Publications in software security
ZendDiff: Differential Testing of PHP Interpreter.
In the 40th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2025.
TAPPecker: TAP Logic Inference and Violation Detection in Heterogeneous Smart Home Systems.
In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2025.
Evaluating Disassembly Errors With Only Binaries.
In the 20th ACM ASIA Conference on Computer and Communications Security (AsiaCCS), 2025.
Fuzzing the PHP Interpreter via Dataflow Fusion.
In the 34th USENIX Security Symposium, 2025.
Distinguished Paper AwardFork State-Aware Differential Fuzzing for Blockchain Consensus Implementations.
In International Conference on Software Engineering (ICSE), 2025.
UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications.
In the 32nd Annual Network and Distributed System Security Symposium (NDSS), 2025.
MaskDroid: Robust Android Malware Detection with Masked Graph Representations.
In the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2024.
CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning.
In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2024.
Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation.
In International Conference on Software Engineering (ICSE), 2024.
Evaluating Disassembly Ground Truth Through Dynamic Tracing.
In Workshop on Binary Analysis Research (BAR), 2024.
Securing Web Inputs Using Parallel Session Attachments.
In International Conference on Security and Privacy in Communication Networks (SecureComm), 2023.
Learning Graph-based Code Representations for Source-level Functional Similarity Detection.
In International Conference on Software Engineering (ICSE), 2023.
Extensible Virtual Call Integrity.
In the 27th European Symposium on Research in Computer Security (ESORICS), 2022.
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation.
In the 31st USENIX Security Symposium, 2022.
FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries.
In the 31st USENIX Security Symposium, 2022.
TeLL: Log Level Suggestions via Modeling Multi-level Code Block Information.
In the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2022.
RecIPE: Revisiting the Evaluation of Memory Error Defenses.
In the 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS), 2022.
Identifying privacy weaknesses from multi-party trigger-action integration platforms.
In International Symposium on Software Testing and Analysis (ISSTA), 2021.
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking.
In Information Security Conference (ICS), 2019.
Detecting Android Side Channel Probing Attacks Based on System States.
In International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2019.
Best Paper AwardOne Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.
In Network and Distributed System Security Symposium (NDSS), 2019.
Distinguished Paper Award Honorable MentionsFuzzing Program Logic Deeply Hidden in Binary Program Stages.
In the 26th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2019.
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware.
In the 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018.
HOMESCAN: Scrutinizing Implementations of Smart Home Integrations.
In the 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), 2018.
A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT.
In IEEE Conference on Computer Communications (INFOCOM), 2018.
Automatically Assessing Crashes From Heap Overflows.
In the 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017.
Neural Nets Can Learn Function Type Signatures From Binaries.
In the 26th USENIX Security Symposium, 2017.
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
In ACM SIGSAC Conference on Computer and Communications Security (CCS), 2016.
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks.
In IEEE Symposium on Security and Privacy 2016 (S&P), 2016.
Web-to-Application Injection Attacks on Android: Characterization and Detection.
In European Symposium on Research in Computer Security 2015 (ESORICS), 2015.
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
In European Symposium on Research in Computer Security 2015 (ESORICS), 2015.
Automatic Generation of Data-Oriented Exploits.
In the 24th USENIX Security Symposium, 2015.
You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers.
In the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2014.
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS.
In the 20th ACM Conference on Computer and Communications Security (CCS), 2013.
A Quantitative Evaluation of Privilege Separation in Web Browser Designs.
In the 18th European Symposium on Computer Security (ESORICS), 2013.
Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions.
In the 17th European Symposium on Computer Security (ESORICS), 2012.
A Framework to Eliminate Backdoors from Response-Computable Authentication.
In the 33rd IEEE Symposium on Security and Privacy (S&P), 2012.
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.
In the 19th Annual Network & Distributed System Security Symposium (NDSS), 2012.
AdSentry: Comprehensive and Flexible Confinement of JavaScript-based Advertisements.
In the 27th Annual Computer Security Applications Conference (ACSAC), 2011.
Towards Fine-Grained Access Control in JavaScript Contexts.
In the 31st IEEE International Conference on Distributed Computing Systems (ICDCS), 2011.
Jump-Oriented Programming: A New Class of Code-Reuse Attack.
In the 6th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), 2011.
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks.
In the 26th Annual Computer Security Applications Conference (ACSAC), 2010.
Golden implementation driven software debugging.
In the 18th ACM SIGSOFT international symposium on Foundations of software engineering (FSE), 2010.
Test generation to expose changes in evolving programs.
In the 25th IEEE/ACM International Conference on Automated Software Engineering, 2010.
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.
In the 12th International Symposium on Recent Advances in Intrusion Detection (RAID), 2009.
DARWIN: an approach for debugging evolving programs.
In the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC/SIGSOFT FSE), 2009.
Distinguished Paper AwardBitBlaze: A New Approach to Computer Security via Binary Analysis.
In the 10th International Conference on Information and Communications Security (ICICS), 2008.
HookFinder: Identifying and Understanding Malware Hooking Behaviors.
In the 15th Annual Network & Distributed System Security Symposium (NDSS), 2008.
Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
In the 14th ACM Conference on Computer and Communications Security (CCS), 2007.
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
In the 16th USENIX Security Symposium, 2007.
Best Paper AwardAutomatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models.
In the 21th Annual Computer Security Applications Conference (ACSAC), 2005.
Fast and automated generation of attack signatures: a basis for building self-protecting servers.
In the 12th ACM Conference on Computer and Communications Security (CCS), 2005.
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
In the 12th Annual Network & Distributed System Security Symposium (NDSS), 2005.
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs.
In the 19th Annual Computer Security Applications Conference (ACSAC), 2003.
Outstanding Paper Award