LibD: Scalable and precise third-party library detection in Android markets M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo Proceedings of the 39th International Conference on Software Engineering …, 2017 | 204 | 2017 |
Reassembleable disassembling S Wang, P Wang, D Wu 24th USENIX Security Symposium, 627-642, 2015 | 179 | 2015 |
CacheD: Identifying cache-based timing channels in production software S Wang, P Wang, X Liu, D Zhang, D Wu Proceedings of the 26th USENIX Security Symposium, 2017 | 153 | 2017 |
eDoctor: Automatically diagnosing abnormal battery drain issues on smartphones. X Ma, P Huang, X Jin, P Wang, S Park, D Shen, Y Zhou, LK Saul, ... NSDI 13, 57-70, 2013 | 141 | 2013 |
Towards memory safe enclave programming with rust-sgx H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 99 | 2019 |
Automatic grading of programming assignments: an approach based on formal semantics X Liu, S Wang, P Wang, D Wu 2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019 | 74 | 2019 |
Uroboros: Instrumenting stripped binaries with static reassembling S Wang, P Wang, D Wu 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016 | 70 | 2016 |
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation S Wang, Y Bao, X Liu, P Wang, D Zhang, D Wu 28th USENIX security symposium (USENIX security 19), 657-674, 2019 | 65 | 2019 |
Credal: Towards locating a memory corruption vulnerability with your core dump J Xu, D Mu, P Chen, X Xing, P Wang, P Liu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 57 | 2016 |
Semantics-aware machine learning for function recognition in binary code S Wang, P Wang, D Wu 2017 IEEE International Conference on Software Maintenance and Evolution …, 2017 | 47 | 2017 |
Software protection on the go: A large-scale empirical study on mobile app obfuscation P Wang, Q Bao, L Wang, S Wang, Z Chen, T Wei, D Wu Proceedings of the 40th International Conference on Software Engineering, 26-36, 2018 | 37 | 2018 |
Translingual Obfuscation P Wang, S Wang, M Jiang, Y Jiang, D Wu 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 128-144, 2016 | 33 | 2016 |
Generating precise dependencies for large software P Wang, J Yang, L Tan, R Kroeger, JD Morgenthaler 2013 4th International Workshop on Managing Technical Debt (MTD), 47-50, 2013 | 33 | 2013 |
Large-scale third-party library detection in android markets M Li, P Wang, W Wang, S Wang, D Wu, J Liu, R Xue, W Huo, W Zou IEEE Transactions on Software Engineering 46 (9), 981-1003, 2018 | 23 | 2018 |
Composite software diversification S Wang, P Wang, D Wu 2017 IEEE International Conference on Software Maintenance and Evolution …, 2017 | 22 | 2017 |
Lambda obfuscation P Lan, P Wang, S Wang, D Wu Security and Privacy in Communication Networks: 13th International …, 2018 | 18 | 2018 |
Binary code retrofitting and hardening using SGX S Wang, W Wang, Q Bao, P Wang, XF Wang, D Wu Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017 | 18 | 2017 |
If it’s not secure, it should not compile: Preventing DOM-based XSS in large-scale web development with API hardening P Wang, J Bangert, C Kern 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 14 | 2021 |
Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave Development P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing The ACM/IEEE 42nd International Conference on Software Engineering: Software …, 2020 | 12 | 2020 |
Turing obfuscation Y Wang, S Wang, P Wang, D Wu Security and Privacy in Communication Networks: 13th International …, 2018 | 12 | 2018 |