Pennsylvania State University

General Info

Rank: #12 Worldwide
#10 in US
Papers: 142
Number of Researchers: 127
APA
(average papers per authors):
1.1
Country: USA

Activity Map

Contributors

  • Patrick McDaniel (24 papers)
  • Peng Liu (24 papers)
  • Xinyu Xing (21 papers)
  • Ting Wang (19 papers)
  • Trent Jaeger (17 papers)
  • Dinghao Wu (13 papers)
  • Hong Hu (9 papers)
  • Gang Tan (8 papers)
  • Yueqi Chen (8 papers)
  • Wenbo Guo (6 papers)
  • Danfeng Zhang (6 papers)
  • Stephen McLaughlin (5 papers)
  • Jun Xu (5 papers)
  • Patrick Traynor (4 papers)
  • William Enck (4 papers)
  • Sencun Zhu (4 papers)
  • Dongpeng Xu (4 papers)
  • Kevin Butler (3 papers)
  • Zhenpeng Lin (3 papers)
  • Shen Liu (3 papers)
  • Chao-Hsien Chu (3 papers)
  • Dongliang Mu (3 papers)
  • Yuxin Wang (3 papers)
  • Daniel Kifer (3 papers)
  • Ren Pang (3 papers)
  • Damien Octeau (3 papers)
  • Zhaohan Xi (3 papers)
  • Donghai Tian (2 papers)
  • Chuangang Ren (2 papers)
  • Xinyang Ge (2 papers)
  • Z. Berkay Celik (2 papers)
  • Syed Rafiul Hussain (2 papers)
  • Dongrui Zeng (2 papers)
  • Yuhang Wu (2 papers)
  • Robert Brotzman (2 papers)
  • Rui Zhong (2 papers)
  • Eric Pauley (2 papers)
  • Ryan Sheatsley (2 papers)
  • Blaine Hoak (2 papers)
  • Yohan Beugin (2 papers)
  • Tom La Porta (2 papers)
  • Machigar Ongtang (2 papers)
  • Thomas La Porta (2 papers)
  • Xinran Wang (2 papers)
  • Heqing Huang (2 papers)
  • Jiang Ming (2 papers)
  • Ping Chen (2 papers)
  • Hua Shen (2 papers)
  • Xinyang Zhang (2 papers)
  • Zeyu Ding (2 papers)
  • Hayawardh Vijayakumar (2 papers)
  • Shuai Wang (2 papers)
  • Pei Wang (2 papers)
  • Xiao Liu (2 papers)
  • Giuseppe Petracca (2 papers)
  • Xi Xiong (1 papers)
  • Qiang Zeng (1 papers)
  • Devin Pohly (1 papers)
  • Vaibhav Rastogi (1 papers)
  • Sadegh Farhang (1 papers)
  • Xiangkun Jia (1 papers)
  • Junjie Liang (1 papers)
  • Vasant Honavar (1 papers)
  • Sun Hyoung Kim (1 papers)
  • Nicolas Papernot (1 papers)
  • Robert J. Walls (1 papers)
  • Adam Smith (1 papers)
  • Jalaj Upadhyay (1 papers)
  • Mahmut Kandemir (1 papers)
  • Zhen Huang (1 papers)
  • Aiping Xiong (1 papers)
  • Feng Xiao (1 papers)
  • Jinquan Zhang (1 papers)
  • Hangfan Zhang (1 papers)
  • Quinn Burke (1 papers)
  • Suryoday Basak (1 papers)
  • Mahanth Gowda (1 papers)
  • Wanyu Zang (1 papers)
  • Matthew Pirretti (1 papers)
  • Fengjun Li (1 papers)
  • Bo Luo (1 papers)
  • Dongwon Lee (1 papers)
  • Michael Lin (1 papers)
  • Vikhyath Rao (1 papers)
  • Yoon-Chan Jhi (1 papers)
  • Divya Muthukumaran (1 papers)
  • Li Wang (1 papers)
  • Mingyi Zhao (1 papers)
  • Jens Grossklags (1 papers)
  • Ye Zhang (1 papers)
  • Liu Peng (1 papers)
  • Xingyu Xing (1 papers)
  • Ding Ding (1 papers)
  • Guanhong Wang (1 papers)
  • Yu Fu (1 papers)
  • Yongzhe Huang (1 papers)
  • Frank Capobianco (1 papers)
  • Yingtai Xiao (1 papers)
  • Alejandro Palacio Betancur (1 papers)
  • Mariantonieta Gutierrez Soto (1 papers)
  • Abdullah Al Ishtiaq (1 papers)
  • Lan Zhang (1 papers)
  • Chi-Chun Pan (1 papers)
  • Sandra Rueda (1 papers)
  • Dave King (1 papers)
  • Swarat Chaudhuri (1 papers)
  • Joshua Schiffman (1 papers)
  • Gaoyao Xiao (1 papers)
  • Jun Wang (1 papers)
  • Yufei Jiang (1 papers)
  • Alejandro Cuevas (1 papers)
  • Yuyan Bao (1 papers)
  • Ying Dong (1 papers)
  • Wei Wu (1 papers)
  • Shuofei Zhu (1 papers)
  • Jianjun Shi (1 papers)
  • Boqin Qin (1 papers)
  • Ziyi Zhang (1 papers)
  • Linhai Song (1 papers)
  • Xian Wu (1 papers)
  • Hua Wei (1 papers)
  • Yu-Tsung Lee (1 papers)
  • Changjiang Li (1 papers)
  • Shagufta Mehnaz (1 papers)
  • Taegyu Kim (1 papers)
  • Yu Liang (1 papers)
  • Song Liu (1 papers)

Papers

"Incentive-based modeling and inference of attacker intent, objectives, and strategies"

Peng Liu, Wanyu Zang, ... -- CCS 2003

"Automatic Placement of Authorization Hooks in the Linux Security Modules Framework"

Trent Jaeger, ... -- CCS 2005

"Exploiting Open Functionality in SMS-Capable Cellular Networks"

Patrick Traynor, William Enck, Tom La Porta, Patrick McDaniel, ... -- CCS 2005

"Enterprise Security: A Community of Interest Based Approach"

Patrick McDaniel, ... -- NDSS 2006

"Retrofitting Legacy Code for Authorization Policy Enforcement"

Trent Jaeger, ... -- Oakland 2006

"Secure Attribute-Based Systems"

Matthew Pirretti, Patrick Traynor, Patrick McDaniel, ... -- CCS 2006

"Optimizing BGP Security by Exploiting Path Stability"

Kevin Butler, Patrick McDaniel, ... -- CCS 2006

"SigFree: A Signature-free Buffer Overflow Attack Blocker"

Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu, ... -- Usenix 2006

"Automaton Segmentation: A New Approach to Preserve Privacy in XML Information Brokering"

Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu, ... -- CCS 2007

"On Attack Causality in Internet-Connected Cellular Networks"

Patrick Traynor, Patrick McDaniel, Thomas La Porta, ... -- Usenix 2007

"Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems"

Patrick Traynor, Kevin Butler, William Enck, Patrick McDaniel, ... -- NDSS 2008

"Rootkit-Resistant Disks"

Kevin Butler, Stephen McLaughlin, Patrick McDaniel, ... -- CCS 2008

"Verifying Compliance of Trusted Programs"

Trent Jaeger, Sandra Rueda, Dave King, ... -- Usenix 2008

"On cellular botnets: measuring the impact of malicious devices on a cellular network core"

Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, Thomas La Porta, ... -- CCS 2009

"On lightweight mobile phone application certification"

William Enck, Machigar Ongtang, Patrick McDaniel, ... -- CCS 2009

"Behavior based software theft detection"

Xinran Wang, Yoon-Chan Jhi, Sencun Zhu, Peng Liu, ... -- CCS 2009

"Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions"

Xi Xiong, Donghai Tian, Peng Liu, ... -- NDSS 2011

"Protecting Consumer Privacy from Electric Load Monitoring"

Stephen McLaughlin, Patrick McDaniel, ... -- CCS 2011

"A Study of Android Application Security"

William Enck, Damien Octeau, Patrick McDaniel, Swarat Chaudhuri, ... -- Usenix 2011

"Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring"

Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, ... -- NDSS 2012

"SABOT: Specification-based Payload Generation for Programmable Logic Controllers"

Stephen McLaughlin, Patrick McDaniel, ... -- CCS 2012

"Leveraging Choice to Automate Authorization Hook Placement"

Divya Muthukumaran, Trent Jaeger, ... -- CCS 2012

"Minimizing Private Data Disclosures in the Smart Grid"

Stephen McLaughlin, Patrick McDaniel, ... -- CCS 2012

"STING: Finding Name Resolution Vulnerabilities in Programs"

Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger, ... -- Usenix 2012

"Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis"

Damien Octeau, Patrick McDaniel, ... -- Usenix 2013

"A Trusted Safety Verifier for Process Controller Code"

Stephen McLaughlin, Devin Pohly, Patrick McDaniel, ... -- NDSS 2014

"JIGSAW : Protecting Resource Access by Inferring Programmer Expectations"

Hayawardh Vijayakumar, Xinyang Ge, Trent Jaeger, ... -- Usenix 2014

"From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an Application"

Heqing Huang, Sencun Zhu, Peng Liu, ... -- CCS 2015

"LOOP: Logic-Oriented Opaque Predicates Detection in Obfuscated Binary Code"

Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu, ... -- CCS 2015

"An Empirical Study of Web Vulnerability Discovery Ecosystems"

Mingyi Zhao, Jens Grossklags, Peng Liu, ... -- CCS 2015

"Fast and Secure Three-party Computation: The Garbled Circuit Approach"

Ye Zhang, ... -- CCS 2015

"TaintPipe: Pipelined Symbolic Taint Analysis"

Jiang Ming, Dinghao Wu, Gaoyao Xiao, Jun Wang, Peng Liu, ... -- Usenix 2015

"Reassembleable Disassembling"

Shuai Wang, Pei Wang, Dinghao Wu, ... -- Usenix 2015

"Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale"

Heqing Huang, Peng Liu, ... -- Usenix 2015

"Towards Discovering and Understanding Task Hijacking in Android"

Chuangang Ren, Peng Liu, ... -- Usenix 2015

"Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces"

Vaibhav Rastogi, ... -- NDSS 2016

"Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks"

Nicolas Papernot, Patrick McDaniel, ... -- Oakland 2016

"Domain-Z: 28 Registrations Later"

Robert J. Walls, Patrick McDaniel, ... -- Oakland 2016

"SoK: Lessons Learned From Android Security Research For Appified Software Platforms"

Patrick McDaniel, ... -- Oakland 2016

"CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump"

Jun Xu, Ping Chen, Xinyu Xing, Peng Liu, ... -- CCS 2016

"Call Me Back! Attacks on System Server and System Apps in Android through Synchronous Callback"

Liu Peng, ... -- CCS 2016

"On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis"

Patrick McDaniel, Damien Octeau, ... -- Usenix 2016

"WindowGuard: Systematic Protection of GUI Security in Android"

Chuangang Ren, Peng Liu, Sencun Zhu, ... -- NDSS 2017

"An Evil Copy: How the Loader Betrays You"

Xinyang Ge, Trent Jaeger, ... -- NDSS 2017

"Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping"

Dongpeng Xu, Dinghao Wu, ... -- Oakland 2017

"Is Interaction Necessary for Distributed Private Learning?"

Adam Smith, Jalaj Upadhyay, ... -- Oakland 2017

"DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer"

Peng Liu, ... -- CCS 2017

"FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware"

Jun Xu, Xingyu Xing, Peng Liu, ... -- CCS 2017

"PtrSplit: Supporting general pointers in automatic program partitioning"

Shen Liu, Gang Tan, Trent Jaeger, ... -- CCS 2017

"Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts"

Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, ... -- Usenix 2017

"CacheD: Identifying Cache-Based Timing Channels in Production Software"

Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, Dinghao Wu, ... -- Usenix 2017

"BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking"

Dongpeng Xu, Yufei Jiang, Dinghao Wu, ... -- Usenix 2017

"Aware: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings"

Giuseppe Petracca, Trent Jaeger, ... -- Usenix 2017

"Block Oriented Programming: Automating Data-Only Attacks"

Trent Jaeger, ... -- CCS 2018

"LEMNA: Explaining Deep Learning based Security Applications"

Wenbo Guo, Dongliang Mu, Jun Xu, Xinyu Xing, ... -- CCS 2018

"Toward Detecting Violations of Differential Privacy"

Ding Ding, Yuxin Wang, Guanhong Wang, Danfeng Zhang, Daniel Kifer, ... -- CCS 2018

"VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification"

Dongpeng Xu, Yu Fu, Dinghao Wu, ... -- CCS 2018

"FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities"

Yueqi Chen, Jun Xu, Xinyu Xing, ... -- Usenix 2018

"Understanding the Reproducibility of Crowd-reported Security Vulnerabilities"

Alejandro Cuevas, Xinyu Xing, ... -- Usenix 2018

"Security Namespace: Making Linux Security Frameworks Available to Containers"

Trent Jaeger, ... -- Usenix 2018

"Sensitive Information Tracking in Commodity IoT"

Z. Berkay Celik, Gang Tan, Patrick McDaniel, ... -- Usenix 2018

"IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT"

Z. Berkay Celik, Gang Tan, Patrick McDaniel, ... -- NDSS 2019

"Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory"

Sadegh Farhang, ... -- NDSS 2019

"CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation"

Robert Brotzman, Shen Liu, Danfeng Zhang, Gang Tan, Mahmut Kandemir, ... -- Oakland 2019

"Using Safety Properties to Generate Vulnerability Patches"

Zhen Huang, Gang Tan, Trent Jaeger, ... -- Oakland 2019

"Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise"

Xinyu Xing, ... -- CCS 2019

"Program-mandering: Quantitative Privilege Separation"

Shen Liu, Dongrui Zeng, Yongzhe Huang, Frank Capobianco, Trent Jaeger, Gang Tan, ... -- CCS 2019

"SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel"

Yueqi Chen, Xinyu Xing, ... -- CCS 2019

"EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs"

Giuseppe Petracca, Patrick McDaniel, Trent Jaeger, ... -- Usenix 2019

"Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation"

Yuyan Bao, Xiao Liu, Danfeng Zhang, Dinghao Wu, ... -- Usenix 2019

"Towards the Detection of Inconsistencies in Public Security Vulnerability Reports"

Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, ... -- Usenix 2019

"All Your Clicks Belong to Me: Investigating Click Interception on the Web"

Xinyu Xing, ... -- Usenix 2019

"Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms"

Peng Liu, ... -- Usenix 2019

"KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities"

Wei Wu, Yueqi Chen, Xinyu Xing, ... -- Usenix 2019

"Probability Model Transforming Encoders Against Encoding Attacks"

Chao-Hsien Chu, ... -- Usenix 2019

"DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis"

Wenbo Guo, Dongliang Mu, Xinyu Xing, ... -- Usenix 2019

"Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization"

Xiangkun Jia, Dinghao Wu, ... -- NDSS 2020

"Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension"

Aiping Xiong, ... -- Oakland 2020

"Unexpected Data Dependency Creation and Chaining: A New Attack to SDN"

Feng Xiao, Jinquan Zhang, Dinghao Wu, Peng Liu, ... -- Oakland 2020

"PDiff: Semantic-based Patch Presence Testing for Downstream Kernels"

Xinyu Xing, ... -- CCS 2020

"Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP"

Gang Tan, ... -- CCS 2020

"A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models"

Ren Pang, Hua Shen, Xinyang Zhang, Ting Wang, ... -- CCS 2020

"Text Captcha Is Dead? A Large Scale Deployment and Empirical Study"

Ting Wang, ... -- CCS 2020

"SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback"

Rui Zhong, Dinghao Wu, ... -- CCS 2020

"A Systematic Study of Elastic Objects in Kernel Exploitation"

Yueqi Chen, Zhenpeng Lin, Xinyu Xing, ... -- CCS 2020

"CheckDP: An Automated and Integrated Approach for Proving Differential Privacy or Finding Precise Counterexamples"

Yuxin Wang, Zeyu Ding, Daniel Kifer, Danfeng Zhang, ... -- CCS 2020

"BScout: Direct Whole Patch Presence Test for Java Executables"

Xinyu Xing, ... -- Usenix 2020

"TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation"

Ting Wang, ... -- Usenix 2020

"Interpretable Deep Learning under Fire"

Xinyang Zhang, Hua Shen, Ting Wang, ... -- Usenix 2020

"Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines"

Shuofei Zhu, Jianjun Shi, Boqin Qin, Ziyi Zhang, Linhai Song, ... -- Usenix 2020

"FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data"

Junjie Liang, Wenbo Guo, Vasant Honavar, Xinyu Xing, ... -- NDSS 2021

"PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification"

Syed Rafiul Hussain, ... -- NDSS 2021

"Refining Indirect Call Targets at the Binary Level"

Sun Hyoung Kim, Dongrui Zeng, Gang Tan, ... -- NDSS 2021

"WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning"

Hong Hu, ... -- NDSS 2021

"One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation"

Rui Zhong, Hong Hu, Hangfan Zhang, Dinghao Wu, ... -- Oakland 2021

"Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It"

Peng Liu, ... -- Oakland 2021

"Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks"

Ting Wang, ... -- CCS 2021

"On the Robustness of Domain Constraints"

Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Patrick McDaniel, ... -- CCS 2021

"Facilitating Vulnerability Assessment through PoC Migration"

Xinyu Xing, ... -- CCS 2021

"HyperFuzzer: An Efficient Hybrid Fuzzer For Virtual CPUs"

Robert Brotzman, ... -- CCS 2021

"Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison"

Tom La Porta, ... -- CCS 2021

"Backdoor Pre-trained Models Can Transfer to All"

Ting Wang, ... -- CCS 2021

"DPGen: Automated Program Synthesis for Differential Privacy"

Yuxin Wang, Zeyu Ding, Yingtai Xiao, Daniel Kifer, Danfeng Zhang, ... -- CCS 2021

"You Make Me Tremble: A First Look at Attacks Against Structural Control Systems"

Alejandro Palacio Betancur, Mariantonieta Gutierrez Soto, ... -- CCS 2021

"Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices"

Syed Rafiul Hussain, Abdullah Al Ishtiaq, ... -- CCS 2021

"Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems"

Hong Hu, ... -- Usenix 2021

"Incrementally Updateable Honey Password Vaults"

Chao-Hsien Chu, ... -- Usenix 2021

"Graph Backdoor"

Zhaohan Xi, Ren Pang, Ting Wang, ... -- Usenix 2021

"Adversarial Policy Training against Deep Reinforcement Learning"

Xian Wu, Wenbo Guo, Hua Wei, Xinyu Xing, ... -- Usenix 2021

"Automatic Firmware Emulation through Invalidity-guided Knowledge Inference"

Peng Liu, ... -- Usenix 2021

"CADE: Detecting and Explaining Concept Drift Samples for Security Applications"

Wenbo Guo, Xinyu Xing, ... -- Usenix 2021

"Preventing Use-After-Free Attacks with Fast Forward Allocation"

Hong Hu, ... -- Usenix 2021

"PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems"

Yu-Tsung Lee, Trent Jaeger, ... -- Usenix 2021

"UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers"

Ting Wang, ... -- Usenix 2021

"Abusing Hidden Properties to Attack the Node.js Ecosystem"

Hong Hu, ... -- Usenix 2021

"Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations"

Ting Wang, ... -- Usenix 2021

"Uncovering Cross-Context Inconsistent Access Control Enforcement in Android"

Ting Wang, ... -- NDSS 2022

"An In-depth Analysis of Duplicated Linux Kernel Bug Reports"

Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Xinyu Xing, ... -- NDSS 2022

"Packet-Level Open-World App Fingerprinting on Wireless Traffic"

Ting Wang, ... -- NDSS 2022

"COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation"

Hong Hu, ... -- NDSS 2022

"Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux"

Trent Jaeger, ... -- NDSS 2022

"Exploit the Last Straw That Breaks Android Systems"

Peng Liu, ... -- Oakland 2022

"GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs"

Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Xinyu Xing, ... -- Oakland 2022

"Measuring and Mitigating the Risk of IP Reuse on Public Clouds"

Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin, Patrick McDaniel, ... -- Oakland 2022

"Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings"

Ting Wang, ... -- Oakland 2022

"mmSpy: Spying Phone Calls using mmWave Radars"

Suryoday Basak, Mahanth Gowda, ... -- Oakland 2022

"Collect Responsibly But Deliver Arbitrarily? A Study on Cross-User Privacy Leakage in Mobile Apps"

Peng Liu, ... -- CCS 2022

"SFuzz: Slice-based Fuzzing for Real-Time Operating Systems"

Hong Hu, ... -- CCS 2022

"What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation"

Lan Zhang, Peng Liu, ... -- CCS 2022

"Is your explanation stable?: A Robustness Evaluation Framework for Feature Attribution"

Ting Wang, ... -- CCS 2022

"Back-Propagating System Dependency Impact for Attack Investigation"

Ting Wang, ... -- Usenix 2022

"On the Security Risks of AutoML"

Ren Pang, Zhaohan Xi, Ting Wang, ... -- Usenix 2022

"Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths"

Peng Liu, ... -- Usenix 2022

"FOAP: Fine-Grained Open-World Android App Fingerprinting"

Ting Wang, ... -- Usenix 2022

"Label Inference Attacks Against Vertical Federated Learning"

Ting Wang, ... -- Usenix 2022

"Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols"

Ting Wang, ... -- Usenix 2022

"FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries"

Hong Hu, ... -- Usenix 2022

"Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era"

Changjiang Li, Zhaohan Xi, Ting Wang, ... -- Usenix 2022

"Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability"

Yueqi Chen, Xinyu Xing, ... -- Usenix 2022

"Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models"

Shagufta Mehnaz, ... -- Usenix 2022

"DnD: A Cross-Architecture Deep Neural Network Decompiler"

Taegyu Kim, ... -- Usenix 2022

"Detecting Logical Bugs of DBMS with Coverage-based Guidance"

Yu Liang, Song Liu, Hong Hu, ... -- Usenix 2022