gossip:overview:publication

Publication

Conference papers

  • Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. in Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC 2020). Virtual. December 7-11, 2020.
    • Siqi Ma, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal, Elisa Bertino
  • SMARTSHIELD: Automatic Smart Contract Protection Made Easy. in Proceedings of the 27th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2020). Virtual. February 18-21, 2020.
    • Yuyao Zhang, Siqi Ma, Juanru Li, Kailai Li, Surya Nepal, Dawu Gu
  • Fuzzing Smart Contracts for Efficient Exploit Generation. in Proceedings of the 27th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2020). Virtual. February 18-21, 2020.
    • Qingzhao Zhang, Yizhuo Wang, Juanru Li, Siqi Ma
  • Accelerating SM2 Digital Signature Algorithm using Modern Processor Features. in Proceedings of the 21st International Conference on Information and Communications Security (ICICS 2019). Beijing, China. December 15-17, 2019.
    • Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu
  • An Empirical Study of the SMS One-Time Password Authentication in Android Apps. in Proceedings of the 35st Annual Computer Security Applications Conference (ACSAC 2019). San Juan. December 9-13, 2019.
    • Siqi Ma, Runhan Feng, Juanru Li, Surya Nepal, Diethelm Ostry, Yang Liu, Elisa Bertino, Robert Deng, Sanjay Jha, Zhuo Ma
  • Finding Flaws from Password Authentication Code in Android Apps. in Proceedings of the 24th European Symposium on Research in Computer Security (ESORICS 2019). Luxembourg. September 23-27, 2019.
    • Siqi Ma, Elisa Bertino, Robert Deng, Juanru Li, Diet Ostry, Surya Nepal, Sanjay Jha
  • NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification. in Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). Beijing, China. September 23-25, 2019.
    • Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Zheyu Ma, Long Mai, Tiancheng Chen, Juanru Li, Dawu Gu
  • AppCommune: Automated Third-party Libraries De-duplicating and Updating for Android Apps. in Proceedings of the 26th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2019). Hangzhou, China. February 24-27, 2019.
    • Bodong Li, Yuanyuan Zhang, Juanru Li, Runhan Feng, Dawu Gu
  • An Empirical Study of SDK Credential Misuse in iOS Apps. in Proceedings of the 25th Asia-Pacific Software Engineering Conference (APSEC 2018). Nara, Japan, December 4-7, 2018.
    • Wen Haohuang, Li Juanru, Zhang Yuanyuan, Gu Dawu.
  • K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces . in Proceedings of the 25th ACM Conference on Computer and Communications Security(CCS 2018). Toronto, Canada from October 15-19, 2018.
    • Li Juanru, Lin Zhiqiang, Juan Caballero, Zhang Yuanyuan, Gu Dawu.
  • BinMatch: A Semantics-based Hybrid Approach on Binary Code Clone Analysis. in Proceedings of the 34th International Conference on Software Maintenance and Evolution (ICSME 2018), Madrid, Spain. September 23-29, 2018.
    • Yikun Hu, Yuanyuan Zhang, Juanru Li, Hui Wang, Bodong Li, Dawu Gu.
  • Burn After Reading: Expunging Execution Footprints of Android Apps . in Proceedings of the 12th International Conference on Network and System Security (NSS 2018). Hong Kong, China, 27-29 August, 2018
    • Shu Junliang, Li Juanru, Zhang Yuanyuan, Gu Dawu.
  • Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning. in Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2018). Stockholm, Sweden. June 18-20, 2018.
    • Li Changyu, Cai Quanpu, Li Juanru, Hui Liu, Zhang Yuanyuan, Gu Dawu, Yu Yu.
  • Oh-Pwn_VPN! Security Analysis of OpenVPN-based Android Apps. in Proceedings of the 16th International Conference on Cryptology And Network Security (CANS 2017). Hong Kong. November 29 - December 2, 2017.
    • Qi Zhang, Juanru Li, Yuanyuan Zhang, Hui Wang, Dawu Gu.
  • Nightingale: Translating Embedded VM Code in x86 Binary Executables. in Proceedings of the 20th International Information Security Conference (ISC 2017). Ho Chi Minh City, Vietnam, November 22-24, 2017.
    • Haijiang Xie, Juanru Li, Yuanyuan Zhang, Dawu Gu.
  • Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices. in Proceedings of the First ACM CCS Workshop on Internet of Things Security and Privacy (IoTS&P’17). Dallas, TX, USA, November 3, 2017.
    • Hui Liu, Changyu Li, Xuancheng Jin, Juanru Li, Yuanyuan Zhang, Dawu Gu.
  • Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices. in Proceedings of the 33rd IEEE International Conference on Software Maintenance and Evolution (ICSME 2017). Shanghai, China. Sep.28-Oct.3, 2017.
    • Xuewen Zhang, Yuanyuan Zhang, Juanru Li, Yikun Hu, Huayi Li, Dawu Gu.
  • MIRAGE : Randomizing Large Chunk Allocation Via Dynamic Binary Instrumentation. in Dependable and Secure Computing, 2017 IEEE Conference (DSC 2017). Taipei, Taiwan. 7-10 Aug. 2017.
    • Zhenghao Hu, Yuanyuan Zhang, Hui Wang, Juanru Li, Wenbo Yang, Dawu Gu.
  • Binary Code Clone Detection across Architecturesand Compiling Configurations, in Proceedings of the 25th International Conference on Program Comprehension (ICPC 2017). Buenos Aires, Argentina. May 22-23, 2017.
    • Yikun Hu, Yuanyuan Zhang, Juanru Li and Dawu Gu.
  • Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps, in Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017). San Diego, CA, USA. February 26 - March 1, 2017.
    • Wenbo Yang, Yuanyuan Zhang, Juanru Li, Hui Liu, Qing Wang, Yueheng Zhang and Dawu Gu.
  • The Achilles' Heel of OAuth: A Multi-Platform Study of OAuth-based Authentication. in Proceedings of the 32nd Annual Computer Security Applications Conference (ACSAC 2016). Los Angeles, California, USA. December 5–9, 2016.
    • Hui Wang, Yuanyuan Zhang, Juanru Li and Dawu Gu.
  • Security Testing of Software on Embedded Devices Using x86 Platform. in Proceedings of the 12th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2016), Beijing, China, 12-13 November, 2016.
  • An Empirical Study of Insecure Communication in Android Apps. in Proceedings of the 12th China International Conference on Information Security and Cryptology (INSCRYPT 2016), Beijing, China, 4-6 November, 2016.
    • Yueheng Zhang, Junliang Shu, Yuanyuan Zhang, Juanru Li, Qing Wang, Dawu Gu.
  • Security Analysis of Vendor Customized Code in Firmware of Embedded Device. in Proceedings of the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, 10-12 October, 2016.
  • Open Sesame! Web Authentication Cracking via Mobile app Analysis. in Proceedings of the 18th Asia Pacific Web Conference (APWEB 2016). Suzhou, China. Sept 23-25, 2016
    • Liu Hui, Zhang Yuanyuan, Li Juanru, Wang Hui, Gu Dawu.
  • New Exploit Methods against Ptmalloc of Glibc. in Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016). Tianjin, China. 23-26 August, 2016
  • Cross-Architecture Binary Semantics Understanding via Similar Code Comparison. in Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016). Osaka, Japan. March 14-18, 2016
    • Yikun Hu, Yuanyuan Zhang, Juanru Li, Dawu Gu.
  • Vulnerability Assessment of OAuth Implementations in Android Applications. in Proceedings of the 31th Annual Computer Security Applications Conference (ACSAC 2015). Los Angeles, California, USA. December 7–11, 2015.
    • Hui Wang, Yuanyuan Zhang, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu.
  • SSG: Sensor Security Guard for Android Smartphones. in Proceedings of the 11th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2015). Wuhan, Hubei, China. November 10–11, 2015.
  • From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel. in Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2015). The Denver Marriot City Center, Denver, Colorado, US. October 12-16, 2015.
    • Wen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, Yuanyuan Zhang, Dawu Gu.
  • AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. in Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015). Kyoto, Japan. November 2–4, 2015.
    • Wenbo Yang, Yuanyuan Zhang, Juanru Li, Bodong Li, Junliang Shu, Wenju Hu, Dawu Gu.
  • TagDroid: Hybrid SSL Certificate Verification in Android. in Proceedings of the 16th International Conference on Information and Communications Security (ICICS2014). Hong Kong,China. December 16-17, 2014
    • Hui Liu, Yuanyuan Zhang, Hui Wang, Wenbo Yang, Juanru Li and Dawu Gu.
  • iCryptoTracer: Dynamic Analysis on Misuse of Cryptographic Functions in iOS Applications. in Proceedings of the 8th International Conference on Network and System Security (NSS 2014). Xi'an, China. Oct 15-17, 2014.
    • Yong Li, Yuanyuan Zhang, Juanru Li and Dawu Gu.
  • DIAS: Automated Online Analysis for Android Applications. in Proceedings of the 14th IEEE International Conference on Computer and Information Technology (IEEE CIT 2014). Xi'an, China. Sept 11-13, 2014.
    • Juanru Li, Yuanyuan Zhang, Wenbo Yang, Junliang Shu and Dawu Gu.
  • Android App Protection via Interpretation Obfuscation. in Proceedings of the 12th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2014), Dalian, China, August 24-27, 2014
    • Junliang Shu, Juanru Li, Yuanyuan Zhang and Dawu Gu.
  • APKLancet: Tumor Payload Diagnosis and Purification for Android Applications. in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014). Kyoto, Japan. June 2014
    • Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu and Dawu Gu.
  • Automatic Detection and Analysis of Encrypted Messages in Malware. In Proceedings of the 9th China International Conference on Information Security and Cryptology, (Inscrypt 2013), Guangzhou, China, November 27-30, 2013.
  • Toward Active and Efficient Privacy Protection for Android. in Proceedings of the 3rd IEEE International Conference on Information Science and Technology. (ICIST 2013), Yangzhou, China. Mar 27-28, 2013.
  • Detecting Encryption Functions via Process Emulation and IL-based Program Analysis. in Proceedings of the 9th International Conference on Information Security and Cryptology (ICICS 2012). Hong Kong, China, October 29-31, 2012.
  • Android Malware Forensics: Reconstruction of Malicious Events. in Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW 2012), Macau, China, June 18-21, 2012.
  • PyXhon: Dynamic Detection of Security Vulnerabilities in Python. in Proceedings of the 2nd IEEE International Conference on Information Science and Technology (ICIST 2012). Page(s): 461-466. Wuhan, Hubei, China; March 23-25 2012.
    • Ming Sun, Dawu Gu, Juanru Li and Bailan Li.
  • Detection and Analysis of Cryptographic Data Inside Software. in Proceedings of the 14th International Conference on Information Security (ISC 2011). Xi'an, China, October 26-29, 2011
  • Digital Forensic Analysis on Runtime Instruction Flow[C]. in Proceedings of the 3rd International ICST Conference on Forensic, Shanghai, China. Nov.11-12, 2010.
  • Orchestration or Automation: Authentication Flaw Detection in Android Apps, in Journal of Transactions on Dependable and Secure Computing
    • Siqi Ma, Juanru Li, Surya Nepal, Diet Ostry, David Lo, Sanjay Jha, Robert Deng, Elisa Bertino
  • Understanding the security of app-in-the-middle, in Journal of Computers & Security 97: 102000
  • Security analysis of third-party in-app payment in mobile applications, in Journal of Information Security and Applications 48:102358
    • Wenbo Yang, Juanru Li, Yuanyuan Zhang, Dawu Gu.
  • AppSpear: Automating the Hidden-Code Extraction and Reassembling of Packed Android Malware, in Journal of Systems and Software, 140: 3-16 (2018)
    • Li Bodong, Zhang Yuanyuan, Li Juanru, Yang Wenbo, Gu Dawu.
  • Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems. ACM Trans. Embedded Comput. Syst. 16(2): 61:1-61:22 (2017)
  • 动态指令流差分分析在恶意软件分析中的应用[J]. 计算机应用研究,2012,29(2):658-660.
    • 孙明,谷大武,李卷孺,罗宇皓.
  • 一种基于全系统仿真和指令流分析的二进制代码分析方法[J]. 计算机应用研究, 2011,28(4):1437-1441
    • 邓超国,谷大武,李卷孺,孙明.
  • Digital Forensic Analysis on Runtime Instruction Flow[J]. China Communications, 2010, Vol. 7 Issue (6): 112-119
    • Juanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo.
  • 一种精简二进制代码的程序理解方法[J]. 计算机应用. 2008,28(10):2608-2612
    • 李卷孺,谷大武,陆海宁.
2020
2019
2018
2017
2016
2014
你需要登录发表评论。
  • gossip/overview/publication.txt
  • 最后更改: 2020/12/22 05:29
  • wenya