Lannan Luo
Orcid: 0000-0003-2476-7831
According to our database1,
Lannan Luo
authored at least 34 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Unsupervised Binary Code Translation with Application to Code Similarity Detection and Vulnerability Discovery.
CoRR, 2024
From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices.
Proceedings of the 33rd USENIX Security Symposium, 2024
Learning Cross-Architecture Instruction Embeddings for Binary Code Analysis in Low-Resource Architectures.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024
2023
Can a Deep Learning Model for One Architecture Be Used for Others? Retargeted-Architecture Binary Code Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023
No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023
Unsupervised Binary Code Translation with Application to Code Clone Detection and Vulnerability Discovery.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023
2022
Use It-No Need to Shake It!: Accurate Implicit Authentication for Everyday Objects with Smart Sensing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
G2Auth: secure mutual authentication for drone delivery without special user-side hardware.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2021
CoRR, 2021
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems.
CoRR, 2019
Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
CoRR, 2018
A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code Analysis.
CoRR, 2018
Countermeasures Against L0 Adversarial Examples Using Image Processing and Siamese Networks.
CoRR, 2018
CoRR, 2018
CoRR, 2018
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018
2017
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection.
IEEE Trans. Software Eng., 2017
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
2016
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
2014
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014