Paper-Conference

[USENIX Sec '22] PolyCruise: A Cross-Language Dynamic Information Flow Analysis

🎀 USENIX Artifact Badges: Available, Functional

Aug 10, 2022

[ASPLOS '22] One Size Does Not Fit All: Security Hardening of MIPS Embedded Systems via Static Binary Debloating for Shared Libraries

🎀 ACM Artifact Badges: Available, Functional, Reproduced 🏅 Shortlisted for IEEE Top Picks in Hardware and Embedded Security 2023

Feb 28, 2022

[NDSS '22] Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators

Feb 27, 2022

[CCS '21] Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization

Nov 15, 2021

[USENIX Sec '21] MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation

🎀 USENIX Artifact Evaluation Passed 📢 Our work motiviates the new IDA-Pro plugin by Hex-Rays.

Aug 13, 2021

[USENIX Sec '21] Obfuscation-Resilient Executable Payload Extraction From Packed Malware

Aug 11, 2021

[PLDI '21] Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical Study

🏆 PLDI Distinguished Paper Award 📢 ACM SIGPLAN Blog: When Compiler Optimization Meets Binary Code Difference

Jun 24, 2021

[PLDI '21] Boosting SMT Solver Performance on Mixed-Bitwise-Arithmetic Expressions

🎀 ACM Artifact Badges: Available, Functional

Jun 23, 2021

[ICSE '21] App's Auto-Login Function Security Testing via Android OS-Level Virtualization

🐞 Zero-day Vulnerabilities Discovered: CVE-2019-15843, VULBOX-2019-0221059, CNVD-2019-42028, CNVD-2019-42029, CNVD-2019-42030, CNVD-2019-42031, CNVD-2019-42032, CNVD-2019-42033, CNVD-2019-42034

May 25, 2021

[CCS '20] PatchScope: Memory Object Centric Patch Diffing

Nov 12, 2020