Xiangyu Zhang

Orcid: 0000-0002-9544-2500

Affiliations:
  • Purdue University, West Lafayette, IN, USA
  • University of Arizona, Department of Computer Science, Tucson, AZ, USA (PhD 2006)


According to our database1, Xiangyu Zhang authored at least 297 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Self-Supervised Adversarial Training of Monocular Depth Estimation Against Physical-World Attacks.
IEEE Trans. Pattern Anal. Mach. Intell., December, 2024

Fast and Precise Static Null Exception Analysis With Synergistic Preprocessing.
IEEE Trans. Software Eng., November, 2024

DFuzzer: Diversity-Driven Seed Queue Construction of Fuzzing for Deep Learning Models.
IEEE Trans. Reliab., June, 2024

Enumerating Valid Non-Alpha-Equivalent Programs for Interpreter Testing.
ACM Trans. Softw. Eng. Methodol., June, 2024

CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking.
Proc. ACM Softw. Eng., 2024

ParDiff: Practical Static Differential Analysis of Network Protocol Parsers.
Proc. ACM Program. Lang., 2024

ASPIRER: Bypassing System Prompts With Permutation-based Backdoors in LLMs.
CoRR, 2024

DIGIMON: Diagnosis and Mitigation of Sampling Skew for Reinforcement Learning based Meta-Planner in Robot Navigation.
CoRR, 2024

ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation.
CoRR, 2024

Poisoning with A Pill: Circumventing Detection in Federated Learning.
CoRR, 2024

RL-JACK: Reinforcement Learning-powered Black-box Jailbreaking Attack against LLMs.
CoRR, 2024

When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search.
CoRR, 2024

Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders.
CoRR, 2024

Source Code Foundation Models are Transferable Binary Analysis Knowledge Bases.
CoRR, 2024

When Dataflow Analysis Meets Large Language Models.
CoRR, 2024

Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia.
CoRR, 2024

Opening A Pandora's Box: Things You Should Know in the Era of Custom GPTs.
CoRR, 2024

Runtime Invariant Checking in Robotic Systems and Deep Learning Models (Keynote).
Proceedings of the 7th ACM International Workshop on Verification and Monitoring at Runtime Execution, 2024

Cost-effective Attack Forensics by Recording and Correlating File System Changes.
Proceedings of the 33rd USENIX Security Symposium, 2024

Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion.
Proceedings of the 33rd USENIX Security Symposium, 2024

Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

On Large Language Models' Resilience to Coercive Interrogation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Exploring the Orthogonality and Linearity of Backdoor Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Distribution Preserving Backdoor Attack in Self-supervised Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

OdScan: Backdoor Scanning for Object Detection Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

A NAND Use Case for Cybersecurity Experiments.
Proceedings of the IEEE Secure Development Conference, 2024

Define-Use Guided Path Exploration for Better Forced Execution.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

FuzzInMem: Fuzzing Programs via In-memory Structures.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Fusion Is Not Enough: Single Modal Attacks on Fusion Models for 3D Object Detection.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Sanitizing Large Language Models in Bug Detection with Data-Flow.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening.
Proceedings of the Computer Vision - ECCV 2024, 2024

Threat Behavior Textual Search by Attention Graph Isomorphism.
Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics, 2024

Lotus: Evasive and Resilient Backdoor Attacks through Sub-Partitioning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning.
IEEE Trans. Software Eng., April, 2023

Make Them Spill the Beans! Coercive Knowledge Extraction from (Production) LLMs.
CoRR, 2023

Nova<sup>+</sup>: Generative Language Models for Binaries.
CoRR, 2023

POSIT: Promotion of Semantic Item Tail via Adversarial Learning.
CoRR, 2023

Impact of Large Language Models on Generating Software Specifications.
CoRR, 2023

LmPa: Improving Decompilation by Synergy of Large Language Model and Program Analysis.
CoRR, 2023

Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving.
CoRR, 2023

Hard-label Black-box Universal Adversarial Patch Attack.
Proceedings of the 32nd USENIX Security Symposium, 2023

Extracting Protocol Format as State Machine via Controlled Static Loop Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023

PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023

Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract.
Proceedings of the 32nd USENIX Security Symposium, 2023

D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Django: Detecting Trojans in Object Detection Models via Gaussian Focus Calibration.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

BIRD: Generalizable Backdoor Detection and Removal for Deep Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

On-the-fly Improving Performance of Deep Code Models via Input Denoising.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

NodeRT: Detecting Races in Node.js Applications Practically.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

BFTDETECTOR: Automatic Detection of Business Flow Tampering for Digital Content Service.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World Attacks.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

MEDIC: Remove Model Backdoors via Importance Driven Cloning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Detecting Backdoors in Pre-trained Encoders.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Lifting Network Protocol Implementation to Precise Format Specification with Security Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Backdooring Neural Code Search.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern., 2022

Video Captioning Using Global-Local Representation.
IEEE Trans. Circuits Syst. Video Technol., 2022

Quantifying the interpretation overhead of Python.
Sci. Comput. Program., 2022

Backdoor Vulnerabilities in Normally Trained Deep Learning Models.
CoRR, 2022

DECK: Model Hardening for Defending Pervasive Backdoors.
CoRR, 2022

Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense.
CoRR, 2022

ProFactory: Improving IoT Security via Formalized Protocol Customization.
Proceedings of the 31st USENIX Security Symposium, 2022

Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Piccolo: Exposing Complex Backdoors in NLP Transformer Models.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

RULER: discriminative and iterative adversarial training for deep neural network fairness.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

SA4U: Practical Static Analysis for Unit Type Error Detection.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

DocTer: documentation-guided fuzzing for testing deep learning API functions.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

TensileFuzz: facilitating seed input generation in fuzzing via string constraint solving.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

GL-RG: Global-Local Representation Granularity for Video Captioning.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense.
Proceedings of the International Conference on Machine Learning, 2022

Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches.
Proceedings of the Computer Vision - ECCV 2022, 2022

Bounded Adversarial Attack on Deep Content Features.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Better Trigger Inversion Optimization in Backdoor Scanning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Complex Backdoor Detection by Symmetric Feature Differencing.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Discovering IoT Physical Channel Vulnerabilities.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Checkpointing and deterministic training for deep learning.
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022

2021
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection.
IEEE Trans. Inf. Forensics Secur., 2021

To what extent do DNN-based image classification models make unreliable inferences?
Empir. Softw. Eng., 2021

Leveraging Documentation to Test Deep Learning Library Functions.
CoRR, 2021

EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry.
CoRR, 2021

Discovering Physical Interaction Vulnerabilities in IoT Deployments.
CoRR, 2021

ATLAS: A Sequence-based Learning Approach for Attack Investigation.
Proceedings of the 30th USENIX Security Symposium, 2021

Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.
Proceedings of the 30th USENIX Security Symposium, 2021

OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Exposing numerical bugs in deep learning via gradient back-propagation.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

PHYSFRAME: type checking physical frames of reference for robotic systems.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

PyART: Python API Recommendation in Real-Time.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

Backdoor Scanning for Deep Neural Networks through K-Arm Optimization.
Proceedings of the 38th International Conference on Machine Learning, 2021

Towards Feature Space Adversarial Attack by Style Perturbation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices.
IEEE Trans. Dependable Secur. Comput., 2020

WATCHER: in-situ failure diagnosis.
Proc. ACM Program. Lang., 2020

Black-box adversarial sample generation based on differential evolution.
J. Syst. Softw., 2020

Deep Learning & Software Engineering: State of Research and Future Directions.
CoRR, 2020

D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack.
CoRR, 2020

Towards Feature Space Adversarial Attack.
CoRR, 2020

From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY.
Proceedings of the 29th USENIX Security Symposium, 2020

PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

C2S: translating natural language comments to formal program specifications.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Correlations between deep neural network model coverage criteria and model quality.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Towards Programming and Verification for Activity-Oriented Smart Home Systems.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

CPC: automatically classifying and propagating natural language comments via program analysis.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

How Android developers handle evolution-induced API compatibility issues: a large-scale study.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Impact analysis of cross-project bugs on software ecosystems.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Finding client-side business flow tampering vulnerabilities.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation.
Proc. ACM Program. Lang., 2019

Annotation guided collection of context-sensitive parallel execution profiles.
Formal Methods Syst. Des., 2019

Testing Deep Learning Models for Image Analysis Using Object-Relevant Metamorphic Relations.
CoRR, 2019

Automated Refactoring for Stampedlock.
IEEE Access, 2019

RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing.
Proceedings of the 28th USENIX Security Symposium, 2019

ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

SemCluster: clustering of imperative programming assignments based on quantitative semantic features.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

Programming support for autonomizing software.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

NIC: Detecting Adversarial Samples with Neural Network Invariant Checking.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

SLF: fuzzing without valid seed inputs.
Proceedings of the 41st International Conference on Software Engineering, 2019

Probabilistic disassembly.
Proceedings of the 41st International Conference on Software Engineering, 2019

White-Box Program Tuning.
Proceedings of the IEEE/ACM International Symposium on Code Generation and Optimization, 2019

ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Fault localisation for WS-BPEL programs based on predicate switching and program slicing.
J. Syst. Softw., 2018

Redundancy-Free UAV Sensor Fault Isolation And Recovery.
CoRR, 2018

Gemini: Guest-transparent honey files via hypervisor-level access redirection.
Comput. Secur., 2018

AdBudgetKiller: Online Advertising Budget Draining Attack.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Kernel-Supported Cost-Effective Audit Logging for Causality Tracking.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

MODE: automated neural network model debugging via state differential analysis and input selection.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Phys: probabilistic physical unit assignment and inconsistency detection.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Trojaning Attack on Neural Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Securing Real-Time Microcontroller Systems through Customized Memory View Switching.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Dual-force: understanding WebView malware via cross-language forced execution.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Debugging with intelligence via probabilistic inference.
Proceedings of the 40th International Conference on Software Engineering, 2018

Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks.
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

A Lightweight Program Dependence Based Approach to Concurrent Mutation Analysis.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Precise Android API Protection Mapping Derivation and Reasoning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Lprov: Practical Library-aware Provenance Tracing.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Software Numerical Instability Detection and Diagnosis by Combining Stochastic and Infinite-Precision Testing.
IEEE Trans. Software Eng., 2017

A path-aware approach to mutant reduction in mutation testing.
Inf. Softw. Technol., 2017

Introspection-Based Memory Pruning for Live VM Migration.
Int. J. Parallel Program., 2017

Z3str2: an efficient solver for strings, regular expressions, and length constraints.
Formal Methods Syst. Des., 2017

An Empirical Study on Mutation Testing of WS-BPEL Programs.
Comput. J., 2017

J-Force: Forced Execution on JavaScript.
Proceedings of the 26th International Conference on World Wide Web, 2017

ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning.
Proceedings of the 26th USENIX Security Symposium, 2017

LAMP: data provenance for graph based machine learning algorithms through derivative computation.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
Proceedings of the Security and Privacy in Communication Networks, 2017

Annotation Guided Collection of Context-Sensitive Parallel Execution Profiles.
Proceedings of the Runtime Verification - 17th International Conference, 2017

Self Destructing Exploit Executions via Input Perturbation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

PAD: programming third-party web advertisement censorship.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

UI driven Android application reduction.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Accelerating array constraints in symbolic execution.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

CPR: cross platform binary code reuse via platform independent trace program.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

How do developers fix cross-project correlated bugs?: a case study on the GitHub scientific python ecosystem.
Proceedings of the 39th International Conference on Software Engineering, 2017

Automatic text input generation for mobile testing.
Proceedings of the 39th International Conference on Software Engineering, 2017

RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Analysis of SEAndroid Policies: Combining MAC and DAC in Android.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.
Proceedings of the 25th USENIX Security Symposium, 2016

Python probabilistic type inference with natural language support.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Python predictive analysis for bug detection.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

WebRanz: web page randomization for better advertisement delivery and web-bot prevention.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

PerfGuard: binary-centric application performance monitoring in production environments.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Detecting sensitive data disclosure via bi-directional text correlation analysis.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Apex: automatic programming assignment error explanation.
Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, 2016

ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

ARROW: automated repair of races on client-side web pages.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

IPA: improving predictive analysis with pointer analysis.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Automatic model generation from documentation for Java API functions.
Proceedings of the 38th International Conference on Software Engineering, 2016

Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices.
Proceedings of the 38th International Conference on Software Engineering, 2016

IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions.
Proceedings of the 38th International Conference on Software Engineering, 2016

Parallel Execution Profiles.
Proceedings of the 25th ACM International Symposium on High-Performance Parallel and Distributed Computing, 2016

LDX: Causality Inference by Lightweight Dual Execution.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

HERCULE: attack story reconstruction via community discovery on correlated log graph.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Debugging the Internet of Things: The Case of Wireless Sensor Networks.
IEEE Softw., 2015

Roundtable: Research Opportunities and Challenges for Emerging Software Systems.
J. Comput. Sci. Technol., 2015

SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps.
Proceedings of the 24th USENIX Security Symposium, 2015

Light: replay via tightly bounded recording.
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015

RAIVE: runtime assessment of floating-point instability by vectorization.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, 2015

P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Android Implicit Information Flow Demystified.
Proceedings of the 10th ACM Symposium on Information, 2015

Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability.
Proceedings of the 10th ACM Symposium on Information, 2015

VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

GUITAR: Piecing Together Android App GUIs from Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

iRiS: Vetting Private API Abuse in iOS Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Effective Search-Space Pruning for Solvers of String Equations, Regular Expressions and Length Constraints.
Proceedings of the Computer Aided Verification - 27th International Conference, 2015

Dual Execution for On the Fly Fine Grained Execution Comparison.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Scaling Up Symbolic Analysis by Removing Z-Equivalent States.
ACM Trans. Softw. Eng. Methodol., 2014

DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

X-Force: Force-Executing Binary Programs for Security Applications.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Flint: fixing linearizability violations.
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014

Virtual DOM coverage for effective testing of dynamic web applications.
Proceedings of the International Symposium on Software Testing and Analysis, 2014

Reuse-oriented reverse engineering of functional components from x86 binaries.
Proceedings of the 36th International Conference on Software Engineering, 2014

AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction.
Proceedings of the 36th International Conference on Software Engineering, 2014

Infrastructure-Free Logging and Replay of Concurrent Execution on Multiple Cores.
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014

FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
Diagnostic tracing for wireless sensor networks.
ACM Trans. Sens. Networks, 2013

Z3-str: a z3-based string solver for web application analysis.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

On-the-fly detection of instability problems in floating-point program execution.
Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications, 2013

High Accuracy Attack Provenance via Binary-based Execution Partition.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Identifying execution points for dynamic analyses.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

PIEtrace: Platform independent executable trace.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Path sensitive static analysis of web applications for remote code execution vulnerability detection.
Proceedings of the 35th International Conference on Software Engineering, 2013

Comparative causality: explaining the differences between executions.
Proceedings of the 35th International Conference on Software Engineering, 2013

BISTRO: Binary Component Extraction and Embedding for Software Security Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013

DRIP: A framework for purifying trojaned kernel drivers.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Obfuscation resilient binary code reuse through trace-oriented programming.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

LogGC: garbage collecting audit log.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Precise Calling Context Encoding.
IEEE Trans. Software Eng., 2012

Dependence analysis for safe futures.
Sci. Comput. Program., 2012

IntroLib: Efficient and transparent library call introspection for malware forensics.
Digit. Investig., 2012

Modeling Software Execution Environment.
Proceedings of the 19th Working Conference on Reverse Engineering, 2012

Prius: generic hybrid trace compression for wireless sensor networks.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

White box sampling in uncertain data processing enabled by program analysis.
Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2012

Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Static detection of resource contention problems in server-side scripts.
Proceedings of the 34th International Conference on Software Engineering, 2012

Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

2011
Statically locating web application bugs caused by asynchronous calls.
Proceedings of the 20th International Conference on World Wide Web, 2011

Toward generating reducible replay logs.
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011

Accentuating the positive: atomicity inference and enforcement using correct executions.
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011

Selecting peers for execution comparison.
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011

Demo abstract: Diagnostic tracing of wireless sensor networks with TinyTracer.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

Coalescing executions for fast uncertainty analysis.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Unified debugging of distributed systems with Recon.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications.
IEEE Trans. Software Eng., 2010

Lightweight Task Graph Inference for Distributed Applications.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Memory indexing: canonicalizing addresses across executions.
Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010

Efficient diagnostic tracing for wireless sensor networks.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

Automatic Reverse Engineering of Data Structures from Binary Execution.
Proceedings of the Network and Distributed System Security Symposium, 2010

Analyzing concurrency bugs using dual slicing.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Strict control dependence and its effect on dynamic information flow analyses.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Analyzing multicore dumps to facilitate concurrency bug reproduction.
Proceedings of the 15th International Conference on Architectural Support for Programming Languages and Operating Systems, 2010

2009
Lightweight tracing for wireless sensor networks debugging.
Proceedings of the Fourth International Workshop on Middleware for Sensor Networks, 2009

Memory slicing.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

Algorithms for Automatically Computing the Causal Paths of Failures.
Proceedings of the Fundamental Approaches to Software Engineering, 2009

Alchemist: A Transparent Dependence Distance Profiling Infrastructure.
Proceedings of the CGO 2009, 2009

2008
A Systematic Study of Failure Proximity.
IEEE Trans. Software Eng., 2008

Deriving input syntactic structure from execution.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Quasi-static scheduling for safe futures.
Proceedings of the 13th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2008

Efficient program execution indexing.
Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, 2008

Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Proceedings of the Network and Distributed System Security Symposium, 2008

Scalable dynamic information flow tracking and its applications.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Convicting exploitable software vulnerabilities: An efficient input provenance based approach.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Avoiding Program Failures Through Safe Execution Perturbations.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Locating faulty code by multiple points slicing.
Softw. Pract. Exp., 2007

A study of effectiveness of dynamic slicing in locating real faults.
Empir. Softw. Eng., 2007

Tracing Lineage Beyond Relational Operators.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Towards locating execution omission errors.
Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation, 2007

Efficient online detection of dynamic control dependence.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2007

Enabling tracing Of long-running multithreaded programs via dynamic execution reduction.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2007

Matching Control Flow of Program Versions.
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007

Indexing Noncrashing Failures: A Dynamic Program Slicing-Based Approach.
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007

Whole Execution Traces and Their Use in Debugging.
Proceedings of the Compiler Design Handbook: Optimizations and Machine Code Generation, 2007

2006
Fault Location via Precise Dynamic Slicing.
PhD thesis, 2006

Dynamic slicing long running programs through execution fast forwarding.
Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2006

Pruning dynamic slices with confidence.
Proceedings of the ACM SIGPLAN 2006 Conference on Programming Language Design and Implementation, 2006

Locating faults through automated predicate switching.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

2005
Cost and precision tradeoffs of dynamic data slicing algorithms.
ACM Trans. Program. Lang. Syst., 2005

Whole execution traces and their applications.
ACM Trans. Archit. Code Optim., 2005

Matching execution histories of program versions.
Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005

Locating faulty code using failure-inducing chops.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors.
Proceedings of the 11th International Conference on High-Performance Computer Architecture (HPCA-11 2005), 2005

Experimental evaluation of using dynamic slices for fault location.
Proceedings of the Sixth International Workshop on Automated Debugging, 2005

Extended Whole Program Paths.
Proceedings of the 14th International Conference on Parallel Architectures and Compilation Techniques (PACT 2005), 2005

2004
Cost effective dynamic program slicing.
Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation 2004, 2004

Whole Execution Traces.
Proceedings of the 37th Annual International Symposium on Microarchitecture (MICRO-37 2004), 2004

Efficient Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams.
Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), 2004

Extending Path Profiling across Loop Backedges and Procedure Boundaries.
Proceedings of the 2nd IEEE / ACM International Symposium on Code Generation and Optimization (CGO 2004), 2004

2003
Precise Dynamic Slicing Algorithms.
Proceedings of the 25th International Conference on Software Engineering, 2003

Hiding Program Slices for Software Security.
Proceedings of the 1st IEEE / ACM International Symposium on Code Generation and Optimization (CGO 2003), 2003


  Loading...