Author(s) |
Paper Titles |
Paper Details (Journal name, publication year, volume, issue numbers, pages/paper number) |
B. Gao, H. Wang, P. Xia, S. Wu, Y. Zhou, X. Luo, and G. Tyson |
Tracking Counterfeit Cryptocurrency End-to-end |
Proc. of ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), Beijing, China, June 2021. |
L. Xue, H. Zhou, X. Luo, Y. Zhou, Y. Shi, G. Gu, F. Zhang, and M. Au |
Happer: Unpacking Android Apps via a Hardware-Assisted Approach |
Proc. of the 42nd IEEE Symposium on Security and Privacy (S&P), May 2021. |
X. Zhan, L. Fan, S. Chen, F. Wu, T. Liu, X. Luo, and Y. Liu |
ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Apps |
Proc. of the 43rd International Conference on Software Engineering (ICSE), May 2021 |
Z. Wan, X. Xia, D. Lo, J. Chen, X. Luo, and X. Yang |
Smart Contract Security: a Practitioners' Perspective |
Proc. of the 43rd International Conference on Software Engineering (ICSE), May 2021. |
Y. Hu, H. Wang, T. Ji, X. Xiao, X. Luo, P. Gao, and Y. Guo |
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies |
Proc. of the 43rd International Conference on Software Engineering (ICSE), May 2021. |
X. Ma, M. Shi, B. An, J. Li, X. Luo, J. Zhang, and X. Guan |
Context-aware Website Fingerprinting over Encrypted Proxies |
Proc. of IEEE International Conference on Computer Communications (INFOCOM), May 2021. |
K. Zhao, H. Zhou, Y. Zhu, K. Zhou, X. Zhan, J. Li, L. Yu, W. Yuan, and X. Luo |
Structural Attack against Graph Based Android Malware Detection |
Proc. of the 28th ACM Conference on Computer and Communications Security (CCS), Seoul, Korea, November 2021. |
H. Zhou, H. Wang, S. Wu, X. Luo, Y. Zhou, T. Chen, and T. Wang |
Finding the Missing Piece: Permission Specification Analysis for Android NDK |
Proc. of the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), Melbourne, Australia, November 2021. |
Q. Liu, C. Zhang, L. Ma, M. Jiang, Y. Zhou, L. Wu, W. Shen, X. Luo, Y. Liu, and K. Ren |
Firm Guide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution |
Proc. of the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), Melbourne, Australia, November 2021. |
P. Jing, Q. Tang, Y. Du, L. Xue, X. Luo, T. Wang, S. Nie, and S. Wu |
Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations |
Proc. of the 30th USENIX Security Symposium (USENIX SEC), Vancouver, Canada, August 2021. |