-action integration platforms.
In International Symposium on Software Testing and Analysis (ISSTA), 2021.
Watson: Abstracting Behaviors from Audit logs via Aggregation of Contextual Semantics.
In the 28th Annual Network and Distributed System Security Symposium (NDSS), 2021.
Robust P2P Primitives Using SGX Enclaves.
In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2020.
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment.
In ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019.
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking.
In Information Security Conference (ICS), 2019.
Detecting Android Side Channel Probing Attacks Based on System States.
In International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2019.
Best Paper AwardOne Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.
In Network and Distributed System Security Symposium (NDSS), 2019.
Distinguished Paper Award Honorable MentionsFuzzing Program Logic Deeply Hidden in Binary Program Stages.
In the 26th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2019.
HOMESCAN: Scrutinizing Implementations of Smart Home Integrations.
In the 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), 2018.
Automated Identification of Sensitive Data via Flexible User Requirements.
In International Conference on Security and Privacy in Communication Networks (SecureComm), 2018.
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware.
In the 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018.
Robust Detection of Android UI Similarity.
In IEEE International Conference on Communications (ICC), 2018.
A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT.
In IEEE Conference on Computer Communications (INFOCOM), 2018.
Automatically Assessing Crashes From Heap Overflows.
In the 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017.
Detecting Phishing Websites via Aggregation Analysis of Page Layouts.
In International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI), 2017.
Enabling practical experimentation in cyber-security training.
In International Conference on Dependable Systems and Communications (DSC), 2017.
Privilege Leakage and Information Stealing through the Android Task Mechanism.
In International Conference on Pervasive and Ubiquitous Computing Adjunct (PAC), 2017.
Neural Nets Can Learn Function Type Signatures From Binaries.
In the 26th USENIX Security Symposium, 2017.
Phishing Website Detection Based on Effective CSS Features of Web Pages.
In International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2017.
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
In ACM SIGSAC Conference on Computer and Communications Security (CCS), 2016.
A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications.
In International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI), 2016.
Toward Exposing Timing-Based Probing Attacks in Web Applications.
In International Conference on Wireless Algorithms, Systems, and Applications 2016 (WASA), 2016.
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation.
In the 16th Privacy Enhancing Technologies Symposium (PETS), 2016.
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks.
In IEEE Symposium on Security and Privacy 2016 (S&P), 2016.
Web-to-Application Injection Attacks on Android: Characterization and Detection.
In European Symposium on Research in Computer Security 2015 (ESORICS), 2015.
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
In European Symposium on Research in Computer Security 2015 (ESORICS), 2015.
Automatic Generation of Data-Oriented Exploits.
In the 24th USENIX Security Symposium, 2015.
A Usage-Pattern Perspective for Privacy Ranking of Android Apps.
In the 2014 International Conference on Intelligent Science and Systems (ICISS), 2014.
You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers.
In the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2014.
DroidVault: A Trusted Data Vault for Android Devices.
In the 19th International Conference on Engineering of Complex Computer Systems (ICECCS), 2014.
Best Paper AwardUnderstanding Complex Binary Loading Behaviors.
In the 19th International Conference on Engineering of Complex Computer Systems (ICECCS), 2014.
SQLR: Grammar-Guided Validation of SQL Injection Sanitizers (short paper).
In the 19th International Conference on Engineering of Complex Computer Systems (ICECCS), 2014.
A Light-Weight Software Environment for Confining Android Malware.
In International Workshop on Trustworthy Computing, 2014.
I Know Where You’ve Been: Geo-Inference Attacks via the Browser Cache.
In Web 2.0 Security & Privacy Workshop 2014 (W2SP), 2014.
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms.
In the 19th International Symposium on Formal Method (FM), 2014.
AirBag: Boosting Smartphone Resistance to Malware Infection.
In the 21st Network & Distributed System Security Symposium (NDSS), 2014.
Rating Web Pages Using Page-Transition Evidence.
In the 15th International Conference on Information and Communications Security (ICICS), 2013.
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS.
In the 20th ACM Conference on Computer and Communications Security (CCS), 2013.
A Quantitative Evaluation of Privilege Separation in Web Browser Designs.
In the 18th European Symposium on Computer Security (ESORICS), 2013.
BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features.
In the 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2013.
A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications.
In the 18th International Conference on Engineering of Complex Computer Systems (ICECCS), 2013.
A Software Environment for Confining Malicious Android Applications via Resource Virtualization (Short paper).
In the 18th International Conference on Engineering of Complex Computer Systems (ICECCS), 2013.
Enforcing system-wide control flow integrity for exploit detection and diagnosis.
In the 8th ACM SIGSAC symposium on Information, computer and communications security (AsiaCCS), 2013.
Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer.
In the 14th International Conference on Information and Communications Security (ICICS), 2012.
An Empirical Study of Dangerous Behaviors in Firefox Extensions.
In the 15th International Conference on Information Security (ISC), 2012.
Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions.
In the 17th European Symposium on Computer Security (ESORICS), 2012.
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations.
In the 10th International Conference on Applied Cryptography and Network Security (ACNS), 2012.
A Framework to Eliminate Backdoors from Response-Computable Authentication.
In the 33rd IEEE Symposium on Security and Privacy (S&P), 2012.
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.
In the 19th Annual Network & Distributed System Security Symposium (NDSS), 2012.
AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements.
In the 27th Annual Computer Security Applications Conference (ACSAC), 2011.
Towards Fine-Grained Access Control in JavaScript Contexts.
In the 31st IEEE International Conference on Distributed Computing Systems (ICDCS), 2011.
Jump-Oriented Programming: A New Class of Code-Reuse Attack.
In the 6th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), 2011.
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks.
In the 26th Annual Computer Security Applications Conference (ACSAC), 2010.
Golden implementation driven software debugging.
In the 18th ACM SIGSOFT international symposium on Foundations of software engineering (FSE), 2010.
Test generation to expose changes in evolving programs.
In the 25th IEEE/ACM International Conference on Automated Software Engineering, 2010.
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization.
In the 6th International Conference on Security and Privacy in Communication Systems (SecureComm), 2010.
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.
In the 12th International Symposium on Recent Advances in Intrusion Detection (RAID), 2009.
DARWIN: an approach for debugging evolving programs.
In the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC/SIGSOFT FSE), 2009.
Distinguished Paper Award
Journal
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-identity Association.
In IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 2, 2023.
Semantic-fuzzing-based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages.
In IEEE Internet of Things Journal, Volume 9, Issue 12, 2022.
Scrutinizing Implementations of Smart Home Integrations.
In IEEE Transactions on Software Engineering (TSE), Volume 47, Issue 12, 2021.
Asia's Surging Interest in Binary Analysis.
In Communications of the ACM, Volume 63, Issue 4, 2020.
Phishing Page Detection via Learning Classifiers from Page Layout Feature.
In EURASIP Journal on Wireless Communications and Networking (EURASIP JWCN), Volume 2019, 2019.
I Can See Your Brain: Investigating Home-Use Electroencephalography System Security.
In IEEE Internet of Things Journal (IoT-J), Volume 6, Issue 4, 2019.
Automated Identification of Sensitive Data from Implicit User Specification.
In Cybersecurity, Volume 1, Issue 1, 2018.
Detecting Malicious Behaviors in JavaScript Applications.
In IEEE Access, Volume 6, 2018.
SplitPass: A Mutually Distrusting Two-Party Password Manager.
In Journal of Computer Science and Technology (JCST), Volume 33, Issue 1, 2018.
Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity.
In IEEE Access, Volume 5, 2017.
RoppDroid: Robust Permission Re-delegation Prevention in Android Inter-component Communication.
In Computers & Security, Volume 68, 2017.
Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android.
In IEEE Transactions on Information Forensics and Security (TIFS), Volume 12, Issue 5, 2017.
A Framework for Practical Dynamic Software Updating.
In IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 27, Issue 4, 2017.
Toward Exposing Timing-Based Probing Attacks in Web Application.
In Sensors, Volume 17, Issue 3, 2017.
Man-in-the-browser-cache: Persisting HTTPS Attacks via Browser Cache Poisoning.
In Computer & Security, Volume 55, 2016.
A Framework for Practical Dynamic Software Updating.
In IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 27, Issue 4, 2016.
Automatic Permission Inference for Hybrid Mobile Apps.
In Journal of High Speed Networks, Volume 22, Issue 1, 2016.
SafeStack: Automatically Patching Stack-based Buffer Overflow Vulnerabilities.
In IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 10, Issue 6, 2015.
Tool, Technique, and Tao in Computer Security Education.
In IEEE Reliability Newsletter Special Issues, 2015.
I Know Where You’ve Been: Geo-Inference Attacks via the Browser Cache.
In IEEE Internet Computing, Volume 19, Issue 1, 2015.
DARWIN: An Approach for Debugging Evolving Programs.
In ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 21, Issue 3, 2013.