Sliver: A Scalable Slicing-Based Verification for Information Flow Security.
IEEE Trans. Dependable Secur. Comput., 2025
ABSLearn: a GNN-based framework for aliasing and buffer-size information retrieval.
Pattern Anal. Appl., August, 2023
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis.
IET Inf. Secur., July, 2023
DeepCatra: Learning flow- and graph-based behaviours for Android malware detection.
IET Inf. Secur., January, 2023
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code.
IEEE Trans. Dependable Secur. Comput., 2023
LibScan: Towards More Precise Third-Party Library Identification for Android Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023
DeepCatra: Learning Flow- and Graph-based Behaviors for Android Malware Detection.
CoRR, 2022
BinPointer: towards precise, sound, and scalable binary-level pointer analysis.
Proceedings of the CC '22: 31st ACM SIGPLAN International Conference on Compiler Construction, Seoul, South Korea, April 2, 2022
CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis.
CoRR, 2021
MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Refining Indirect Call Targets at the Binary Level.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
ReCFA: Resilient Control-Flow Attestation.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
Program-mandering: Quantitative Privilege Separation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
From Debugging-Information Based Binary-Level Type Inference to CFG Generation.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018