Semfuzz: Semantics-based automatic generation of proof-of-concept exploits W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 148 | 2017 |
Profuzzer: On-the-fly input type probing for better zero-day vulnerability discovery W You, X Wang, S Ma, J Huang, X Zhang, XF Wang, B Liang 2019 IEEE symposium on security and privacy (SP), 769-786, 2019 | 145 | 2019 |
Cracking classifiers for evasion: a case study on the google's phishing pages filter B Liang, M Su, W You, W Shi, G Yang Proceedings of the 25th International Conference on World Wide Web, 345-356, 2016 | 103 | 2016 |
Hunting vulnerable smart contracts via graph embedding based bytecode matching J Huang, S Han, W You, W Shi, B Liang, J Wu, Y Wu IEEE Transactions on Information Forensics and Security 16, 2144-2156, 2021 | 72 | 2021 |
AntMiner: mining more bugs by reducing noise interference B Liang, P Bian, Y Zhang, W Shi, W You, Y Cai Proceedings of the 38th International Conference on Software Engineering …, 2016 | 69 | 2016 |
SLF: Fuzzing without valid seed inputs W You, X Liu, S Ma, D Perry, X Zhang, B Liang 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 66 | 2019 |
Taintman: An art-compatible dynamic taint analysis framework on unmodified and non-rooted android devices W You, B Liang, W Shi, P Wang, X Zhang IEEE Transactions on Dependable and Secure Computing 17 (1), 209-222, 2017 | 62 | 2017 |
Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary Z Zhang, Y Ye, W You, G Tao, W Lee, Y Kwon, Y Aafer, X Zhang 2021 IEEE Symposium on Security and Privacy (SP), 813-832, 2021 | 41 | 2021 |
Stochfuzz: Sound and cost-effective fuzzing of stripped binaries by incremental and stochastic rewriting Z Zhang, W You, G Tao, Y Aafer, X Liu, X Zhang 2021 IEEE Symposium on Security and Privacy (SP), 659-676, 2021 | 39 | 2021 |
Automatic Android GUI traversal with high coverage P Wang, B Liang, W You, J Li, W Shi 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 39 | 2014 |
Android {SmartTVs} vulnerability discovery via {log-guided} fuzzing Y Aafer, W You, Y Sun, Y Shi, X Zhang, H Yin 30th USENIX Security Symposium (USENIX Security 21), 2759-2776, 2021 | 35 | 2021 |
Reference hijacking: Patching, protecting and analyzing on unmodified and non-rooted android devices W You, B Liang, W Shi, S Zhu, P Wang, S Xie, X Zhang Proceedings of the 38th International Conference on Software Engineering …, 2016 | 35 | 2016 |
Mass discovery of android traffic imprints through instantiated partial execution Y Chen, W You, Y Lee, K Chen, XF Wang, W Zou Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 31 | 2017 |
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation Z Zhang, W You, G Tao, G Wei, Y Kwon, X Zhang Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-31, 2019 | 30 | 2019 |
Pmp: Cost-effective forced execution with probabilistic memory pre-planning W You, Z Zhang, Y Kwon, Y Aafer, F Peng, Y Shi, C Harmon, X Zhang 2020 IEEE Symposium on Security and Privacy (SP), 1121-1138, 2020 | 26 | 2020 |
Android implicit information flow demystified W You, B Liang, J Li, W Shi, X Zhang Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 25 | 2015 |
Scriptless timing attacks on web browser privacy B Liang, W You, L Liu, W Shi, M Heiderich 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 22 | 2014 |
Detecting stealthy malware with inter-structure and imported signatures B Liang, W You, W Shi, Z Liang Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 19 | 2011 |
SLF: fuzzing without valid seed inputs. In 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE) W You, X Liu, S Ma, D Perry, X Zhang, B Liang IEEE, 712ś723, 2019 | 17 | 2019 |
Finding client-side business flow tampering vulnerabilities IL Kim, Y Zheng, H Park, W Wang, W You, Y Aafer, X Zhang Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 12 | 2020 |