Debin Gao

Orcid: 0000-0001-9412-9961

Affiliations:
  • Singapore Management University, Singapore


According to our database1, Debin Gao authored at least 87 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Analyzing and revivifying function signature inference using deep learning.
Empir. Softw. Eng., May, 2024

Peep With A Mirror: Breaking The Integrity of Android App Sandboxing via Unprivileged Cache Side Channel.
Proceedings of the 33rd USENIX Security Symposium, 2024

Towards Speedy Permission-Based Debloating for Android Apps.
Proceedings of the IEEE/ACM 11th International Conference on Mobile Software Engineering and Systems, 2024

Beyond a Joke: Dead Code Elimination Can Delete Live Code.
Proceedings of the 2024 ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results, 2024

MiniMon: Minimizing Android Applications with Intelligent Monitoring-Based Debloating.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
FA<sup>3</sup>: Fine-Grained Android Application Analysis.
Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications, 2023

Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

AutoDebloater: Automated Android App Debloating.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

BinAlign: Alignment Padding Based Compiler Provenance Recovery.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping.
IEEE Trans. Dependable Secur. Comput., 2022

Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing.
IEEE Trans. Dependable Secur. Comput., 2022

Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture.
IEEE Trans. Dependable Secur. Comput., 2022

On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps.
CoRR, 2022

Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

UIPDroid: Unrooted Dynamic Monitor of Android App UIs for Fine-Grained Permission Control.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls.
Empir. Softw. Eng., 2021

When Function Signature Recovery Meets Compiler Optimization.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

An Exploratory Study of Social Support Systems to Help Older Adults in Managing Mobile Safety.
Proceedings of the MobileHCI '21: 23rd International Conference on Mobile Human-Computer Interaction, Toulouse & Virtual Event, France, 27 September 2021, 2021

When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel.
Proceedings of the Information Security - 23rd International Conference, 2020

2019
AppMoD: Helping Older Adults Manage Mobile Security with Online Social Help.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

SplitSecond: Flexible Privilege Separation of Android Apps.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

An empirical study of mobile network behavior and application performance in the wild.
Proceedings of the International Symposium on Quality of Service, 2019

Towards Understanding Android System Vulnerabilities: Techniques and Insights.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Control-Flow Carrying Code.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Towards Mining Comprehensive Android Sandboxes.
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018

SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

On Return Oriented Programming Threats in Android Runtime.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

On-Demand Time Blurring to Support Side-Channel Defense.
Proceedings of the Computer Security - ESORICS 2017, 2017

SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow Hijacking.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2016

A novel covert channel detection method in cloud based on XSRM and improved event association algorithm.
Secur. Commun. Networks, 2016

MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic.
CoRR, 2016

SecComp: Towards Practically Defending Against Component Hijacking in Android Applications.
CoRR, 2016

Control Flow Integrity Enforcement with Dynamic Code Optimization.
Proceedings of the Information Security - 19th International Conference, 2016

On the Effectiveness of Code-Reuse-Based Android Application Obfuscation.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

MobiPot: Understanding Mobile Telephony Threats with Honeycards.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Stack Layout Randomization with Minimal Rewriting of Android Binaries.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Replica Placement for Availability in the Worst Case.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Software Watermarking using Return-Oriented Programming.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
StopWatch: A Cloud Architecture for Timing Channel Mitigation.
ACM Trans. Inf. Syst. Secur., 2014

Control Flow Obfuscation Using Neural Network to Fight Concolic Testing.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Keystroke biometrics: the user perspective.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

RopSteg: program steganography with return oriented programming.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
I can be You: Questioning the use of Keystroke Dynamics as Biometrics.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Comparing Mobile Privacy Protection through Cross-Platform Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Defending against Heap Overflow by Using Randomization in Nested Virtual Clusters.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Mitigating access-driven timing channels in clouds using StopWatch.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Your love is public now: questioning the use of personal information in authentication.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Keystroke Timing Analysis of on-the-fly Web Apps.
Proceedings of the Applied Cryptography and Network Security, 2013

Launching Generic Attacks on iOS with Approved Third-Party Applications.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
HuMan: Creating memorable fingerprints of mobile users.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Learning Fine-Grained Structured Input for Memory Corruption Detection.
Proceedings of the Information Security - 15th International Conference, 2012

iBinHunt: Binary Hunting with Inter-procedural Control Flow.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

OTO: online trust oracle for user-centric trust establishment.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Coercion resistance in authentication responsibility shifting.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Active malware analysis using stochastic games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

2011
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables.
Proceedings of the IEEE 10th International Conference on Trust, 2011

On Detection of Erratic Arguments.
Proceedings of the Security and Privacy in Communication Networks, 2011

Packed, Printable, and Polymorphic Return-Oriented Programming.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Towards ground truthing observations in gray-box anomaly detection.
Proceedings of the 5th International Conference on Network and System Security, 2011

Linear Obfuscation to Combat Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2011, 2011

deRop: removing return-oriented programming from malware.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Fighting Coercion Attacks in Key Generation using Skin Conductance.
Proceedings of the 19th USENIX Security Symposium, 2010

On Challenges in Evaluating Malware Clustering.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Revisiting Address Space Randomization.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

A multi-user steganographic file system on untrusted shared storage.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance.
IEEE Trans. Dependable Secur. Comput., 2009

Automatically Adapting a Trained Anomaly Detector to Software Patches.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Denial-of-Service Attacks on Host-Based Generic Unpackers.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, 2009

2008
Distinguishing between FE and DDoS Using Randomness Check.
Proceedings of the Information Security, 11th International Conference, 2008

BinHunt: Automatically Finding Semantic Differences in Binary Programs.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2006
Behavioral Distance Measurement Using Hidden Markov Models.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

2005
Behavioral Distance for Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

2004
On Gray-Box Program Tracking for Anomaly Detection.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Gray-box extraction of execution graphs for anomaly detection.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004


  Loading...