"Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay"
Zhen Liu, Zhenfu Cao, ... -- CCS 2013
"Effective Real-time Android Application Auditing"
Lu Gong, Zhengwei Qi, ... -- Oakland 2015
"Insecurity of Voice Solution VoLTE in LTE Mobile Networks"
Xinbing Wang, ... -- CCS 2015
"From Collision To Exploitation: Conquering the Use-After-Free in the Linux Kernel"
Wen Xu, Junliang Shu, Juanru Li, Wenbo Yang, Tianyi Xie, Yuanyuan Zhang, Dawu Gu, ... -- CCS 2015
"Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation"
Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia, ... -- CCS 2015
"You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps"
Jin Chen, Haibo Chen, Binyu Zang, Haibing Guan, ... -- Usenix 2015
"When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals"
Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Na Ruan, ... -- CCS 2016
"Deconstructing Xen"
Lei Shi, Yuming Wu, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan, ... -- NDSS 2017
"Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps"
Wenbo Yang, Yuanyuan Zhang, Juanru Li, Hui Liu, Qing Wang, Yueheng Zhang, Dawu Gu, ... -- NDSS 2017
"ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms"
Shiqi Wang, ... -- NDSS 2017
"Side-Channel Attacks on Shared Search Indexes"
Jiahui Lu, ... -- Oakland 2017
"Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection"
Xiaojun Xu, ... -- CCS 2017
"Solidus: Confidential Distributed Ledger Transactions via PVORM"
Yan Ji, ... -- CCS 2017
"vTZ: Virtualizing ARM TrustZone"
Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan, ... -- Usenix 2017
"Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed"
Dawu Gu, ... -- Usenix 2017
"Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks."
Haizhong Zheng, Hao Lu, Haojin Zhu, ... -- NDSS 2018
"A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks"
Huichen Li, Xiaojun Xu, Xuezhi Cao, Weinan Zhang, Yong Yu, ... -- Oakland 2018
"No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing"
Haojin Zhu, ... -- CCS 2018
"Pinpointing Insecure Cryptographic Keys from Execution Traces"
Juanru Li, Yuanyuan Zhang, Dawu Gu, ... -- CCS 2018
"HoMonit: Monitoring Smart Home Apps from Encrypted Traffic"
Wei Zhang, Yan Meng, Yugeng Liu, Haojin Zhu, ... -- CCS 2018
"Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions"
Neng Li, Haojin Zhu, ... -- Oakland 2019
"Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers"
Yu Yu, ... -- Oakland 2020
"LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction"
Yu Yu, ... -- CCS 2020
"Security of Streaming Encryption in Google's Tink Library"
Yaobin Shen, ... -- CCS 2020
"(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization"
Zeyu Mi, Dingji Li, Haibo Chen, Binyu Zang, Haibing Guan, ... -- Usenix 2020
"iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications"
Zhushou Tang, Ke Tang, Haojin Zhu, ... -- Usenix 2020
"Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy"
Dawu Gu, ... -- NDSS 2021
"Dissecting Click Fraud Autonomy in the Wild"
Tong Zhu, Yan Meng, Haotian Hu, Haojin Zhu, ... -- CCS 2021
"Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic"
Suibin Sun, Le Yu, Ren Zhou, Haojin Zhu, ... -- CCS 2021
"Hidden Backdoors in Human-Centric Language Models"
Shaofeng Li, Hui Liu, Tian Dong, Haojin Zhu, Jialiang Lu, ... -- CCS 2021
"Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time"
Weijie Wang, ... -- CCS 2021
"Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems"
Libo Chen, Quanpu Cai, Yunfan Zhan, Zhi Xue, ... -- Usenix 2021
"Towards Formal Verification of State Continuity for Enclave Programs"
Guoxing Chen, ... -- Usenix 2021
"mID: Tracing Screen Photos via Moiré Patterns"
Yi-Chao Chen, ... -- Usenix 2021
"Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures"
Guoxing Chen, ... -- NDSS 2022
"Shaduf: Non-Cycle Payment Channel Rebalancing"
Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu, ... -- NDSS 2022
"Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK"
Xuancheng Jin, Xuangan Xiao, Songlin Jia, Wang Gao, Dawu Gu, Juanru Li, ... -- Oakland 2022
"Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis"
Yiwei Zhang, Juanru Li, ... -- Oakland 2022
"Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond"
Shi-Feng Sun, ... -- CCS 2022
"SFuzz: Slice-based Fuzzing for Real-Time Operating Systems"
Quanpu Cai, Kaida Jiang, Zhi Xue, ... -- CCS 2022
"VOProof: Efficient zkSNARKs Generation for Algebra Dummies"
Yuncong Zhang, Shi-Feng Sun, Geng Wang, Dawu Gu, ... -- CCS 2022
"Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers"
Yan Meng, Jiachun Li, Haojin Zhu, ... -- Usenix 2022
"MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties"
Guoxing Chen, ... -- Usenix 2022
"Shuffle-based Private Set Union: Faster and More Secure"
Yanxue Jia, Shi-Feng Sun, Jiajun Du, Dawu Gu, ... -- Usenix 2022
"A Hardware-Software Co-design for Efficient Intra-Enclave Isolation"
Jinyu Gu, Bojun Zhu, Mingyu Li, Wentai Li, Yubin Xia, Haibo Chen, ... -- Usenix 2022