| Author(s) | Paper Titles | Paper Details (Journal name, publication year, volume, issue numbers, pages/paper number) |
|---|---|---|
| B. Gao, H. Wang, P. Xia, S. Wu, Y. Zhou, X. Luo, and G. Tyson | Tracking Counterfeit Cryptocurrency End-to-end | Proc. of ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), Beijing, China, June 2021. |
| L. Xue, H. Zhou, X. Luo, Y. Zhou, Y. Shi, G. Gu, F. Zhang, and M. Au | Happer: Unpacking Android Apps via a Hardware-Assisted Approach | Proc. of the 42nd IEEE Symposium on Security and Privacy (S&P), May 2021. |
| X. Zhan, L. Fan, S. Chen, F. Wu, T. Liu, X. Luo, and Y. Liu | ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Apps | Proc. of the 43rd International Conference on Software Engineering (ICSE), May 2021 |
| Z. Wan, X. Xia, D. Lo, J. Chen, X. Luo, and X. Yang | Smart Contract Security: a Practitioners' Perspective | Proc. of the 43rd International Conference on Software Engineering (ICSE), May 2021. |
| Y. Hu, H. Wang, T. Ji, X. Xiao, X. Luo, P. Gao, and Y. Guo | CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies | Proc. of the 43rd International Conference on Software Engineering (ICSE), May 2021. |
| X. Ma, M. Shi, B. An, J. Li, X. Luo, J. Zhang, and X. Guan | Context-aware Website Fingerprinting over Encrypted Proxies | Proc. of IEEE International Conference on Computer Communications (INFOCOM), May 2021. |
| K. Zhao, H. Zhou, Y. Zhu, K. Zhou, X. Zhan, J. Li, L. Yu, W. Yuan, and X. Luo | Structural Attack against Graph Based Android Malware Detection | Proc. of the 28th ACM Conference on Computer and Communications Security (CCS), Seoul, Korea, November 2021. |
| H. Zhou, H. Wang, S. Wu, X. Luo, Y. Zhou, T. Chen, and T. Wang | Finding the Missing Piece: Permission Specification Analysis for Android NDK | Proc. of the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), Melbourne, Australia, November 2021. |
| Q. Liu, C. Zhang, L. Ma, M. Jiang, Y. Zhou, L. Wu, W. Shen, X. Luo, Y. Liu, and K. Ren | Firm Guide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution | Proc. of the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), Melbourne, Australia, November 2021. |
| P. Jing, Q. Tang, Y. Du, L. Xue, X. Luo, T. Wang, S. Nie, and S. Wu | Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations | Proc. of the 30th USENIX Security Symposium (USENIX SEC), Vancouver, Canada, August 2021. |
