Fu Song

Orcid: 0000-0002-0581-2679

According to our database1, Fu Song authored at least 93 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks.
ACM Trans. Softw. Eng. Methodol., June, 2024

Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples.
ACM Trans. Softw. Eng. Methodol., March, 2024

Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks.
ACM Trans. Softw. Eng. Methodol., March, 2024

EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis.
Proc. ACM Program. Lang., January, 2024

SAT-based Formal Verification of Fault Injection Countermeasures for Cryptographic Circuits.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Towards Efficient Verification of Constant-Time Cryptographic Implementations.
Proc. ACM Softw. Eng., 2024

A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion.
CoRR, 2024

Formal Verification of RISC-V Processor Chisel Designs.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2024

SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

FDI: Attack Neural Code Generation Systems through User Feedback Channel.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Certified Quantization Strategy Synthesis for Neural Networks.
Proceedings of the Formal Methods - 26th International Symposium, 2024

Compositional Verification of Cryptographic Circuits Against Fault Injection Attacks.
Proceedings of the Formal Methods - 26th International Symposium, 2024

K-RAPID: A Formal Executable Semantics of the RAPID Robot Programming Language.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024

2023
Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks.
Proc. ACM Program. Lang., October, 2023

Precise Quantitative Analysis of Binarized Neural Networks: A BDD-based Approach.
ACM Trans. Softw. Eng. Methodol., May, 2023

Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition.
IEEE Trans. Dependable Secur. Comput., 2023

VenomAttack: automated and adaptive activity hijacking in Android.
Frontiers Comput. Sci., 2023

An Empirical Study of Bugs in Open-Source Federated Learning Framework.
CoRR, 2023

SAT-based Formal Fault-Resistance Verification of Cryptographic Circuits.
CoRR, 2023

QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023

SCAGuard: Detection and Classification of Cache Side-Channel Attacks via Attack Behavior Modeling and Similarity Comparison.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

QEBVerif: Quantization Error Bound Verification of Neural Networks.
Proceedings of the Computer Aided Verification - 35th International Conference, 2023

Automated Verification of Correctness for Masked Arithmetic Programs.
Proceedings of the Computer Aided Verification - 35th International Conference, 2023

An Automata-Theoretic Approach to Synthesizing Binarized Neural Networks.
Proceedings of the Automated Technology for Verification and Analysis, 2023

2022
Formal Verification of Masking Countermeasures for Arithmetic Programs.
IEEE Trans. Software Eng., 2022

Taking Care of the Discretization Problem: A Comprehensive Study of the Discretization Problem and a Black-Box Adversarial Attack in Discrete Integer Domain.
IEEE Trans. Dependable Secur. Comput., 2022

ESampler: Boosting sampling of satisfying assignments for Boolean formulas via derivation.
J. Syst. Archit., 2022

Preface to Special Issue on System Software Security.
Int. J. Softw. Informatics, 2022

Model-based automated testing of JavaScript Web applications via longer test sequences.
Frontiers Comput. Sci., 2022

QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks.
CoRR, 2022

Learning to Prevent Profitless Neural Code Completion.
CoRR, 2022

AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems.
CoRR, 2022

Preventing Timing Side-Channels via Security-Aware Just-In-Time Compilation.
CoRR, 2022

CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

DeJITLeak: eliminating JIT-induced timing side-channel leaks.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

CLEVEREST: Accelerating CEGAR-based Neural Network Verification via Adversarial Attacks.
Proceedings of the Static Analysis - 29th International Symposium, 2022

QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

PoS4MPC: Automated Security Policy Synthesis for Secure Multi-party Computation.
Proceedings of the Computer Aided Verification - 34th International Conference, 2022

2021
A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs.
ACM Trans. Softw. Eng. Methodol., 2021

Advanced evasion attacks and mitigations on practical ML-based phishing website classifiers.
Int. J. Intell. Syst., 2021

SEC4SR: A Security Analysis Platform for Speaker Recognition.
CoRR, 2021

Inferring Loop Invariants for Multi-Path Loops.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

ESampler: Efficient Sampling of Satisfying Assignments for Boolean Formulas.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2021

Attack as defense: characterizing adversarial examples using robustness.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Eager Falsification for Accelerating Robustness Verification of Deep Neural Networks.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android Apps.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

BDD4BNN: A BDD-Based Quantitative Analysis Framework for Binarized Neural Networks.
Proceedings of the Computer Aided Verification - 33rd International Conference, 2021

2020
Verifying ReLU Neural Networks from a Model Checking Perspective.
J. Comput. Sci. Technol., 2020

Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels.
CoRR, 2020

Patch based vulnerability matching for binary programs.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

2019
Verifying and Quantifying Side-channel Resistance of Masked Software Implementations.
ACM Trans. Softw. Eng. Methodol., 2019

Fuzzy Pushdown Termination Games.
IEEE Trans. Fuzzy Syst., 2019

Things You May Not Know About Adversarial Example: A Black-box Adversarial Image Attack.
CoRR, 2019

Model-based Automated Testing of JavaScript Web Applications via Longer Test Sequences.
CoRR, 2019

Making Agents' Abilities Explicit.
IEEE Access, 2019

Android Malware Family Classification and Characterization Using CFG and DFG.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019

Quantitative Verification of Masked Arithmetic Programs Against Side-Channel Attacks.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2019

SMT-Based Bounded Schedulability Analysis of the Clock Constraint Specification Language.
Proceedings of the Fundamental Approaches to Software Engineering, 2019

Probabilistic Alternating-Time <i>µ</i>-Calculus.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Analyzing pushdown systems with stack manipulation.
Inf. Comput., 2018

Towards backbone computing: A Greedy-Whitening based approach.
AI Commun., 2018

KRust: A Formal Executable Semantics of Rust.
Proceedings of the 2018 International Symposium on Theoretical Aspects of Software Engineering, 2018

SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018

Android Stack Machine.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018

2017
On the complexity of <i>ω</i>-pushdown automata.
Sci. China Inf. Sci., 2017

Optimizing backbone filtering.
Proceedings of the 11th International Symposium on Theoretical Aspects of Software Engineering, 2017

Reasoning About Periodicity on Infinite Words.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2017

SPAIN: security patch analysis for binaries towards understanding the pain and pills.
Proceedings of the 39th International Conference on Software Engineering, 2017

Model Checking Pushdown Epistemic Game Structures.
Proceedings of the Formal Methods and Software Engineering, 2017

Tractability of Separation Logic with Inductive Definitions: Beyond Lists.
Proceedings of the 28th International Conference on Concurrency Theory, 2017

2016
Model-checking software library API usage rules.
Softw. Syst. Model., 2016

An Improved Online/Offline Identity-Based Signature Scheme for WSNs.
Int. J. Netw. Secur., 2016

On temporal logics with data variable quantifications: Decidability and complexity.
Inf. Comput., 2016

LTL Model-Checking for Dynamic Pushdown Networks Communicating via Locks.
CoRR, 2016

Formal Reasoning on Infinite Data Values: An Ongoing Quest.
Proceedings of the Engineering Trustworthy Software Systems - Second International School, 2016

Verifying Pushdown Multi-Agent Systems against Strategy Logics.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Global Model Checking on Pushdown Multi-Agent Systems.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Model checking dynamic pushdown networks.
Formal Aspects Comput., 2015

Modeling and Verifying Google File System.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

On Reachability Analysis of Pushdown Systems with Transductions: Application to Boolean Programs with Call-by-Reference.
Proceedings of the 26th International Conference on Concurrency Theory, 2015

On the Satisfiability of Indexed Linear Temporal Logics.
Proceedings of the 26th International Conference on Concurrency Theory, 2015

2014
Efficient CTL model-checking for pushdown systems.
Theor. Comput. Sci., 2014

Pushdown model checking for malware detection.
Int. J. Softw. Tools Technol. Transf., 2014

Extending Temporal Logics with Data Variable Quantifications.
Proceedings of the 34th International Conference on Foundation of Software Technology and Theoretical Computer Science, 2014

Model-Checking for Android Malware Detection.
Proceedings of the Programming Languages and Systems - 12th Asian Symposium, 2014

2013
LTL Model-Checking for Malware Detection.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013

PoMMaDe: pushdown model-checking for malware detection.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

2012
PuMoC: a CTL model-checker for sequential programs.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Efficient Malware Detection Using Model-Checking.
Proceedings of the FM 2012: Formal Methods, 2012


  Loading...