Heng Yin
Orcid: 0000-0002-8942-7742Affiliations:
- University of California, Riverside, CA, USA
- Syracuse University, USA (former)
- College of William and Mary, USA (former)
According to our database1,
Heng Yin
authored at least 93 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.ucr.edu
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Calico: Automated Knowledge Calibration and Diagnosis for Elevating AI Mastery in Code Tasks.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
On the Correctness of Metadata-Based SBOM Generation: A Differential Analysis Approach.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
IEEE Trans. Software Eng., February, 2023
Proceedings of the IEEE/ACM International Workshop on Search-Based and Fuzz Testing, 2023
2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Dependable Secur. Comput., 2022
DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
LogicMEM: Automatic Profile Generation for Binary-Only Memory Forensics via Logic Inference.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Inf. Softw. Technol., 2021
Empir. Softw. Eng., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
CoRR, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Parallel Space Traveling: A Security Analysis of App-Level Virtualization in Android.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Chaser: An Enhanced Fault Injection Tool for Tracing Soft Errors in MPI Applications.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020
2019
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation.
Proceedings of the 28th USENIX Security Symposium, 2019
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation.
Proceedings of the Security and Privacy in Communication Networks, 2019
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Software Eng., 2017
Int. J. Softw. Eng. Knowl. Eng., 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-47812-8, 2016
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution.
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 7th USENIX Workshop on Hot Topics in Cloud Computing, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
IEEE Trans. Cloud Comput., 2014
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform.
Proceedings of the International Symposium on Software Testing and Analysis, 2014
Efficient, context-aware privacy leakage confinement for android applications without firmware modding.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-5523-3, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
A Software Environment for Confining Malicious Android Applications via Resource Virtualization.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013
Manipulating semantic values in kernel data structures: Attack assessments and implications.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012
DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012
2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Detection of Intrusions and Malware, 2010
2009
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009
2008
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
2007
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006