2024
Analyzing and revivifying function signature inference using deep learning.
Empir. Softw. Eng., May, 2024
Peep With A Mirror: Breaking The Integrity of Android App Sandboxing via Unprivileged Cache Side Channel.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
PointerScope: Understanding Pointer Patching for Code Randomization.
IEEE Trans. Dependable Secur. Comput., 2023
FA<sup>3</sup>: Fine-Grained Android Application Analysis.
Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications, 2023
BinAlign: Alignment Padding Based Compiler Provenance Recovery.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
When Function Signature Recovery Meets Compiler Optimization.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2019
Control-Flow Carrying Code.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping.
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Function Risk Assessment Under Memory Leakage.
Proceedings of the International Conference on Networking and Network Applications, 2018
2017
FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection.
Proceedings of the Security and Privacy in Communication Networks, 2017
SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow Hijacking.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Android App Malicious Behavior Detection Based on User Intention.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Impact of Environment on Branch Transfer of Software.
Proceedings of the Security and Privacy in Communication Networks, 2016
Control Flow Integrity Enforcement with Dynamic Code Optimization.
Proceedings of the Information Security - 19th International Conference, 2016
On the Effectiveness of Code-Reuse-Based Android Application Obfuscation.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
2015
An Instruction-Set Randomization Using Length-Preserving Permutation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2014
Computation Integrity Measurement Based on Branch Transfer.
Proceedings of the 13th IEEE International Conference on Trust, 2014