Bing Mao
Orcid: 0000-0002-7066-2144Affiliations:
- Nanjing University, State Key Laboratory for Novel Software Technology, Nanjing, China (PhD 1997)
According to our database1,
Bing Mao
authored at least 68 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
2023
EVaDe: Efficient and Lightweight Mirai Variants Detection via Approximate Largest Submatrix Search.
Int. J. Softw. Eng. Knowl. Eng., October, 2023
Int. J. Softw. Eng. Knowl. Eng., October, 2023
Comput. Secur., June, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
2022
DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy.
Proceedings of the IEEE International Conference on Software Analysis, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing and Multi-Task Learning.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
2021
IEEE Trans. Software Eng., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
2019
J. Comput. Sci. Technol., 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Tenth Asia-Pacific Symposium on Internetware, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Impeding behavior-based malware analysis via replacement attacks to malware specifications.
J. Comput. Virol. Hacking Tech., 2017
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks.
EAI Endorsed Trans. Security Safety, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
Proceedings of the Security and Privacy in Communication Networks, 2016
2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Detection, Classification and Characterization of Android Malware Using API Data Dependency.
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph.
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2013
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Int. J. Inf. Sec., 2012
Proceedings of the Information Security and Privacy Research, 2012
CloudER: a framework for automatic software vulnerability location and patching in the cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the The Forth International Conference on Availability, 2009
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability.
Proceedings of the The Forth International Conference on Availability, 2009
2006
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation.
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Advances in Computer Science, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
ACM SIGOPS Oper. Syst. Rev., 2005
2004
The design and implementation of a runtime system for graph-oriented parallel and distributed programming.
J. Syst. Softw., 2004
1999
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999