Publications

PTAuth: Temporal Memory Safety via Robust Points-to Authentication. Proceedings of the 30th USENIX Security Symposium, USENIX Security, 2021.

Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code. Proceedings of the 30th USENIX Security Symposium, USENIX Security, 2021.

DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. Proceedings of the 42nd IEEE Symposium on Security and Privacy, S&P/Oakland, 2021.

MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID, 2020.

P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling. Proceedings of the 29th USENIX Security Symposium, USENIX Security, 2020.

PDF Code

SAVIOR: Towards Bug-Driven Hybrid Testing. Proceedings of the 41st IEEE Symposium on Security and Privacy, S&P/Oakland, 2020.

PDF Code

OAT: Attesting Operation Integrity of Embedded Devices. Proceedings of the 41st IEEE Symposium on Security and Privacy, S&P/Oakland, 2020.

PDF

Detecting (Absent) App-to-app Authentication on Cross-device Short-distance Channels. Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC, 2019.

PDF

An Analysis of Malware Trends in Enterprise Networks. Proceedings of the 22nd Information Security Conference, ISC, 2019.

StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone. Proceedings of the 2019 USENIX Annual Technical Conference, USENIX ATC, 2019.

PDF

PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. Proceedings of the 14th ACM on Asia Conference on Computer and Communications Security, AsiaCCS, 2019.

PDF Code

TEEv: Virtualizing Trusted Execution Environments on Mobile Platforms. Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE, 2019.

PDF

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. Proceedings of the 27th USENIX Security Symposium, USENIX Security, 2018.

PDF

VButton: Practical Attestation of User-driven Operations in Mobile Apps. Proceedings of the 16th ACM International Conference on Mobile Systems, Applications, and Services, MobiSys, 2018.

PDF

Compiler-assisted Code Randomization and Hardening. Proceedings of the 39th IEEE Symposium on Security and Privacy, S&P/Oakland, 2018.

PDF

InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android. Proceedings of the 2018 Network and Distributed System Security Symposium, NDSS, 2018.

PDF

Norax: Enabling Execute-Only Memory for COTS Binaries on AArch64. Proceedings of the 38th IEEE Symposium on Security and Privacy, S&P/Oakland, 2017.

PDF

Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems. Proceedings of the 12th ACM on Asia Conference on Computer and Communications Security, AsiaCCS, 2017.

PDF

Where is the Weakest Link? A Study on Security Discrepancies between Android Apps and Their Website Counterparts. International Conference on Passive and Active Network Measurement, PAM, 2017.

PDF

CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices. Proceedings of the 14th International Conference on Mobile Systems, Applications, and Services, MobiSys, 2016.

PDF DOI

Shreds: Fine-grained Execution Units with Private Memory. Proceedings of the 37th IEEE Symposium on Security and Privacy, S&P/Oakland, 2016.

PDF DOI

Remix: On-demand Live Randomization. Proceedings of the 6th ACM Conference on Data and Application Security and Privacy, CODASPY, 2016.

PDF DOI

WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers. Proceedings of the 2015 ACM Conference on Computer and Communications Security, CCS, 2015.

PDF DOI

Preventing Use-after-free with Dangling Pointers Nullification. Proceedings of the 2015 Network and Distributed System Security Symposium, NDSS, 2015.

PDF

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. Proceedings of the 2015 Network and Distributed System Security Symposium, NDSS, 2015.

PDF

From Zygote to Morula: Fortifying Weakened ASLR on Android. Proceedings of the 35th IEEE Symposium on Security and Privacy, S&P/Oakland, 2014.

PDF DOI

Jekyll on iOS: When Benign Apps Become Evil. Proceedings of the 22nd USENIX Security Symposium, USENIX Security, 2013.

PDF

Robust Scareware Image Detection. Proceedings of the 38th International Conference on Acoustics, Speech, and Signal Processing, ICASSP, 2012.

CHEX: statically vetting Android apps for component hijacking vulnerabilities. Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS, 2012.

PDF DOI

SURF: detecting and measuring search poisoning. Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS, 2011.

PDF DOI

BLADE: an attack-agnostic approach for preventing drive-by malware infections. Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS, 2010.

PDF DOI

Mapping kernel objects to enable systematic integrity checking. Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS, 2009.

PDF DOI