Haoyu Wang

Orcid: 0000-0003-1100-8633

Affiliations:
  • Huazhong University of Science and Technology, Wuhan, China
  • Beijing University of Posts and Telecommunications, Beijing, China
  • Peking University, MOE Key Laboratory of High-Confidence Software Technologies, Beijing, China (PhD 2016)


According to our database1, Haoyu Wang authored at least 212 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability Types.
IEEE Trans. Software Eng., June, 2024

Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors.
ACM Trans. Softw. Eng. Methodol., June, 2024

VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts.
ACM Trans. Model. Perform. Evaluation Comput. Syst., June, 2024

WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets.
Autom. Softw. Eng., June, 2024

Characterizing and Detecting WebAssembly Runtime Bugs.
ACM Trans. Softw. Eng. Methodol., February, 2024

DeFiRanger: Detecting DeFi Price Manipulation Attacks.
IEEE Trans. Dependable Secur. Comput., 2024

How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors.
IEEE Trans. Dependable Secur. Comput., 2024

Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection.
Proc. ACM Softw. Eng., 2024

Drowzee: Metamorphic Testing for Fact-Conflicting Hallucination Detection in Large Language Models.
Proc. ACM Program. Lang., 2024

Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models.
CoRR, 2024

Decoding Secret Memorization in Code LLMs Through Token-Level Characterization.
CoRR, 2024

PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach.
CoRR, 2024

Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs.
CoRR, 2024

Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments.
CoRR, 2024

Investigating Coverage Criteria in Large Language Models: An In-Depth Study Through Jailbreak Attacks.
CoRR, 2024

Automatic Dataset Construction (ADC): Sample Collection, Data Curation, and Beyond.
CoRR, 2024

GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models.
CoRR, 2024

Semantic-Enhanced Indirect Call Analysis with Large Language Models.
CoRR, 2024

Beyond App Markets: Demystifying Underground Mobile App Distribution Via Telegram.
CoRR, 2024

NeuSemSlice: Towards Effective DNN Model Maintenance via Neuron-level Semantic Slicing.
CoRR, 2024

SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing.
CoRR, 2024

On the (In)Security of LLM App Stores.
CoRR, 2024

LLM for Mobile: An Initial Roadmap.
CoRR, 2024

WaDec: Decompile WebAssembly Using Large Language Model.
CoRR, 2024

Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps.
CoRR, 2024

Remeasuring the Arbitrage and Sandwich Attacks of Maximal Extractable Value in Ethereum.
CoRR, 2024

GPTZoo: A Large-scale Dataset of GPTs for the Research Community.
CoRR, 2024

Seeing is (Not) Believing: Practical Phishing Attacks Targeting Social Media Sharing Cards.
CoRR, 2024

GPT Store Mining and Analysis.
CoRR, 2024

Large Language Models for Cyber Security: A Systematic Literature Review.
CoRR, 2024

HalluVault: A Novel Logic Programming-aided Metamorphic Testing Framework for Detecting Fact-Conflicting Hallucinations in Large Language Models.
CoRR, 2024

LLM App Store Analysis: A Vision and Roadmap.
CoRR, 2024

Large Language Model Supply Chain: A Research Agenda.
CoRR, 2024

Research on WebAssembly Runtimes: A Survey.
CoRR, 2024

The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024

MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis.
CoRR, 2024

The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors.
CoRR, 2024

MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack.
CoRR, 2024

Digger: Detecting Copyright Content Mis-usage in Large Language Model Training.
CoRR, 2024

Is It Safe to Share Your Files? An Empirical Security Analysis of Google Workspace.
Proceedings of the ACM on Web Conference 2024, 2024

Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations.
Proceedings of the ACM on Web Conference 2024, 2024

Unveiling the Paradox of NFT Prosperity.
Proceedings of the ACM on Web Conference 2024, 2024

All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts.
Proceedings of the 33rd USENIX Security Symposium, 2024

Exploring Covert Third-party Identifiers through External Storage in the Android New Era.
Proceedings of the 33rd USENIX Security Symposium, 2024

Towards Smart Contract Fuzzing on GPUs.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Abusing the Ethereum Smart Contract Verification Services for Fun and Profit.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

VETEOS: Statically Vetting EOSIO Contracts for the "Groundhog Day" Vulnerabilities.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

ChatGPT Chats Decoded: Uncovering Prompt Patterns for Superior Solutions in Software Development Lifecycle.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024

Global Prosperity or Local Monopoly? Understanding the Geography of App Popularity.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024

EVMBT: A Binary Translation Scheme for Upgrading EVM Smart Contracts to WASM.
Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, 2024

A First Look at LLM-powered Smartphones.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024

Towards Demystifying Android Adware: Dataset and Payload Location.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024

NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain.
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024

ConFuzz: Towards Large Scale Fuzz Testing of Smart Contracts in Ethereum.
Proceedings of the IEEE INFOCOM 2024, 2024

MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Analyzing Excessive Permission Requests in Google Workspace Add-Ons.
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024

MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation.
Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software Engineering, 2024

WASMixer: Binary Obfuscation for WebAssembly.
Proceedings of the Computer Security - ESORICS 2024, 2024

CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Miracle or Mirage? A Measurement Study of NFT Rug Pulls.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023

Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective.
ACM Trans. Softw. Eng. Methodol., November, 2023

<i>FaaSLight</i>: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing.
ACM Trans. Softw. Eng. Methodol., September, 2023

Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews.
IEEE Trans. Software Eng., April, 2023

APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps.
IEEE Trans. Software Eng., 2023

WRTester: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation.
CoRR, 2023

SoK: On the Security of Non-Fungible Tokens.
CoRR, 2023

Software Engineering for OpenHarmony: A Research Roadmap.
CoRR, 2023

Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey.
CoRR, 2023

Large Language Models for Software Engineering: A Systematic Literature Review.
CoRR, 2023

Jailbreaker: Automated Jailbreak Across Multiple Large Language Model Chatbots.
CoRR, 2023

Prompt Injection attack against LLM-integrated Applications.
CoRR, 2023

A Deep Dive into NFT Rug Pulls.
CoRR, 2023

A General Static Binary Rewriting Framework for WebAssembly.
CoRR, 2023

Are Mobile Advertisements in Compliance with App's Age Group?
Proceedings of the ACM Web Conference 2023, 2023

DISTDET: A Cost-Effective Distributed Cyber Threat Detection System.
Proceedings of the 32nd USENIX Security Symposium, 2023

MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries.
Proceedings of the 32nd USENIX Security Symposium, 2023

Potential Risks Arising from the Absence of Signature Verification in Miniapp Plugins.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

On the Usage-scenario-based Data Minimization in Mini Programs.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

BREWasm: A General Static Binary Rewriting Framework for WebAssembly.
Proceedings of the Static Analysis - 30th International Symposium, 2023

WADIFF: A Differential Testing Framework for WebAssembly Runtimes.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

CydiOS: A Model-Based Testing Framework for iOS Apps.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper).
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

A Deep Dive into the Featured iOS Apps.
Proceedings of the 14th Asia-Pacific Symposium on Internetware, 2023

Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Poster: Uncovering Vulnerabilities in Wasm Smart Contracts.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A Systematic Assessment on Android Third-Party Library Detection Tools.
IEEE Trans. Software Eng., 2022

XDebloat: Towards Automated Feature-Oriented App Debloating.
IEEE Trans. Software Eng., 2022

A Systematical Study on Application Performance Management Libraries for Apps.
IEEE Trans. Software Eng., 2022

Make Web3.0 Connected.
IEEE Trans. Dependable Secur. Comput., 2022

MalRadar: Demystifying Android Malware in the New Era.
Proc. ACM Meas. Anal. Comput. Syst., 2022

A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation.
CoRR, 2022

LambdaLite: Application-Level Optimization for Cold Start Latency in Serverless Computing.
CoRR, 2022

iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps.
CoRR, 2022

Dataset Bias in Android Malware Detection.
CoRR, 2022

Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Demystifying "removed reviews" in iOS app store.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

What did you pack in my app? a systematic analysis of commercial Android packers.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Uncovering Cross-Context Inconsistent Access Control Enforcement in Android.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity.
Proceedings of the 9th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2022

Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade Era.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

MalWhiteout: Reducing Label Errors in Android Malware Detection.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Path-sensitive code embedding via contrastive learning for software vulnerability detection.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

WASAI: uncovering vulnerabilities in Wasm smart contracts.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Challenges in decentralized name management: the case of ENS.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

PROMAL: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Uncovering Intent based Leak of Sensitive Data in Android Framework.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection.
ACM Trans. Softw. Eng. Methodol., 2021

DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network.
ACM Trans. Softw. Eng. Methodol., 2021

Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications.
IEEE Trans. Dependable Secur. Comput., 2021

Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Characterizing Cryptocurrency-themed Malicious Browser Extensions.
Proc. ACM Meas. Anal. Comput. Syst., 2021

SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Beyond the virus: a first look at coronavirus-themed Android malware.
Empir. Softw. Eng., 2021

Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO.
CoRR, 2021

Demystifying Scam Tokens on Uniswap Decentralized Exchange.
CoRR, 2021

Ethereum Name Service: the Good, the Bad, and the Ugly.
CoRR, 2021

Towards Understanding and Demystifying Bitcoin Mixing Services.
Proceedings of the WWW '21: The Web Conference 2021, 2021

A Longitudinal Study of Removed Apps in iOS App Store.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Demystifying Illegal Mobile Gambling Apps.
Proceedings of the WWW '21: The Web Conference 2021, 2021

EOSAFE: Security Analysis of EOSIO Smart Contracts.
Proceedings of the 30th USENIX Security Symposium, 2021

MMGuard: Automatically Protecting On-Device Deep Learning Models in Android Apps.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Understanding the Impact of COVID-19 on Github Developers: A Preliminary Study.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

On the Effectiveness of Deep Vulnerability Detectors to Simple Stupid Bug Detection.
Proceedings of the 18th IEEE/ACM International Conference on Mining Software Repositories, 2021

Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms.
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021

Towards Understanding iOS App Store Search Advertising: An Explorative Study.
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021

Finding the Missing Piece: Permission Specification Analysis for Android NDK.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Leveraging ASR N-Best in Deep Entity Retrieval.
Proceedings of the 22nd Annual Conference of the International Speech Communication Association, Interspeech 2021, Brno, Czechia, August 30, 2021

DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.
Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021

2020
Understanding (Mis)Behavior on the EOSIO Blockchain.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Tracking Counterfeit Cryptocurrency End-to-end.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Flow2Vec: value-flow-based precise code embedding.
Proc. ACM Program. Lang., 2020

HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
IACR Cryptol. ePrint Arch., 2020

VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts.
CoRR, 2020

Understanding Characteristics of Commodity Serverless Computing Platforms.
CoRR, 2020

Towards understanding flash loan and its applications in defi ecosystem.
CoRR, 2020

When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories.
CoRR, 2020

A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps.
CoRR, 2020

Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware.
CoRR, 2020

Understanding Challenges in Deploying Deep Learning Based Software: An Empirical Study.
CoRR, 2020

Security Analysis of EOSIO Smart Contracts.
CoRR, 2020

Characterizing EOSIO Blockchain.
CoRR, 2020

MadDroid: Characterising and Detecting Devious Ad Content for Android Apps.
CoRR, 2020

Characterizing cryptocurrency exchange scams.
Comput. Secur., 2020

MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Mobile App Squatting.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

All your app links are belong to us: understanding the threats of instant apps based attacks.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

A comprehensive study on challenges in deploying deep learning based software.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Dissecting Mobile Offerwall Advertisements: An Explorative Study.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Demystifying Diehard Android Apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Automated Third-Party Library Detection for Android Applications: Are We There Yet?
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Market-level analysis of government-backed COVID-19 contact tracing apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020

KnowledgeZooClient: constructing knowledge graph for Android.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020

A<sup>3</sup>Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

Characterizing Code Clones in the Ethereum Smart Contract Ecosystem.
Proceedings of the Financial Cryptography and Data Security, 2020

Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

Does the Presence of Privacy Relevant Information Affect App Market Choice?
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

2019
Revisiting the impact of common libraries for android-related investigations.
J. Syst. Softw., 2019

On Identifying and Explaining Similarities in Android Apps.
J. Comput. Sci. Technol., 2019

Automated Deobfuscation of Android Native Binary Code.
CoRR, 2019

EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level.
CoRR, 2019

AppAuth: Authorship Attribution for Android App Clones.
IEEE Access, 2019

Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play.
Proceedings of the World Wide Web Conference, 2019

Knowledge Graphing Git Repositories: A Preliminary Study.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

AppNet: understanding app recommendation in Google Play.
Proceedings of the 3rd ACM SIGSOFT International Workshop on App Market Analytics, 2019

RmvDroid: towards a reliable Android malware dataset with app metadata.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

Characterizing Android App Signing Issues.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

DaPanda: Detecting Aggressive Push Notifications in Android Apps.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking.
Proceedings of the Information Security - 22nd International Conference, 2019

Characterizing the global mobile app developers: a large-scale empirical study.
Proceedings of the 6th International Conference on Mobile Software Engineering and Systems, 2019

Deobfuscating Android native binary code.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries?
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

FraudDroid: automated ad fraud detection for Android apps.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Re-checking App Behavior against App Description in the Context of Third-party Libraries.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Why are Android apps removed from Google Play?: a large-scale empirical study.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

CiD: automating the detection of API-related compatibility issues in Android apps.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets.
Proceedings of the Internet Measurement Conference 2018, 2018

Towards Light-Weight Deep Learning Based Malware Detection.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Understanding the Purpose of Permission Use in Mobile Apps.
ACM Trans. Inf. Syst., 2017

FrauDroid: An Accurate and Scalable Approach to Automated Mobile Ad Fraud Detection.
CoRR, 2017

CRSPR: PageRank for Android Apps.
IEEE Access, 2017

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective.
Proceedings of the 26th International Conference on World Wide Web, 2017

Understanding third-party libraries in mobile app analysis.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Identifying and Analyzing the Privacy of Apps for Kids.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

LibRadar: fast and accurate detection of third-party libraries in Android apps.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
WuKong: a scalable and accurate two-phase approach to Android app clone detection.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Using text mining to infer the purpose of permission use in mobile apps.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Reevaluating Android Permission Gaps with Static and Dynamic Analysis.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Similarity-based web browser optimization.
Proceedings of the 23rd International World Wide Web Conference, 2014

2013
Mobile Web Browser Optimizations in the Cloud Era: A Survey.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013


  Loading...