default search action
Heng Yin 0001
Person information
- affiliation: University of California, Riverside, CA, USA
- affiliation (former): Syracuse University, USA
- affiliation (former): College of William and Mary, USA
Other persons with the same name
- Heng Yin — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c77]Sheng Yu, Wei Song, Xunchao Hu, Heng Yin:
On the Correctness of Metadata-Based SBOM Generation: A Differential Analysis Approach. DSN 2024: 29-36 - [c76]Jie Hu, Yue Duan, Heng Yin:
Marco: A Stochastic Asynchronous Concolic Explorer. ICSE 2024: 59:1-59:12 - [c75]Yuxin Qiu, Jie Hu, Qian Zhang, Heng Yin:
Calico: Automated Knowledge Calibration and Diagnosis for Elevating AI Mastery in Code Tasks. ISSTA 2024: 1785-1797 - [c74]Lian Gao, Yu Qu, Sheng Yu, Yue Duan, Heng Yin:
SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing. NDSS 2024 - [c73]Zhenxiao Qi, Jie Hu, Zhaoqi Xiao, Heng Yin:
SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic Execution. USENIX Security Symposium 2024 - 2023
- [j12]Jianlei Chi, Yu Qu, Ting Liu, Qinghua Zheng, Heng Yin:
SeqTrans: Automatic Vulnerability Fix Via Sequence to Sequence Learning. IEEE Trans. Software Eng. 49(2): 564-585 (2023) - [c72]Ju Chen, Chengyu Song, Heng Yin:
R-Fuzz at SBFT'2023. SBFT 2023: 82-83 - [i6]Jie Hu, Qian Zhang, Heng Yin:
Augmenting Greybox Fuzzing with Generative AI. CoRR abs/2306.06782 (2023) - 2022
- [j11]Lei Zhao, Pengcheng Cao, Yue Duan, Heng Yin, Jifeng Xuan:
Probabilistic Path Prioritization for Hybrid Fuzzing. IEEE Trans. Dependable Secur. Comput. 19(3): 1955-1973 (2022) - [j10]Jia Yang, Cai Fu, Xiao-Yang Liu, Heng Yin, Pan Zhou:
Codee: A Tensor Embedding Scheme for Binary Code Search. IEEE Trans. Software Eng. 48(7): 2224-2244 (2022) - [c71]Yiru Zhao, Xiaoke Wang, Lei Zhao, Yueqiang Cheng, Heng Yin:
Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing. ACSAC 2022: 534-547 - [c70]Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin:
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware. AsiaCCS 2022: 990-1003 - [c69]Emilio Coppa, Heng Yin, Camil Demetrescu:
SymFusion: Hybrid Instrumentation for Concolic Execution. ASE 2022: 100:1-100:12 - [c68]Zhenxiao Qi, Yu Qu, Heng Yin:
LogicMEM: Automatic Profile Generation for Binary-Only Memory Forensics via Logic Inference. NDSS 2022 - [c67]Ju Chen, Jinghan Wang, Chengyu Song, Heng Yin:
JIGSAW: Efficient and Scalable Path Constraints Fuzzing. SP 2022: 18-35 - [c66]Ju Chen, Wookhyun Han, Mingjun Yin, Haochen Zeng, Chengyu Song, Byoungyoung Lee, Heng Yin, Insik Shin:
SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis. USENIX Security Symposium 2022: 2531-2548 - [c65]Sheng Yu, Yu Qu, Xunchao Hu, Heng Yin:
DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly. USENIX Security Symposium 2022: 2709-2725 - [e1]Heng Yin, Angelos Stavrou, Cas Cremers, Elaine Shi:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022. ACM 2022, ISBN 978-1-4503-9450-5 [contents] - 2021
- [j9]Yu Qu, Heng Yin:
Evaluating network embedding techniques' performances in software bug prediction. Empir. Softw. Eng. 26(4): 60 (2021) - [j8]Yu Qu, Jianlei Chi, Heng Yin:
Leveraging developer information for efficient effort-aware bug prediction. Inf. Softw. Technol. 137: 106605 (2021) - [c64]Xuezixiang Li, Yu Qu, Heng Yin:
PalmTree: Learning an Assembly Language Model for Instruction Embedding. CCS 2021: 3236-3251 - [c63]Zhenxiao Qi, Qian Feng, Yueqiang Cheng, Mengjia Yan, Peng Li, Heng Yin, Tao Wei:
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets. NDSS 2021 - [c62]Jinghan Wang, Chengyu Song, Heng Yin:
Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing. NDSS 2021 - [c61]Yousra Aafer, Wei You, Yi Sun, Yu Shi, Xiangyu Zhang, Heng Yin:
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing. USENIX Security Symposium 2021: 2759-2776 - [i5]Xuezixiang Li, Qu Yu, Heng Yin:
PalmTree: Learning an Assembly Language Model for Instruction Embedding. CoRR abs/2103.03809 (2021) - 2020
- [c60]Pan Zhang, Chengyu Song, Heng Yin, Deqing Zou, Elaine Shi, Hai Jin:
Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks. ASPLOS 2020: 1263-1276 - [c59]Lei Zhao, Yuncong Zhu, Jiang Ming, Yichen Zhang, Haotian Zhang, Heng Yin:
PatchScope: Memory Object Centric Patch Diffing. CCS 2020: 149-165 - [c58]Qiang Guan, Xunchao Hu, Terence Grove, Bo Fang, Hailong Jiang, Heng Yin, Nathan DeBardeleben:
Chaser: An Enhanced Fault Injection Tool for Tracing Soft Errors in MPI Applications. DSN 2020: 355-363 - [c57]Yue Duan, Xuezixiang Li, Jinghan Wang, Heng Yin:
DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing. NDSS 2020 - [c56]Deshun Dai, Ruixuan Li, Junwei Tang, Ali Davanian, Heng Yin:
Parallel Space Traveling: A Security Analysis of App-Level Virtualization in Android. SACMAT 2020: 25-32 - [c55]Yu Jiang, Ruixuan Li, Junwei Tang, Ali Davanian, Heng Yin:
AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer Learning. SecureComm (2) 2020: 242-253 - [i4]Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin:
Automatic Generation of Adversarial Examples for Interpreting Malware Classifiers. CoRR abs/2003.03100 (2020) - [i3]Jianlei Chi, Yu Qu, Ting Liu, Qinghua Zheng, Heng Yin:
SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning. CoRR abs/2010.10805 (2020)
2010 – 2019
- 2019
- [c54]Lei Zhao, Yue Duan, Heng Yin, Jifeng Xuan:
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. NDSS 2019 - [c53]Jinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song:
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. RAID 2019: 1-15 - [c52]Ali Davanian, Zhenxiao Qi, Yu Qu, Heng Yin:
DECAF++: Elastic Whole-System Dynamic Taint Analysis. RAID 2019: 31-45 - [c51]Yue Duan, Lian Gao, Jie Hu, Heng Yin:
Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications. RAID 2019: 277-292 - [c50]Xunchao Hu, Brian Testa, Heng Yin:
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation. SecureComm (1) 2019: 191-213 - [c49]Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, Limin Sun:
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. USENIX Security Symposium 2019: 1099-1114 - 2018
- [c48]Wei Song, Heng Yin, Chang Liu, Dawn Song:
DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis. CCS 2018: 606-618 - [c47]Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, XiaoFeng Wang:
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation. NDSS 2018 - [c46]Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, Heng Yin:
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis. NDSS 2018 - [c45]Ahmad Darki, Chun-Yu Chuang, Michalis Faloutsos, Zhiyun Qian, Heng Yin:
RARE: A Systematic Augmented Router Emulation for Malware Analysis. PAM 2018: 60-72 - 2017
- [j7]Xudong He, Zhijiang Dong, Heng Yin, Yujian Fu:
A Framework for Developing Cyber-Physical Systems. Int. J. Softw. Eng. Knowl. Eng. 27(9-10): 1361-1386 (2017) - [j6]Andrew Henderson, Lok-Kwong Yan, Xunchao Hu, Aravind Prakash, Heng Yin, Stephen McCamant:
DECAF: A Platform-Neutral Whole-System Dynamic Binary Analysis Platform. IEEE Trans. Software Eng. 43(2): 164-184 (2017) - [c44]Qian Feng, Minghua Wang, Mu Zhang, Rundong Zhou, Andrew Henderson, Heng Yin:
Extracting Conditional Formulas for Cross-Platform Bug Search. AsiaCCS 2017: 346-359 - [c43]Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song:
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection. CCS 2017: 363-376 - [c42]David Korczynski, Heng Yin:
Capturing Malware Propagations with Code Injections and Code-Reuse Attacks. CCS 2017: 1691-1708 - [c41]Xiaorui Pan, Xueqiang Wang, Yue Duan, XiaoFeng Wang, Heng Yin:
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps. NDSS 2017 - [c40]Andrew Henderson, Heng Yin, Guang Jin, Hao Han, Hongmei Deng:
VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices. RAID 2017: 3-25 - [c39]Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, Heng Yin:
JSForce: A Forced Execution Engine for Malicious JavaScript Detection. SecureComm 2017: 704-720 - [c38]Xudong He, Zhijiang Dong, Heng Yin, Yujian Fu:
A Framework for Developing Cyber Physical Systems. SEKE 2017: 236-241 - [i2]Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, Heng Yin:
JSForce: A Forced Execution Engine for Malicious JavaScript Detection. CoRR abs/1701.07860 (2017) - [i1]Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song:
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection. CoRR abs/1708.06525 (2017) - 2016
- [b2]Mu Zhang, Heng Yin:
Android Application Security - A Semantics and Context-Aware Approach. Springer Briefs in Computer Science, Springer 2016, ISBN 978-3-319-47811-1, pp. 1-105 - [c37]Qian Feng, Aravind Prakash, Minghua Wang, Curtis Carmony, Heng Yin:
ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis. AsiaCCS 2016: 11-22 - [c36]Qian Feng, Rundong Zhou, Chengcheng Xu, Yao Cheng, Brian Testa, Heng Yin:
Scalable Graph-based Bug Search for Firmware Images. CCS 2016: 480-491 - [c35]Curtis Carmony, Xunchao Hu, Heng Yin, Abhishek Vasisht Bhaskar, Mu Zhang:
Extract Me If You Can: Abusing PDF Parsers in Malware Detectors. NDSS 2016 - [c34]Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin:
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis. RAID 2016: 254-276 - 2015
- [j5]Aravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin:
On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution. IEEE Trans. Dependable Secur. Comput. 12(5): 557-570 (2015) - [c33]Aravind Prakash, Heng Yin:
Defeating ROP Through Denial of Stack Pivot. ACSAC 2015: 111-120 - [c32]Minghua Wang, Heng Yin, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng:
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries. ACSAC 2015: 331-340 - [c31]Mu Zhang, Yue Duan, Qian Feng, Heng Yin:
Towards Automatic Generation of Security-Centric Descriptions for Android Apps. CCS 2015: 518-529 - [c30]Yue Duan, Mu Zhang, Heng Yin, Yuzhe Tang:
Privacy-Preserving Offloading of Mobile App to the Public Cloud. HotCloud 2015 - [c29]Aravind Prakash, Xunchao Hu, Heng Yin:
vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. NDSS 2015 - 2014
- [j4]Yufei Gu, Yangchun Fu, Aravind Prakash, Zhiqiang Lin, Heng Yin:
Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting. IEEE Trans. Cloud Comput. 2(4): 380-394 (2014) - [c28]Qian Feng, Aravind Prakash, Heng Yin, Zhiqiang Lin:
MACE: high-coverage and robust memory analysis for commodity operating systems. ACSAC 2014: 196-205 - [c27]Xing Jin, Xunchao Hu, Kailiang Ying, Wenliang Du, Heng Yin, Gautam Nagesh Peri:
Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation. CCS 2014: 66-77 - [c26]Mu Zhang, Heng Yin:
Efficient, context-aware privacy leakage confinement for android applications without firmware modding. AsiaCCS 2014: 259-270 - [c25]Mu Zhang, Yue Duan, Heng Yin, Zhiruo Zhao:
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs. CCS 2014: 1105-1116 - [c24]Andrew Henderson, Aravind Prakash, Lok-Kwong Yan, Xunchao Hu, Xujiewen Wang, Rundong Zhou, Heng Yin:
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform. ISSTA 2014: 248-258 - [c23]Mu Zhang, Heng Yin:
AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications. NDSS 2014 - [c22]Xiaolei Li, Guangdong Bai, Benjamin Thian, Zhenkai Liang, Heng Yin:
A Light-Weight Software Environment for Confining Android Malware. SERE (Companion) 2014: 158-167 - 2013
- [b1]Heng Yin, Dawn Song:
Automatic Malware Analysis - An Emulator Based Approach. Springer Briefs in Computer Science, Springer 2013, ISBN 978-1-4614-5522-6, pp. i-ix, 1-73 - [c21]Aravind Prakash, Heng Yin, Zhenkai Liang:
Enforcing system-wide control flow integrity for exploit detection and diagnosis. AsiaCCS 2013: 311-322 - [c20]Aravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin:
Manipulating semantic values in kernel data structures: Attack assessments and implications. DSN 2013: 1-12 - [c19]Xiaolei Li, Guangdong Bai, Zhenkai Liang, Heng Yin:
A Software Environment for Confining Malicious Android Applications via Resource Virtualization. ICECCS 2013: 208-211 - [c18]Mu Zhang, Heng Yin:
TransBlocker: Transforming and Taming Privacy-Breaching Android Applications. NDSS 2013 - [c17]Yousra Aafer, Wenliang Du, Heng Yin:
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. SecureComm 2013: 86-103 - 2012
- [c16]Yufei Gu, Yangchun Fu, Aravind Prakash, Zhiqiang Lin, Heng Yin:
OS-Sommelier: memory-only operating system fingerprinting in the cloud. SoCC 2012: 5 - [c15]Lok-Kwong Yan, Manjukumar Jayachandra, Mu Zhang, Heng Yin:
Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation. NDSS 2012 - [c14]Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang, Heng Yin:
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis. NDSS 2012 - [c13]Lok-Kwong Yan, Heng Yin:
DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. USENIX Security Symposium 2012: 569-584 - [c12]Lok-Kwong Yan, Manjukumar Jayachandra, Mu Zhang, Heng Yin:
V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis. VEE 2012: 227-238 - 2011
- [c11]Tongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, Heng Yin:
Attacks on WebView in the Android system. ACSAC 2011: 343-352 - 2010
- [j3]Heng Yin, Bo Sheng, Haining Wang, Jianping Pan:
Keychain-Based Signatures for Securing BGP. IEEE J. Sel. Areas Commun. 28(8): 1308-1318 (2010) - [c10]Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xiaodong Song:
HookScout: Proactive Binary-Centric Hook Detection. DIMVA 2010: 1-20
2000 – 2009
- 2009
- [c9]Min Gyung Kang, Heng Yin, Steve Hanna, Stephen McCamant, Dawn Song:
Emulating emulation-resistant malware. VMSec@CCS 2009: 11-22 - 2008
- [j2]Mengjun Xie, Heng Yin, Haining Wang:
Thwarting E-mail Spam Laundering. ACM Trans. Inf. Syst. Secur. 12(2): 13:1-13:32 (2008) - [c8]Dawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena:
BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25 - [c7]Heng Yin, Zhenkai Liang, Dawn Song:
HookFinder: Identifying and Understanding Malware Hooking Behaviors. NDSS 2008 - [p1]David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin:
Automatically Identifying Trigger-based Behavior in Malware. Botnet Detection 2008: 65-88 - 2007
- [j1]Heng Yin, Haining Wang:
Building an application-aware IPsec policy system. IEEE/ACM Trans. Netw. 15(6): 1502-1513 (2007) - [c6]Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
Panorama: capturing system-wide information flow for malware detection and analysis. CCS 2007: 116-127 - [c5]Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiaodong Song:
Polyglot: automatic extraction of protocol message format using dynamic binary analysis. CCS 2007: 317-329 - [c4]Heng Yin, Bo Sheng, Haining Wang, Jianping Pan:
Securing BGP through Keychain-based Signatures. IWQoS 2007: 154-163 - [c3]Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song:
Dynamic Spyware Analysis. USENIX ATC 2007: 233-246 - 2006
- [c2]Mengjun Xie, Heng Yin, Haining Wang:
An effective defense against email spam laundering. CCS 2006: 179-190 - 2005
- [c1]Heng Yin, Haining Wang:
Building an Application-aware IPsec Policy System. USENIX Security Symposium 2005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint