Publications
- Top Venues in Security/Systems (S&P (Oakland) [22, 23, 25, 34, 39, 46, 47, 55], CCS [21, 28, 37], NDSS [2, 8, 13, 24, 40, 53], USENIX [45], ASPLOS [3, 4, 44]), in SE/PL (ICSE [18, 35, 41], FSE [6, 29], ASE [ 1, 11, 30, 50, 51], OOPSLA [7, 19]), in Web (WWW [9, 14, 26, 48, 49, 54], IMC [42])
55. S&P'26 - Death Is Not the End: A Longitudinal Study on the Impact of Automatic Updates on Container Vulnerability Lifespans, In Proc. of the 47th IEEE Symposium on Security and Privacy - BibTex
54. WWW'26 - Zelda: Feedback-driven Closed-box Fuzzing for Identifying Web Application Vulnerabilities, In Proc. of 35th The Web Conference - BibTex
53. NDSS'26 - Connecting the Dots: An Investigative Study on Linking Private User Data Across Messaging Apps, In Proc. of 33rd Network and Distributed System Security Symposium - BibTex
52. ICISC'25 - AdvCodeGen: Adversarial Code Generation via Large Language Models, In Proc. of the 28th Annual International Conference on Information Security and Cryptology - BibTex
51. ASE'25 - When Does Wasm Malware Detection Fail? A Systematic Analysis of Their Robustness to Evasion, In Proc. of 40th IEEE/ACM International Conference on Automated Software Engineering - BibTex
50. ASE'25 - IMUFUZZER: Resilience-based Discovery of Signal Injection Attacks on Robotic Aerial Vehicles, In Proc. of 40th IEEE/ACM International Conference on Automated Software Engineering - BibTex
49. WWW'25 - What's in Phishers: A Longitudinal Study of Security Configurations in Phishing Websites and Kits, In Proc. of 34th The Web Conference - BibTex
48. WWW'25 - 7 Days Later: Analyzing Phishing-Site Lifespan After Detected, In Proc. of 34th The Web Conference - BibTex
47. S&P'25 - RaceDB: Detecting Request Race Vulnerabilities in Database-Backed Web Applications, In Proc. of the 46th IEEE Symposium on Security and Privacy - BibTex
46. S&P'25 - CMASan: Custom Memory Allocator-aware Address Sanitizer, In Proc. of the 46th IEEE Symposium on Security and Privacy - BibTex
45. USENIX'24 - Scavy: Automated Discovery of Memory Corruption Targets in Linux Kernel for Privilege Escalation, In Proc. of the 33rd USENIX Security Symposium - BibTex
44. ASPLOS'24 - FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation, In Proc. of the 29th International Conference on Architectural Support for Programming Languages and Operating Systems - BibTex
43. ICISC'23 - BTFuzzer: a profile-based fuzzing framework for Bluetooth protocols, In Proc. of the 26th Annual International Conference on Information Security and Cryptology - BibTex
42. IMC'23 - A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating Behaviors, In Proc. of the 23rd ACM Internet Measurement Conference - BibTex
41. ICSE'23 - BFTDetector: Automatic Detection of Business Flow Tampering for Digital Content Service, In Proc. of the 45th International Conference on Software Engineering - BibTex
40. NDSS'23 - SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications, In Proc. of the 30th Network and Distributed System Security Symposium - BibTex
39. S&P'23 - PyFET: Forensically Equivalent Transformation for Python Binary Decompilation, In Proc. of the 44th IEEE Symposium on Security and Privacy - BibTex
38. CCS'22 (Poster) - Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles, In Proc. of the 29th ACM Conference on Computer and Communications Security - BibTex
37. CCS'22 - DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing, In Proc. of the 29th ACM Conference on Computer and Communications Security - BibTex
36. WISA'22 - Dazzle-attack: Anti-Forensic Server-side Attack via Fail-free Dynamic State Machine, In Proc. of the 23rd World Conference on Information Security Applications - BibTex
35. ICSE'22 - Hiding Critical Program Components via Ambiguous Translation, In Proc. of the 44th International Conference on Software Engineering - BibTex
34. S&P'22 - SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms, In Proc. of the 43rd IEEE Symposium on Security and Privacy - BibTex
33. ACSAC'21 - Sofware Watermarking via a Binary Function Relocation, In Proc. of 37th Annual Conference on Computer Security Applications - Slides | BibTex
32. ASE'21 (NIER) - Defeating Program Analysis Techniques via Ambiguous Translation, In Proc. of 36th IEEE/ACM International Conference on Automated Software Engineering (New Ideas and Emerging Results Track) - BibTex
31. TIFS (Journal, IF: 6.211) - TRACE: Enterprise-Wide Provenance Tracking For Real-Time APT Detection, IEEE Transactions on Information Forensics and Security - BibTex
30. ASE'21 - An Empirical Study of Bugs in WebAssembly Compilers, In Proc. of 36th IEEE/ACM International Conference on Automated Software Engineering - BibTex
29. FSE'21 - Swarmbug: Debugging Configuration Bugs in Swarm Robotics, In Proc. of 29th ACM SIGSOFT International Symposium on the Foundations of Software Engineering - Invited Talk at WISA | BibTex
28. CCS'21 - Spinner: Automated Dynamic Command Subsystem Perturbation, In Proc. of 28th ACM Conference on Computer and Communications Security - BibTex
27. ASIACCS'21 - Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem, In Proc. of 16th ACM ASIA Conference on Computer and Communications Security - BibTex
26. WWW'21 - TLS 1.3 in Practice: How TLS 1.3 Contributes to the Internet, In Proc. of 30th The Web Conference - Video | BibTex
25. S&P'21 - OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary, In Proc. of the 42nd IEEE Symposium on Security and Privacy - BibTex
24. NDSS'21 - C2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis, In Proc. of the 28th Network and Distributed System Security Symposium - Slides | Video | BibTex
23. S&P'20 - TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks, In Proc. of the 41st IEEE Symposium on Security and Privacy - Video | BibTex
22. S&P'20 - PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning, In Proc. of the 41st IEEE Symposium on Security and Privacy - BibTex
21. CCS'19 - MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis, In Proc. of the 26th ACM Conference on Computer and Communications Security - Slides | Code | BibTex
20. ACSAC'19 - CUBISMO: Decloaking Server-side Malware via Cubist Program Analysis, In Proc. of the 35th Annual Conference on Computer Security Applications - Slides | BibTex
19. OOPSLA'19 - BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation, In Proc. of the 2019 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications - BibTex
18. ICSE'19 - Probabilistic Disassembly, In Proc. of the 41st International Conference on Software Engineering - Slides | BibTex
17. ACSAC'18 - Lprov: Practical Library-aware Provenance Tracing, In Proc. of the 34th Annual Conference on Computer Security Applications - BibTex
16. ATC'18 - Kernel-Supported Cost-Effective Audit Logging for Causality Tracking, In Proc. of the 2018 USENIX Annual Technical Conference - BibTex
15. Ph.D. Thesis - Combatting Advanced Persistent Threat via Causality Inference and Program Analysis - BibTex
14. WWW'18 - AdBudgetKiller: Online Advertising Budget Draining Attack, In Proc. of the 27th International World Wide Web Conference - BibTex
13. NDSS'18 - MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation, In Proc. of the 25th Network and Distributed System Security Symposium - Slides | BibTex
12. ACSAC'17 - RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications, In Proc. of the 33rd Annual Conference on Computer Security Applications - BibTex
11. ASE'17 - PAD: Programming Third-party Web Advertisement Censorship, In Proc. of the 32nd IEEE/ACM International Conference on Automated Software Engineering - BibTex
10. ISSTA'17 - CPR: Cross Platform Binary Code Reuse via Platform Independent Trace Program, In Proc. of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis - Slides | BibTex
9. WWW'17 - J-Force: Forced Execution on JavaScript, In Proc. of the 26th International World Wide Web Conference - BibTex
8. NDSS'17 - A2C: Self Destructing Exploit Executions via Input Perturbation, In Proc. of the 24th Network and Distributed System Security Symposium - Slides | BibTex
7. OOPSLA'16 - Apex: Automatic Programming Assignment Error Explanation, In Proc. of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications - Website | BibTex
6. FSE'16 - WebRanz: Web Page Randomization For Better Advertisement Delivery and Web-Bot Prevention, In Proc. of the 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering - Website | BibTex
5. WOOT'16 - Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic, In Proc. of the 10th USENIX Workshop on Offensive Technologies - BibTex
4. ASPLOS'16 - LDX: Causality Inference by Lightweight Dual Execution, In Proc. of the 21st International Conference on Architectural Support for Programming Languages and Operating Systems - Slides | Demo Video | BibTex
3. ASPLOS'15 - Dual Execution for On the Fly Fine Grained Execution Comparison, In Proc. of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems - BibTex
2. NDSS'15 - P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions, In Proc. of the 22nd Network and Distributed System Security Symposium - Slides | BibTex
1. ASE'13 - PIEtrace: Platform Independent Executable Trace, In Proc. of the 28th IEEE/ACM International Conference on Automated Software Engineering - Slides | Website | BibTex
