Lannan Luo

Orcid: 0000-0003-2476-7831

According to our database1, Lannan Luo authored at least 34 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
T2Pair++: Secure and Usable IoT Pairing with Zero Information Loss.
CoRR, 2024

Unsupervised Binary Code Translation with Application to Code Similarity Detection and Vulnerability Discovery.
CoRR, 2024

From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices.
Proceedings of the 33rd USENIX Security Symposium, 2024

Learning Cross-Architecture Instruction Embeddings for Binary Code Analysis in Low-Resource Architectures.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024

2023
Can a Deep Learning Model for One Architecture Be Used for Others? Retargeted-Architecture Binary Code Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023

No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

Unsupervised Binary Code Translation with Application to Code Clone Detection and Vulnerability Discovery.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

2022
Use It-No Need to Shake It!: Accurate Implicit Authentication for Everyday Objects with Smart Sensing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

G2Auth: secure mutual authentication for drone delivery without special user-side hardware.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Privacy Leakage Analysis for Colluding Smart Apps.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2021

Deep Learning Approach Protecting Privacy in Camera-Based Critical Applications.
CoRR, 2021

PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020

Heap Memory Snapshot Assisted Program Analysis for Android Permission Specification.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems.
CoRR, 2019

Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
CoRR, 2018

A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code Analysis.
CoRR, 2018

Countermeasures Against L0 Adversarial Examples Using Image Processing and Siamese Networks.
CoRR, 2018

Code-less Patching for Heap Vulnerabilities Using Targeted Calling Context Encoding.
CoRR, 2018

Validating the Contextual Information of Outdoor Images for Photo Misuse Detection.
CoRR, 2018

Resilient decentralized Android application repackaging detection using logic bombs.
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018

2017
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection.
IEEE Trans. Software Eng., 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

2016
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

SolMiner: mining distinct solutions in programs.
Proceedings of the 38th International Conference on Software Engineering, 2016

Repackage-Proofing Android Apps.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2014
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014


  Loading...