Pei Wang

Orcid: 0000-0001-9066-3948

Affiliations:
  • Pennsylvania State University, College of Information Sciences and Technology, University Park, PA, USA


According to our database1, Pei Wang authored at least 21 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Source Code Implied Language Structure Abstraction through Backward Taint Analysis.
Proceedings of the 18th International Conference on Software Technologies, 2023

LibSteal: Model Extraction Attack Towards Deep Learning Compilers by Reversing DNN Binary Library.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023

2021
Characterizing AI Model Inference Applications Running in the SGX Environment.
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2021

2020
Large-Scale Third-Party Library Detection in Android Markets.
IEEE Trans. Software Eng., 2020

Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
Field experience with obfuscating million-user iOS apps in large enterprise mobile development.
Softw. Pract. Exp., 2019

Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation.
Proceedings of the 28th USENIX Security Symposium, 2019

Automatic grading of programming assignments: an approach based on formal semantics.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training, 2019

2018
Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018

Software protection on the go: a large-scale empirical study on mobile app obfuscation.
Proceedings of the 40th International Conference on Software Engineering, 2018

2017
CacheD: Identifying Cache-Based Timing Channels in Production Software.
Proceedings of the 26th USENIX Security Symposium, 2017

Turing Obfuscation.
Proceedings of the Security and Privacy in Communication Networks, 2017

Lambda Obfuscation.
Proceedings of the Security and Privacy in Communication Networks, 2017

Semantics-Aware Machine Learning for Function Recognition in Binary Code.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

Composite Software Diversification.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

LibD: scalable and precise third-party library detection in android markets.
Proceedings of the 39th International Conference on Software Engineering, 2017

Binary Code Retrofitting and Hardening Using SGX.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

2016
UROBOROS: Instrumenting Stripped Binaries with Static Reassembling.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Translingual Obfuscation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Reassembleable Disassembling.
Proceedings of the 24th USENIX Security Symposium, 2015


  Loading...