default search action
BibTeX records: Daoyuan Wu
@inproceedings{DBLP:conf/eurosp/ZhangMWGYCWJ24, author = {Zicheng Zhang and Haoyu Ma and Daoyuan Wu and Debin Gao and Xiao Yi and Yufan Chen and Yan Wu and Lingxiao Jiang}, title = {MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search}, booktitle = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2024, Vienna, Austria, July 8-12, 2024}, pages = {724--740}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/EuroSP60621.2024.00045}, doi = {10.1109/EUROSP60621.2024.00045}, timestamp = {Thu, 05 Sep 2024 16:02:09 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ZhangMWGYCWJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LiW0L0WG024, author = {Zongjie Li and Chaozheng Wang and Pingchuan Ma and Chaowei Liu and Shuai Wang and Daoyuan Wu and Cuiyun Gao and Yang Liu}, title = {On Extracting Specialized Code Abilities from Large Language Models: {A} Feasibility Study}, booktitle = {Proceedings of the 46th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024}, pages = {74:1--74:13}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3597503.3639091}, doi = {10.1145/3597503.3639091}, timestamp = {Mon, 24 Jun 2024 15:20:25 +0200}, biburl = {https://dblp.org/rec/conf/icse/LiW0L0WG024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/0001WXLWXX024, author = {Yuqiang Sun and Daoyuan Wu and Yue Xue and Han Liu and Haijun Wang and Zhengzi Xu and Xiaofei Xie and Yang Liu}, title = {GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining {GPT} with Program Analysis}, booktitle = {Proceedings of the 46th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024}, pages = {166:1--166:13}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3597503.3639117}, doi = {10.1145/3597503.3639117}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/0001WXLWXX024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiuW0WL0C24, author = {Han Liu and Daoyuan Wu and Yuqiang Sun and Haijun Wang and Kaixuan Li and Yang Liu and Yixiang Chen}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/liu-han}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiuW0WL0C24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-16185, author = {Yuqiang Sun and Daoyuan Wu and Yue Xue and Han Liu and Wei Ma and Lyuye Zhang and Miaolei Shi and Yang Liu}, title = {LLM4Vuln: {A} Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning}, journal = {CoRR}, volume = {abs/2401.16185}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.16185}, doi = {10.48550/ARXIV.2401.16185}, eprinttype = {arXiv}, eprint = {2401.16185}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-16185.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-15727, author = {Daoyuan Wu and Shuai Wang and Yang Liu and Ning Liu}, title = {LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: {A} Vision Paper}, journal = {CoRR}, volume = {abs/2402.15727}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.15727}, doi = {10.48550/ARXIV.2402.15727}, eprinttype = {arXiv}, eprint = {2402.15727}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-15727.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-02716, author = {Xiuting Ge and Chunrong Fang and Quanjun Zhang and Daoyuan Wu and Bowen Yu and Qirui Zheng and An Guo and Shangwei Lin and Zhihong Zhao and Yang Liu and Zhenyu Chen}, title = {Pre-trained Model-based Actionable Warning Identification: {A} Feasibility Study}, journal = {CoRR}, volume = {abs/2403.02716}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.02716}, doi = {10.48550/ARXIV.2403.02716}, eprinttype = {arXiv}, eprint = {2403.02716}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-02716.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-06838, author = {Lyuye Zhang and Kaixuan Li and Kairan Sun and Daoyuan Wu and Ye Liu and Haoye Tian and Yang Liu}, title = {{ACFIX:} Guiding LLMs with Mined Common {RBAC} Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts}, journal = {CoRR}, volume = {abs/2403.06838}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.06838}, doi = {10.48550/ARXIV.2403.06838}, eprinttype = {arXiv}, eprint = {2403.06838}, timestamp = {Wed, 28 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-06838.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-16073, author = {Wei Ma and Daoyuan Wu and Yuqiang Sun and Tianwen Wang and Shangqing Liu and Jian Zhang and Yue Xue and Yang Liu}, title = {Combining Fine-Tuning and LLM-based Agents for Intuitive Smart Contract Auditing with Justifications}, journal = {CoRR}, volume = {abs/2403.16073}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.16073}, doi = {10.48550/ARXIV.2403.16073}, eprinttype = {arXiv}, eprint = {2403.16073}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-16073.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-13945, author = {Liwen Wang and Yuanyuan Yuan and Ao Sun and Zongjie Li and Pingchuan Ma and Daoyuan Wu and Shuai Wang}, title = {How do LLMs Support Deep Learning Testing? {A} Comprehensive Study Through the Lens of Image Mutation}, journal = {CoRR}, volume = {abs/2404.13945}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.13945}, doi = {10.48550/ARXIV.2404.13945}, eprinttype = {arXiv}, eprint = {2404.13945}, timestamp = {Sat, 25 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-13945.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-17833, author = {Zhenlan Ji and Daoyuan Wu and Pingchuan Ma and Zongjie Li and Shuai Wang}, title = {Testing and Understanding Erroneous Planning in {LLM} Agents through Synthesized User Inputs}, journal = {CoRR}, volume = {abs/2404.17833}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.17833}, doi = {10.48550/ARXIV.2404.17833}, eprinttype = {arXiv}, eprint = {2404.17833}, timestamp = {Mon, 27 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-17833.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-02580, author = {Ye Liu and Yue Xue and Daoyuan Wu and Yuqiang Sun and Yi Li and Miaolei Shi and Yang Liu}, title = {PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation}, journal = {CoRR}, volume = {abs/2405.02580}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.02580}, doi = {10.48550/ARXIV.2405.02580}, eprinttype = {arXiv}, eprint = {2405.02580}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-02580.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-05498, author = {Xunguang Wang and Daoyuan Wu and Zhenlan Ji and Zongjie Li and Pingchuan Ma and Shuai Wang and Yingjiu Li and Yang Liu and Ning Liu and Juergen Rahmel}, title = {SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner}, journal = {CoRR}, volume = {abs/2406.05498}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.05498}, doi = {10.48550/ARXIV.2406.05498}, eprinttype = {arXiv}, eprint = {2406.05498}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-05498.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/FangWYWCCLJ23, author = {Yuzhou Fang and Daoyuan Wu and Xiao Yi and Shuai Wang and Yufan Chen and Mengjie Chen and Yang Liu and Lingxiao Jiang}, editor = {Ren{\'{e}} Just and Gordon Fraser}, title = {Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts}, booktitle = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July 17-21, 2023}, pages = {1157--1168}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3597926.3598125}, doi = {10.1145/3597926.3598125}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issta/FangWYWCCLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/YiFWJ23, author = {Xiao Yi and Yuzhou Fang and Daoyuan Wu and Lingxiao Jiang}, title = {BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/blockscope-detecting-and-investigating-propagated-vulnerabilities-in-forked-blockchain-projects/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/YiFWJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-03012, author = {Zongjie Li and Chaozheng Wang and Pingchuan Ma and Chaowei Liu and Shuai Wang and Daoyuan Wu and Cuiyun Gao}, title = {On the Feasibility of Specialized Ability Extracting for Large Language Code Models}, journal = {CoRR}, volume = {abs/2303.03012}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.03012}, doi = {10.48550/ARXIV.2303.03012}, eprinttype = {arXiv}, eprint = {2303.03012}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-03012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-03314, author = {Yuqiang Sun and Daoyuan Wu and Yue Xue and Han Liu and Haijun Wang and Zhengzi Xu and Xiaofei Xie and Yang Liu}, title = {When {GPT} Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan}, journal = {CoRR}, volume = {abs/2308.03314}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.03314}, doi = {10.48550/ARXIV.2308.03314}, eprinttype = {arXiv}, eprint = {2308.03314}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-03314.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-01432, author = {Zongjie Li and Chaozheng Wang and Pingchuan Ma and Daoyuan Wu and Shuai Wang and Cuiyun Gao and Yang Liu}, title = {Split and Merge: Aligning Position Biases in Large Language Model based Evaluators}, journal = {CoRR}, volume = {abs/2310.01432}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.01432}, doi = {10.48550/ARXIV.2310.01432}, eprinttype = {arXiv}, eprint = {2310.01432}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-01432.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-00324, author = {Xiuting Ge and Chunrong Fang and Xuanye Li and Weisong Sun and Daoyuan Wu and Juan Zhai and Shangwei Lin and Zhihong Zhao and Yang Liu and Zhenyu Chen}, title = {Machine Learning for Actionable Warning Identification: {A} Comprehensive Survey}, journal = {CoRR}, volume = {abs/2312.00324}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.00324}, doi = {10.48550/ARXIV.2312.00324}, eprinttype = {arXiv}, eprint = {2312.00324}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-00324.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-04087, author = {Zongjie Li and Chaozheng Wang and Chaowei Liu and Pingchuan Ma and Daoyuan Wu and Shuai Wang and Cuiyun Gao}, title = {{VRPTEST:} Evaluating Visual Referring Prompting in Large Multimodal Models}, journal = {CoRR}, volume = {abs/2312.04087}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.04087}, doi = {10.48550/ARXIV.2312.04087}, eprinttype = {arXiv}, eprint = {2312.04087}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-04087.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaLGWJJ22, author = {Haoyu Ma and Shijia Li and Debin Gao and Daoyuan Wu and Qiaowen Jia and Chunfu Jia}, title = {Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3508--3520}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3100877}, doi = {10.1109/TDSC.2021.3100877}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaLGWJJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SunSRWZ22, author = {Menghan Sun and Zirui Song and Xiaoxi Ren and Daoyuan Wu and Kehuan Zhang}, title = {LiCA: {A} Fine-grained and Path-sensitive Linux Capability Analysis Framework}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {364--379}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545966}, doi = {10.1145/3545948.3545966}, timestamp = {Thu, 20 Oct 2022 10:46:43 +0200}, biburl = {https://dblp.org/rec/conf/raid/SunSRWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/YiWJFZZ22, author = {Xiao Yi and Daoyuan Wu and Lingxiao Jiang and Yuzhou Fang and Kehuan Zhang and Wei Zhang}, editor = {Abhik Roychoudhury and Cristian Cadar and Miryung Kim}, title = {An empirical study of blockchain system vulnerabilities: modules, types, and patterns}, booktitle = {Proceedings of the 30th {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022}, pages = {709--721}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3540250.3549105}, doi = {10.1145/3540250.3549105}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/YiWJFZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-13356, author = {Xu Yang and Daoyuan Wu and Xiao Yi and Jimmy H. M. Lee and Tan Lee}, title = {iExam: {A} Novel Online Exam Monitoring and Analysis System Based on Face Detection and Recognition}, journal = {CoRR}, volume = {abs/2206.13356}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.13356}, doi = {10.48550/ARXIV.2206.13356}, eprinttype = {arXiv}, eprint = {2206.13356}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-13356.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-00205, author = {Xiao Yi and Yuzhou Fang and Daoyuan Wu and Lingxiao Jiang}, title = {BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects}, journal = {CoRR}, volume = {abs/2208.00205}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.00205}, doi = {10.48550/ARXIV.2208.00205}, eprinttype = {arXiv}, eprint = {2208.00205}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-00205.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-01568, author = {Zicheng Zhang and Daoyuan Wu and Lixiang Li and Debin Gao}, title = {On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps}, journal = {CoRR}, volume = {abs/2209.01568}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.01568}, doi = {10.48550/ARXIV.2209.01568}, eprinttype = {arXiv}, eprint = {2209.01568}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-01568.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/WuGL21, author = {Daoyuan Wu and Debin Gao and David Lo}, title = {Scalable online vetting of Android apps for measuring declared {SDK} versions and their consistency with {API} calls}, journal = {Empir. Softw. Eng.}, volume = {26}, number = {1}, pages = {7}, year = {2021}, url = {https://doi.org/10.1007/s10664-020-09897-6}, doi = {10.1007/S10664-020-09897-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/WuGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/MaTQLGWJB21, author = {Haoyu Ma and Jianwen Tian and Kefan Qiu and David Lo and Debin Gao and Daoyuan Wu and Chunfu Jia and Thar Baker}, title = {Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {8}, pages = {5840--5850}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3038745}, doi = {10.1109/TII.2020.3038745}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/MaTQLGWJB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/WuGDC21, author = {Daoyuan Wu and Debin Gao and Robert H. Deng and Rocky K. C. Chang}, title = {When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {543--554}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00063}, doi = {10.1109/DSN48987.2021.00063}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/WuGDC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-06454, author = {Mengjie Chen and Daoyuan Wu and Xiao Yi and Jianliang Xu}, title = {AGChain: {A} Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets}, journal = {CoRR}, volume = {abs/2101.06454}, year = {2021}, url = {https://arxiv.org/abs/2101.06454}, eprinttype = {arXiv}, eprint = {2101.06454}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-06454.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-12162, author = {Xiao Yi and Daoyuan Wu and Lingxiao Jiang and Kehuan Zhang and Wei Zhang}, title = {Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities}, journal = {CoRR}, volume = {abs/2110.12162}, year = {2021}, url = {https://arxiv.org/abs/2110.12162}, eprinttype = {arXiv}, eprint = {2110.12162}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-12162.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/HeWD20, author = {En He and Daoyuan Wu and Robert H. Deng}, editor = {Cl{\'{e}}mentine Maurice and Leyla Bilge and Gianluca Stringhini and Nuno Neves}, title = {Understanding Android VoIP Security: {A} System-Level Vulnerability Assessment}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12223}, pages = {110--131}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-52683-2\_6}, doi = {10.1007/978-3-030-52683-2\_6}, timestamp = {Sun, 25 Jul 2021 11:49:24 +0200}, biburl = {https://dblp.org/rec/conf/dimva/HeWD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-11527, author = {Daoyuan Wu and Debin Gao and Robert H. Deng and Rocky K. C. Chang}, title = {When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid}, journal = {CoRR}, volume = {abs/2005.11527}, year = {2020}, url = {https://arxiv.org/abs/2005.11527}, eprinttype = {arXiv}, eprint = {2005.11527}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-11527.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuGCCJD19, author = {Daoyuan Wu and Debin Gao and Eric K. T. Cheng and Yichen Cao and Jintao Jiang and Robert H. Deng}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Towards Understanding Android System Vulnerabilities: Techniques and Insights}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {295--306}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329831}, doi = {10.1145/3321705.3329831}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WuGCCJD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/ZhangLWJCGWM19, author = {Shiwei Zhang and Weichao Li and Daoyuan Wu and Bo Jin and Rocky K. C. Chang and Debin Gao and Yi Wang and Ricky K. P. Mok}, title = {An empirical study of mobile network behavior and application performance in the wild}, booktitle = {Proceedings of the International Symposium on Quality of Service, IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019}, pages = {4:1--4:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3326285.3329039}, doi = {10.1145/3326285.3329039}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/ZhangLWJCGWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WuGCHCD19, author = {Daoyuan Wu and Debin Gao and Rocky K. C. Chang and En He and Eric K. T. Cheng and Robert H. Deng}, title = {Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/understanding-open-ports-in-android-applications-discovery-diagnosis-and-security-assessment/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WuGCHCD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-12982, author = {Daoyuan Wu and Debin Gao and David Lo}, title = {Scalable Online Vetting of Android Apps for Measuring Declared {SDK} Versions and Their Consistency with {API} Calls}, journal = {CoRR}, volume = {abs/1912.12982}, year = {2019}, url = {http://arxiv.org/abs/1912.12982}, eprinttype = {arXiv}, eprint = {1912.12982}, timestamp = {Sat, 04 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-12982.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/LiWCM18, author = {Weichao Li and Daoyuan Wu and Rocky K. C. Chang and Ricky K. P. Mok}, title = {Toward Accurate Network Delay Measurement on Android Phones}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {17}, number = {3}, pages = {717--732}, year = {2018}, url = {https://doi.org/10.1109/TMC.2017.2737990}, doi = {10.1109/TMC.2017.2737990}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/LiWCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/WuCGLD18, author = {Daoyuan Wu and Yao Cheng and Debin Gao and Yingjiu Li and Robert H. Deng}, editor = {Ziming Zhao and Gail{-}Joon Ahn and Ram Krishnan and Gabriel Ghinita}, title = {SCLib: {A} Practical and Lightweight Defense against Component Hijacking in Android Applications}, booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {299--306}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3176258.3176336}, doi = {10.1145/3176258.3176336}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/WuCGLD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Tang0WG18, author = {Xiaoxiao Tang and Yan Lin and Daoyuan Wu and Debin Gao}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {212--223}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212504}, doi = {10.1145/3212480.3212504}, timestamp = {Mon, 16 Sep 2019 13:25:53 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Tang0WG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-04372, author = {Daoyuan Wu and Yao Cheng and Debin Gao and Yingjiu Li and Robert H. Deng}, title = {SCLib: {A} Practical and Lightweight Defense against Component Hijacking in Android Applications}, journal = {CoRR}, volume = {abs/1801.04372}, year = {2018}, url = {http://arxiv.org/abs/1801.04372}, eprinttype = {arXiv}, eprint = {1801.04372}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-04372.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/WuCLCG17, author = {Daoyuan Wu and Rocky K. C. Chang and Weichao Li and Eric K. T. Cheng and Debin Gao}, editor = {Dilma Da Silva and Bryan Ford}, title = {MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance}, booktitle = {Proceedings of the 2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {445--457}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/wu}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/WuCLCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/WuLXLG17, author = {Daoyuan Wu and Ximing Liu and Jiayun Xu and David Lo and Debin Gao}, editor = {Liran Ma and Abdallah Khreishah and Yan Zhang and Mingyuan Yan}, title = {Measuring the Declared {SDK} Versions and Their Consistency with {API} Calls in Android Apps}, booktitle = {Wireless Algorithms, Systems, and Applications - 12th International Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10251}, pages = {678--690}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60033-8\_58}, doi = {10.1007/978-3-319-60033-8\_58}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/wasa/WuLXLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuLXLG17, author = {Daoyuan Wu and Ximing Liu and Jiayun Xu and David Lo and Debin Gao}, title = {Measuring the Declared {SDK} Versions and Their Consistency with {API} Calls in Android Apps}, journal = {CoRR}, volume = {abs/1702.04872}, year = {2017}, url = {http://arxiv.org/abs/1702.04872}, eprinttype = {arXiv}, eprint = {1702.04872}, timestamp = {Sat, 15 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuLXLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuCLCG17, author = {Daoyuan Wu and Rocky K. C. Chang and Weichao Li and Eric K. T. Cheng and Debin Gao}, title = {MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance}, journal = {CoRR}, volume = {abs/1703.07551}, year = {2017}, url = {http://arxiv.org/abs/1703.07551}, eprinttype = {arXiv}, eprint = {1703.07551}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuCLCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/LiWCM16, author = {Weichao Li and Daoyuan Wu and Rocky K. C. Chang and Ricky K. P. Mok}, editor = {Athina Markopoulou and Michalis Faloutsos and Vyas Sekar and Dejan Kostic}, title = {Demystifying and Puncturing the Inflated Delay in Smartphone-based WiFi Network Measurement}, booktitle = {Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA, December 12-15, 2016}, pages = {497--504}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2999572.2999595}, doi = {10.1145/2999572.2999595}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/conext/LiWCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuGLD16, author = {Daoyuan Wu and Debin Gao and Yingjiu Li and Robert H. Deng}, title = {SecComp: Towards Practically Defending Against Component Hijacking in Android Applications}, journal = {CoRR}, volume = {abs/1609.03322}, year = {2016}, url = {http://arxiv.org/abs/1609.03322}, eprinttype = {arXiv}, eprint = {1609.03322}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuGLD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuLCG16, author = {Daoyuan Wu and Weichao Li and Rocky K. C. Chang and Debin Gao}, title = {MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic}, journal = {CoRR}, volume = {abs/1610.01282}, year = {2016}, url = {http://arxiv.org/abs/1610.01282}, eprinttype = {arXiv}, eprint = {1610.01282}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuLCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiangMWTGPJZ15, author = {Yu Liang and Xinjie Ma and Daoyuan Wu and Xiaoxiao Tang and Debin Gao and Guojun Peng and Chunfu Jia and Huanguo Zhang}, editor = {Soonhak Kwon and Aaram Yun}, title = {Stack Layout Randomization with Minimal Rewriting of Android Binaries}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {229--245}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_15}, doi = {10.1007/978-3-319-30840-1\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiangMWTGPJZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiMWC15, author = {Weichao Li and Ricky K. P. Mok and Daoyuan Wu and Rocky K. C. Chang}, title = {On the accuracy of smartphone-based mobile network measurement}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {370--378}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218402}, doi = {10.1109/INFOCOM.2015.7218402}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiMWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuC15, author = {Daoyuan Wu and Rocky K. C. Chang}, title = {Indirect File Leaks in Mobile Applications}, journal = {CoRR}, volume = {abs/1511.00104}, year = {2015}, url = {http://arxiv.org/abs/1511.00104}, eprinttype = {arXiv}, eprint = {1511.00104}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WuC14, author = {Daoyuan Wu and Rocky K. C. Chang}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Analyzing Android Browser Apps for file: // Vulnerabilities}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {345--363}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_20}, doi = {10.1007/978-3-319-13257-0\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/WuC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuC14, author = {Daoyuan Wu and Rocky K. C. Chang}, title = {Analyzing Android Browser Apps for file: // Vulnerabilities}, journal = {CoRR}, volume = {abs/1404.4553}, year = {2014}, url = {http://arxiv.org/abs/1404.4553}, eprinttype = {arXiv}, eprint = {1404.4553}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuLC14, author = {Daoyuan Wu and Xiapu Luo and Rocky K. C. Chang}, title = {A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps}, journal = {CoRR}, volume = {abs/1405.6282}, year = {2014}, url = {http://arxiv.org/abs/1405.6282}, eprinttype = {arXiv}, eprint = {1405.6282}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.