Publication List
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches
In Proceedings of the 31th ACM Conference on Computer and Communications Security, 2024.
MaskDroid: Robust Android Malware Detection with Masked Graph Representations
In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024.
VulZoo: A Comprehensive Vulnerability Intelligence Dataset
In the 39th IEEE/ACM International Conference on Automated Software Engineering, Tool Demonstrations, 2024.
CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning
In the 27th International Symposium on Research in Attacks, Intrusions and Defenses, 2024.
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
In the 27th International Symposium on Research in Attacks, Intrusions and Defenses, 2024.
UIHASH: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation
In Proceedings of the 33rd USENIX Security Symposium, 2024.
Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation
In Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024.
Evaluating Disassembly Ground Truth Through Dynamic Tracing
In the Workshop on Binary Analysis Research co-located with NDSS Symposium, 2024.
Learning Graph-based Code Representations for Source-level Functional Similarity Detection
In Proceedings of the 45th International Conference on Software Engineering, 2023.
PalanTÃr: Optimizing Attack Provenance with Hardware-enhanced System Observability
In Proceedings of the 29th ACM Conference on Computer and Communications Security, 2022.
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation
In Proceedings of the 31st USENIX Security Symposium, 2022.
TeLL: Log Level Suggestions via Modeling Multi-level Code Block Information
In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, 2022.
ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records
In Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022.
Extensible Virtual Call Integrity
In the 27th European Symposium on Research in Computer Security, 2022.
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
In Proceedings of the 27th European Symposium on Research in Computer Security, 2022.
RecIPE: Revisiting the Evaluation of Memory Error Defenses
In the 17th ACM ASIA Conference on Computer and Communications Security, 2022.
Watson: Abstracting Behaviors from Audit logs via Aggregation of Contextual Semantics
In Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021.
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment
In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019.
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.
In NDSS, 2019.
Neural Nets Can Learn Function Type Signatures From Binaries
In 26th USENIX Security Symposium, 2017.
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016.
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks
In 2016 IEEE Symposium on Security and Privacy, 2016.
Automatic Generation of Data-Oriented Exploits
In 24th USENIX Security Symposium, 2015.