Debin Gao
Orcid: 0000-0001-9412-9961Affiliations:
- Singapore Management University, Singapore
According to our database1,
Debin Gao
authored at least 87 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Empir. Softw. Eng., May, 2024
Peep With A Mirror: Breaking The Integrity of Android App Sandboxing via Unprivileged Cache Side Channel.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE/ACM 11th International Conference on Mobile Software Engineering and Systems, 2024
Proceedings of the 2024 ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results, 2024
MiniMon: Minimizing Android Applications with Intelligent Monitoring-Based Debloating.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
2023
Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
CoRR, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
UIPDroid: Unrooted Dynamic Monitor of Android App UIs for Fine-Grained Permission Control.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022
ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021
Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls.
Empir. Softw. Eng., 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
An Exploratory Study of Social Support Systems to Help Older Adults in Managing Mobile Safety.
Proceedings of the MobileHCI '21: 23rd International Conference on Mobile Human-Computer Interaction, Toulouse & Virtual Event, France, 27 September 2021, 2021
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2020
Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel.
Proceedings of the Information Security - 23rd International Conference, 2020
2019
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
An empirical study of mobile network behavior and application performance in the wild.
Proceedings of the International Symposium on Quality of Service, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2016
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm.
Secur. Commun. Networks, 2016
CoRR, 2016
SecComp: Towards Practically Defending Against Component Hijacking in Android Applications.
CoRR, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Your love is public now: questioning the use of personal information in authentication.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012
2011
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance.
IEEE Trans. Dependable Secur. Comput., 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, 2009
2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004