"Incentive-based modeling and inference of attacker intent, objectives, and strategies"
Peng Liu, Wanyu Zang, ... -- CCS 2003
"Automatic Placement of Authorization Hooks in the Linux Security Modules Framework"
Trent Jaeger, ... -- CCS 2005
"Exploiting Open Functionality in SMS-Capable Cellular Networks"
Patrick Traynor, William Enck, Tom La Porta, Patrick McDaniel, ... -- CCS 2005
"Enterprise Security: A Community of Interest Based Approach"
Patrick McDaniel, ... -- NDSS 2006
"Retrofitting Legacy Code for Authorization Policy Enforcement"
Trent Jaeger, ... -- Oakland 2006
"Secure Attribute-Based Systems"
Matthew Pirretti, Patrick Traynor, Patrick McDaniel, ... -- CCS 2006
"Optimizing BGP Security by Exploiting Path Stability"
Kevin Butler, Patrick McDaniel, ... -- CCS 2006
"SigFree: A Signature-free Buffer Overflow Attack Blocker"
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu, ... -- Usenix 2006
"Automaton Segmentation: A New Approach to Preserve Privacy in XML Information Brokering"
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu, ... -- CCS 2007
"On Attack Causality in Internet-Connected Cellular Networks"
Patrick Traynor, Patrick McDaniel, Thomas La Porta, ... -- Usenix 2007
"Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems"
Patrick Traynor, Kevin Butler, William Enck, Patrick McDaniel, ... -- NDSS 2008
"Rootkit-Resistant Disks"
Kevin Butler, Stephen McLaughlin, Patrick McDaniel, ... -- CCS 2008
"Verifying Compliance of Trusted Programs"
Trent Jaeger, Sandra Rueda, Dave King, ... -- Usenix 2008
"On cellular botnets: measuring the impact of malicious devices on a cellular network core"
Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, Thomas La Porta, ... -- CCS 2009
"On lightweight mobile phone application certification"
William Enck, Machigar Ongtang, Patrick McDaniel, ... -- CCS 2009
"Behavior based software theft detection"
Xinran Wang, Yoon-Chan Jhi, Sencun Zhu, Peng Liu, ... -- CCS 2009
"Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions"
Xi Xiong, Donghai Tian, Peng Liu, ... -- NDSS 2011
"Protecting Consumer Privacy from Electric Load Monitoring"
Stephen McLaughlin, Patrick McDaniel, ... -- CCS 2011
"A Study of Android Application Security"
William Enck, Damien Octeau, Patrick McDaniel, Swarat Chaudhuri, ... -- Usenix 2011
"Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring"
Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, ... -- NDSS 2012
"SABOT: Specification-based Payload Generation for Programmable Logic Controllers"
Stephen McLaughlin, Patrick McDaniel, ... -- CCS 2012
"Leveraging Choice to Automate Authorization Hook Placement"
Divya Muthukumaran, Trent Jaeger, ... -- CCS 2012
"Minimizing Private Data Disclosures in the Smart Grid"
Stephen McLaughlin, Patrick McDaniel, ... -- CCS 2012
"STING: Finding Name Resolution Vulnerabilities in Programs"
Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger, ... -- Usenix 2012
"Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis"
Damien Octeau, Patrick McDaniel, ... -- Usenix 2013
"A Trusted Safety Verifier for Process Controller Code"
Stephen McLaughlin, Devin Pohly, Patrick McDaniel, ... -- NDSS 2014
"JIGSAW : Protecting Resource Access by Inferring Programmer Expectations"
Hayawardh Vijayakumar, Xinyang Ge, Trent Jaeger, ... -- Usenix 2014
"From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an Application"
Heqing Huang, Sencun Zhu, Peng Liu, ... -- CCS 2015
"LOOP: Logic-Oriented Opaque Predicates Detection in Obfuscated Binary Code"
Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu, ... -- CCS 2015
"An Empirical Study of Web Vulnerability Discovery Ecosystems"
Mingyi Zhao, Jens Grossklags, Peng Liu, ... -- CCS 2015
"Fast and Secure Three-party Computation: The Garbled Circuit Approach"
Ye Zhang, ... -- CCS 2015
"TaintPipe: Pipelined Symbolic Taint Analysis"
Jiang Ming, Dinghao Wu, Gaoyao Xiao, Jun Wang, Peng Liu, ... -- Usenix 2015
"Reassembleable Disassembling"
Shuai Wang, Pei Wang, Dinghao Wu, ... -- Usenix 2015
"Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale"
Heqing Huang, Peng Liu, ... -- Usenix 2015
"Towards Discovering and Understanding Task Hijacking in Android"
Chuangang Ren, Peng Liu, ... -- Usenix 2015
"Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces"
Vaibhav Rastogi, ... -- NDSS 2016
"Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks"
Nicolas Papernot, Patrick McDaniel, ... -- Oakland 2016
"Domain-Z: 28 Registrations Later"
Robert J. Walls, Patrick McDaniel, ... -- Oakland 2016
"SoK: Lessons Learned From Android Security Research For Appified Software Platforms"
Patrick McDaniel, ... -- Oakland 2016
"CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump"
Jun Xu, Ping Chen, Xinyu Xing, Peng Liu, ... -- CCS 2016
"Call Me Back! Attacks on System Server and System Apps in Android through Synchronous Callback"
Liu Peng, ... -- CCS 2016
"On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis"
Patrick McDaniel, Damien Octeau, ... -- Usenix 2016
"WindowGuard: Systematic Protection of GUI Security in Android"
Chuangang Ren, Peng Liu, Sencun Zhu, ... -- NDSS 2017
"An Evil Copy: How the Loader Betrays You"
Xinyang Ge, Trent Jaeger, ... -- NDSS 2017
"Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping"
Dongpeng Xu, Dinghao Wu, ... -- Oakland 2017
"Is Interaction Necessary for Distributed Private Learning?"
Adam Smith, Jalaj Upadhyay, ... -- Oakland 2017
"DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer"
Peng Liu, ... -- CCS 2017
"FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware"
Jun Xu, Xingyu Xing, Peng Liu, ... -- CCS 2017
"PtrSplit: Supporting general pointers in automatic program partitioning"
Shen Liu, Gang Tan, Trent Jaeger, ... -- CCS 2017
"Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts"
Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, ... -- Usenix 2017
"CacheD: Identifying Cache-Based Timing Channels in Production Software"
Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, Dinghao Wu, ... -- Usenix 2017
"BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking"
Dongpeng Xu, Yufei Jiang, Dinghao Wu, ... -- Usenix 2017
"Aware: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings"
Giuseppe Petracca, Trent Jaeger, ... -- Usenix 2017
"Block Oriented Programming: Automating Data-Only Attacks"
Trent Jaeger, ... -- CCS 2018
"LEMNA: Explaining Deep Learning based Security Applications"
Wenbo Guo, Dongliang Mu, Jun Xu, Xinyu Xing, ... -- CCS 2018
"Toward Detecting Violations of Differential Privacy"
Ding Ding, Yuxin Wang, Guanhong Wang, Danfeng Zhang, Daniel Kifer, ... -- CCS 2018
"VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification"
Dongpeng Xu, Yu Fu, Dinghao Wu, ... -- CCS 2018
"FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities"
Yueqi Chen, Jun Xu, Xinyu Xing, ... -- Usenix 2018
"Understanding the Reproducibility of Crowd-reported Security Vulnerabilities"
Alejandro Cuevas, Xinyu Xing, ... -- Usenix 2018
"Security Namespace: Making Linux Security Frameworks Available to Containers"
Trent Jaeger, ... -- Usenix 2018
"Sensitive Information Tracking in Commodity IoT"
Z. Berkay Celik, Gang Tan, Patrick McDaniel, ... -- Usenix 2018
"IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT"
Z. Berkay Celik, Gang Tan, Patrick McDaniel, ... -- NDSS 2019
"Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory"
Sadegh Farhang, ... -- NDSS 2019
"CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation"
Robert Brotzman, Shen Liu, Danfeng Zhang, Gang Tan, Mahmut Kandemir, ... -- Oakland 2019
"Using Safety Properties to Generate Vulnerability Patches"
Zhen Huang, Gang Tan, Trent Jaeger, ... -- Oakland 2019
"Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise"
Xinyu Xing, ... -- CCS 2019
"Program-mandering: Quantitative Privilege Separation"
Shen Liu, Dongrui Zeng, Yongzhe Huang, Frank Capobianco, Trent Jaeger, Gang Tan, ... -- CCS 2019
"SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel"
Yueqi Chen, Xinyu Xing, ... -- CCS 2019
"EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs"
Giuseppe Petracca, Patrick McDaniel, Trent Jaeger, ... -- Usenix 2019
"Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation"
Yuyan Bao, Xiao Liu, Danfeng Zhang, Dinghao Wu, ... -- Usenix 2019
"Towards the Detection of Inconsistencies in Public Security Vulnerability Reports"
Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, ... -- Usenix 2019
"All Your Clicks Belong to Me: Investigating Click Interception on the Web"
Xinyu Xing, ... -- Usenix 2019
"Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms"
Peng Liu, ... -- Usenix 2019
"KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities"
Wei Wu, Yueqi Chen, Xinyu Xing, ... -- Usenix 2019
"Probability Model Transforming Encoders Against Encoding Attacks"
Chao-Hsien Chu, ... -- Usenix 2019
"DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis"
Wenbo Guo, Dongliang Mu, Xinyu Xing, ... -- Usenix 2019
"Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization"
Xiangkun Jia, Dinghao Wu, ... -- NDSS 2020
"Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension"
Aiping Xiong, ... -- Oakland 2020
"Unexpected Data Dependency Creation and Chaining: A New Attack to SDN"
Feng Xiao, Jinquan Zhang, Dinghao Wu, Peng Liu, ... -- Oakland 2020
"PDiff: Semantic-based Patch Presence Testing for Downstream Kernels"
Xinyu Xing, ... -- CCS 2020
"Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP"
Gang Tan, ... -- CCS 2020
"A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models"
Ren Pang, Hua Shen, Xinyang Zhang, Ting Wang, ... -- CCS 2020
"Text Captcha Is Dead? A Large Scale Deployment and Empirical Study"
Ting Wang, ... -- CCS 2020
"SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback"
Rui Zhong, Dinghao Wu, ... -- CCS 2020
"A Systematic Study of Elastic Objects in Kernel Exploitation"
Yueqi Chen, Zhenpeng Lin, Xinyu Xing, ... -- CCS 2020
"CheckDP: An Automated and Integrated Approach for Proving Differential Privacy or Finding Precise Counterexamples"
Yuxin Wang, Zeyu Ding, Daniel Kifer, Danfeng Zhang, ... -- CCS 2020
"BScout: Direct Whole Patch Presence Test for Java Executables"
Xinyu Xing, ... -- Usenix 2020
"TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation"
Ting Wang, ... -- Usenix 2020
"Interpretable Deep Learning under Fire"
Xinyang Zhang, Hua Shen, Ting Wang, ... -- Usenix 2020
"Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines"
Shuofei Zhu, Jianjun Shi, Boqin Qin, Ziyi Zhang, Linhai Song, ... -- Usenix 2020
"FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data"
Junjie Liang, Wenbo Guo, Vasant Honavar, Xinyu Xing, ... -- NDSS 2021
"PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification"
Syed Rafiul Hussain, ... -- NDSS 2021
"Refining Indirect Call Targets at the Binary Level"
Sun Hyoung Kim, Dongrui Zeng, Gang Tan, ... -- NDSS 2021
"WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning"
Hong Hu, ... -- NDSS 2021
"One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation"
Rui Zhong, Hong Hu, Hangfan Zhang, Dinghao Wu, ... -- Oakland 2021
"Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It"
Peng Liu, ... -- Oakland 2021
"Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks"
Ting Wang, ... -- CCS 2021
"On the Robustness of Domain Constraints"
Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Patrick McDaniel, ... -- CCS 2021
"Facilitating Vulnerability Assessment through PoC Migration"
Xinyu Xing, ... -- CCS 2021
"HyperFuzzer: An Efficient Hybrid Fuzzer For Virtual CPUs"
Robert Brotzman, ... -- CCS 2021
"Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison"
Tom La Porta, ... -- CCS 2021
"Backdoor Pre-trained Models Can Transfer to All"
Ting Wang, ... -- CCS 2021
"DPGen: Automated Program Synthesis for Differential Privacy"
Yuxin Wang, Zeyu Ding, Yingtai Xiao, Daniel Kifer, Danfeng Zhang, ... -- CCS 2021
"You Make Me Tremble: A First Look at Attacks Against Structural Control Systems"
Alejandro Palacio Betancur, Mariantonieta Gutierrez Soto, ... -- CCS 2021
"Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices"
Syed Rafiul Hussain, Abdullah Al Ishtiaq, ... -- CCS 2021
"Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems"
Hong Hu, ... -- Usenix 2021
"Incrementally Updateable Honey Password Vaults"
Chao-Hsien Chu, ... -- Usenix 2021
"Graph Backdoor"
Zhaohan Xi, Ren Pang, Ting Wang, ... -- Usenix 2021
"Adversarial Policy Training against Deep Reinforcement Learning"
Xian Wu, Wenbo Guo, Hua Wei, Xinyu Xing, ... -- Usenix 2021
"Automatic Firmware Emulation through Invalidity-guided Knowledge Inference"
Peng Liu, ... -- Usenix 2021
"CADE: Detecting and Explaining Concept Drift Samples for Security Applications"
Wenbo Guo, Xinyu Xing, ... -- Usenix 2021
"Preventing Use-After-Free Attacks with Fast Forward Allocation"
Hong Hu, ... -- Usenix 2021
"PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems"
Yu-Tsung Lee, Trent Jaeger, ... -- Usenix 2021
"UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers"
Ting Wang, ... -- Usenix 2021
"Abusing Hidden Properties to Attack the Node.js Ecosystem"
Hong Hu, ... -- Usenix 2021
"Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations"
Ting Wang, ... -- Usenix 2021
"Uncovering Cross-Context Inconsistent Access Control Enforcement in Android"
Ting Wang, ... -- NDSS 2022
"An In-depth Analysis of Duplicated Linux Kernel Bug Reports"
Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Xinyu Xing, ... -- NDSS 2022
"Packet-Level Open-World App Fingerprinting on Wireless Traffic"
Ting Wang, ... -- NDSS 2022
"COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation"
Hong Hu, ... -- NDSS 2022
"Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux"
Trent Jaeger, ... -- NDSS 2022
"Exploit the Last Straw That Breaks Android Systems"
Peng Liu, ... -- Oakland 2022
"GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs"
Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Xinyu Xing, ... -- Oakland 2022
"Measuring and Mitigating the Risk of IP Reuse on Public Clouds"
Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin, Patrick McDaniel, ... -- Oakland 2022
"Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings"
Ting Wang, ... -- Oakland 2022
"mmSpy: Spying Phone Calls using mmWave Radars"
Suryoday Basak, Mahanth Gowda, ... -- Oakland 2022
"Collect Responsibly But Deliver Arbitrarily? A Study on Cross-User Privacy Leakage in Mobile Apps"
Peng Liu, ... -- CCS 2022
"SFuzz: Slice-based Fuzzing for Real-Time Operating Systems"
Hong Hu, ... -- CCS 2022
"What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation"
Lan Zhang, Peng Liu, ... -- CCS 2022
"Is your explanation stable?: A Robustness Evaluation Framework for Feature Attribution"
Ting Wang, ... -- CCS 2022
"Back-Propagating System Dependency Impact for Attack Investigation"
Ting Wang, ... -- Usenix 2022
"On the Security Risks of AutoML"
Ren Pang, Zhaohan Xi, Ting Wang, ... -- Usenix 2022
"Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths"
Peng Liu, ... -- Usenix 2022
"FOAP: Fine-Grained Open-World Android App Fingerprinting"
Ting Wang, ... -- Usenix 2022
"Label Inference Attacks Against Vertical Federated Learning"
Ting Wang, ... -- Usenix 2022
"Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols"
Ting Wang, ... -- Usenix 2022
"FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries"
Hong Hu, ... -- Usenix 2022
"Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era"
Changjiang Li, Zhaohan Xi, Ting Wang, ... -- Usenix 2022
"Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability"
Yueqi Chen, Xinyu Xing, ... -- Usenix 2022
"Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models"
Shagufta Mehnaz, ... -- Usenix 2022
"DnD: A Cross-Architecture Deep Neural Network Decompiler"
Taegyu Kim, ... -- Usenix 2022
"Detecting Logical Bugs of DBMS with Coverage-based Guidance"
Yu Liang, Song Liu, Hong Hu, ... -- Usenix 2022