Dinghao Wu

Orcid: 0000-0002-0741-5511

Affiliations:
  • Penn State University, USA


According to our database1, Dinghao Wu authored at least 123 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy.
ACM Trans. Knowl. Discov. Data, February, 2024

Enhancing Malware Classification via Self-Similarity Techniques.
IEEE Trans. Inf. Forensics Secur., 2024

DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis.
Proceedings of the 33rd USENIX Security Symposium, 2024

DOS-GNN: Dual-Feature Aggregations with Over-Sampling for Class-Imbalanced Fraud Detection On Graphs.
Proceedings of the International Joint Conference on Neural Networks, 2024

Graph Adversarial Diffusion Convolution.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

H<sup>2</sup>GNN: Graph Neural Networks with Homophilic and Heterophilic Feature Aggregations.
Proceedings of the Database Systems for Advanced Applications, 2024

Jailbreak Open-Sourced Large Language Models via Enforced Decoding.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

2023
Quantifying and Mitigating Cache Side Channel Leakage with Differential Set.
Proc. ACM Program. Lang., October, 2023

On the Safety of Open-Sourced Large Language Models: Does Alignment Really Prevent Them From Being Misused?
CoRR, 2023

Knowledge Distillation on Cross-Modal Adversarial Reprogramming for Data-Limited Attribute Inference.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture.
Proceedings of the 32nd USENIX Security Symposium, 2023

Hierarchical Graph Neural Network for Patient Treatment Preference Prediction with External Knowledge.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

A3FL: Adversarially Adaptive Backdoor Attacks to Federated Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Hardware Support for Constant-Time Programming.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

Source Code Implied Language Structure Abstraction through Backward Taint Analysis.
Proceedings of the 18th International Conference on Software Technologies, 2023

Graph Contrastive Backdoor Attacks.
Proceedings of the International Conference on Machine Learning, 2023

FusionRetro: Molecule Representation Fusion via In-Context Learning for Retrosynthetic Planning.
Proceedings of the International Conference on Machine Learning, 2023

Pseudo-Labeling with Graph Active Learning for Few-shot Node Classification.
Proceedings of the IEEE International Conference on Data Mining, 2023

LibSteal: Model Extraction Attack Towards Deep Learning Compilers by Reversing DNN Binary Library.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023

2022
PackerGrind: An Adaptive Unpacking System for Android Apps.
IEEE Trans. Software Eng., 2022

Detecting and Interpreting Changes in Scanning Behavior in Large Network Telescopes.
IEEE Trans. Inf. Forensics Secur., 2022

Semi-Synchronized Non-Blocking Concurrent Kernel Cruising.
IEEE Trans. Cloud Comput., 2022

Metro: Memory-Enhanced Transformer for Retrosynthetic Planning via Reaction Tree.
CoRR, 2022

How Powerful is Implicit Denoising in Graph Neural Networks.
CoRR, 2022

Distilling Knowledge on Text Graph for Social Media Attribute Inference.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks.
Proceedings of the Security and Privacy in Communication Networks, 2022

Adversarially Reprogramming Pretrained Neural Networks for Data-limited and Cost-efficient Malware Detection.
Proceedings of the 2022 SIAM International Conference on Data Mining, 2022

Local Augmentation for Graph Neural Networks.
Proceedings of the International Conference on Machine Learning, 2022

FuzzBoost: Reinforcement Compiler Fuzzing.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

ALPHAPROG: Reinforcement Generation of Valid Programs for Compiler Fuzzing.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Local Augmentation for Graph Neural Networks.
CoRR, 2021

Zooming Into the Darknet: Characterizing Internet Background Radiation and its Structural Changes.
CoRR, 2021

Fine-Grained Compiler Identification With Sequence-Oriented Neural Modeling.
IEEE Access, 2021

One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Turning Attacks into Protection: Social Media Privacy Protection Using Adversarial Attacks.
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021

Characterizing AI Model Inference Applications Running in the SGX Environment.
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2021

Parema: an unpacking framework for demystifying VM-based Android packers.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2021

Abacus: A Tool for Precise Side-Channel Analysis.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

Abacus: Precise Side-Channel Analysis.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Shedding light into the darknet: scanning characterization and detection of temporal changes.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

2020
Large-Scale Third-Party Library Detection in Android Markets.
IEEE Trans. Software Eng., 2020

Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining.
Int. J. Softw. Eng. Knowl. Eng., 2020

Plagiarism Detection of Multi-Threaded Programs via Siamese Neural Networks.
IEEE Access, 2020

Unexpected Data Dependency Creation and Chaining: A New Attack to SDN.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Enhancing Robustness of Graph Convolutional Networks via Dropping Graph Connections.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020

Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Xmark: Dynamic Software Watermarking Using Collatz Conjecture.
IEEE Trans. Inf. Forensics Secur., 2019

Field experience with obfuscating million-user iOS apps in large enterprise mobile development.
Softw. Pract. Exp., 2019

Bridging the Gap Between Security Tools and SDN Controllers.
EAI Endorsed Trans. Security Safety, 2019

Higher-order Weighted Graph Convolutional Networks.
CoRR, 2019

Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation.
Proceedings of the 28th USENIX Security Symposium, 2019

Automatic grading of programming assignments: an approach based on formal semantics.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training, 2019

A Lightweight Framework for Regular Expression Verification.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus.
Proceedings of the 3rd ACM Workshop on Software Protection, 2019

DeepFuzz: Automatic Generation of Syntax Valid C Programs for Fuzz Testing.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
RedDroid: Android Application Redundancy Customization Based on Static Analysis.
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018

Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018

Software protection on the go: a large-scale empirical study on mobile app obfuscation.
Proceedings of the 40th International Conference on Software Engineering, 2018

VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization.
J. Comput. Virol. Hacking Tech., 2017

Impeding behavior-based malware analysis via replacement attacks to malware specifications.
J. Comput. Virol. Hacking Tech., 2017

Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection.
IEEE Trans. Software Eng., 2017

CacheD: Identifying Cache-Based Timing Channels in Production Software.
Proceedings of the 26th USENIX Security Symposium, 2017

BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking.
Proceedings of the 26th USENIX Security Symposium, 2017

Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Turing Obfuscation.
Proceedings of the Security and Privacy in Communication Networks, 2017

SecControl: Bridging the Gap Between Security Tools and SDN Controllers.
Proceedings of the Security and Privacy in Communication Networks, 2017

Lambda Obfuscation.
Proceedings of the Security and Privacy in Communication Networks, 2017

In-memory fuzzing for binary code similarity analysis.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Automated Synthesis of Access Control Lists.
Proceedings of the International Conference on Software Security and Assurance, 2017

Semantics-Aware Machine Learning for Function Recognition in Binary Code.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

Composite Software Diversification.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

Adaptive unpacking of Android apps.
Proceedings of the 39th International Conference on Software Engineering, 2017

LibD: scalable and precise third-party library detection in android markets.
Proceedings of the 39th International Conference on Software Engineering, 2017

Binary Code Retrofitting and Hardening Using SGX.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

FEAST 2017: The Second Workshop on Forming an Ecosystem Around Software Transformation.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection.
IEEE Trans. Reliab., 2016

Natural Shell: An Assistant for End-User Scripting.
Int. J. People Oriented Program., 2016

UROBOROS: Instrumenting Stripped Binaries with Static Reassembling.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling.
Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, 2016

iCruiser: Protecting Kernel Link-Based Data Structures with Secure Canary.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

StraightTaint: decoupled offline symbolic taint analysis.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method.
Proceedings of the Information Security - 19th International Conference, 2016

Moving Target Defense Against Network Reconnaissance with Software Defined Networking.
Proceedings of the Information Security - 19th International Conference, 2016

Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Translingual Obfuscation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Repackage-Proofing Android Apps.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

JRed: Program Customization and Bloatware Mitigation Based on Static Analysis.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection.
IEEE Trans. Software Eng., 2015

Automatic building information model query generation.
J. Inf. Technol. Constr., 2015

Reassembleable Disassembling.
Proceedings of the 24th USENIX Security Symposium, 2015

TaintPipe: Pipelined Symbolic Taint Analysis.
Proceedings of the 24th USENIX Security Symposium, 2015

Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract).
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015

Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
ViewDroid: towards obfuscation-resilient mobile application repackaging detection.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

PiE: programming in eliza.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Program Logic Based Software Plagiarism Detection.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

Software Cruising: A New Technology for Building Concurrent Software Monitor.
Proceedings of the Secure Cloud Computing, 2014

Teaching Information Security with Virtual Laboratories.
Proceedings of the Innovative Practices in Teaching Information Sciences and Technology, 2014

2013
Semantic aware attribution analysis of remote exploits.
Secur. Commun. Networks, 2013

A Framework for Evaluating Mobile App Repackaging Detection Algorithms.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

2012
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

A first step towards algorithm plagiarism detection.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

Towards Trusted Services: Result Verification Schemes for MapReduce.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

2011
Get Online Support, Feel Better - Sentiment Analysis and Dynamics in an Online Cancer Survivor Community.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits.
Proceedings of the Security and Privacy in Communication Networks, 2011

Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures.
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011

Classifying text messages for the haiti earthquake.
Proceedings of the 8th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2011

Value-based program characterization and its application to software plagiarism detection.
Proceedings of the 33rd International Conference on Software Engineering, 2011

2004
Construction of a Semantic Model for a Typed Assembly Language.
Proceedings of the Verification, 2004

KISS: keep it simple and sequential.
Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation 2004, 2004

2003
Foundational proof checkers with small witnesses.
Proceedings of the 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2003

A provably sound TAL for back-end optimization.
Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation 2003, 2003


  Loading...