-
Notifications
You must be signed in to change notification settings - Fork 4
/
publications.html
156 lines (156 loc) · 10.8 KB
/
publications.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>NUS CuriOSity</title>
<link rel="icon" href="assets/favicon.ico" type="image/x-icon">
<link rel="stylesheet" href="css/style.css">
</head>
<body>
<header>
<img src="assets/logo-curiosity.png" alt="Lab Logo" class="logo">
<h1 class="lab-name">Research Group</h1>
</header>
<nav>
<ul>
<li><a href="index.html">Home</a></li>
<li><a href="news.html">News</a></li>
<li><a href="people.html">People</a></li>
<li><a href="publications.html">Publications</a></li>
<li><a href="projects.html">Projects</a></li>
<li><a href="contact.html">Contact</a></li>
</ul>
</nav>
<div class="container">
<main>
<h2 class="larger-h2">Publication List</h2>
<div class="publications-container">
<div class="publication">
<h3 class="paper-title">UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications</h3>
<p class="authors">Jiawei Li*, Jiahao Liu*, Jian Mao, Jun Zeng, and Zhenkai Liang.</p>
<p class="publisher">In the 32nd Network and Distributed System Security Symposium, 2025.</p>
</div>
<div class="publication">
<h3 class="paper-title">The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches</h3>
<p class="authors">Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Zhenkai Liang, and Hai Jin.</p>
<p class="publisher">In Proceedings of the 31th ACM Conference on Computer and Communications Security, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">MaskDroid: Robust Android Malware Detection with Masked Graph Representations</h3>
<p class="authors">Jingnan Zheng*, Jiahao Liu*, An Zhang, Jun Zeng, Ziqi Yang, Zhenkai Liang, and Tat-Seng Chua.</p>
<p class="publisher">In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">VulZoo: A Comprehensive Vulnerability Intelligence Dataset</h3>
<p class="authors">Bonan Ruan, Jiahao Liu, Weibo Zhao, Zhenkai Liang.</p>
<p class="publisher">In the 39th IEEE/ACM International Conference on Automated Software Engineering, Tool Demonstrations, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning</h3>
<p class="authors">Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, Zhenkai Liang</p>
<p class="publisher">In the 27th International Symposium on Research in Attacks, Intrusions and Defenses, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities</h3>
<p class="authors">Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang.</p>
<p class="publisher">In the 27th International Symposium on Research in Attacks, Intrusions and Defenses, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">UIHASH: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation</h3>
<p class="authors">Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 33rd USENIX Security Symposium, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation</h3>
<p class="authors">Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland Yap, Zhenkai Liang, Manuel Rigger.</p>
<p class="publisher">In Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">Evaluating Disassembly Ground Truth Through Dynamic Tracing</h3>
<p class="authors">Lambang Akbar, Yuancheng Jiang, Roland Yap, Zhenkai Liang, Zhuohao Liu.</p>
<p class="publisher">In the Workshop on Binary Analysis Research co-located with NDSS Symposium, 2024.</p>
</div>
<div class="publication">
<h3 class="paper-title">Learning Graph-based Code Representations for Source-level Functional Similarity Detection</h3>
<p class="authors">Jiahao Liu*, Jun Zeng*, Xiang Wang and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 45th International Conference on Software Engineering, 2023.</p>
</div>
<div class="publication">
<h3 class="paper-title">PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability</h3>
<p class="authors">Jun Zeng*, Chuqi Zhang*, and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 29th ACM Conference on Computer and Communications Security, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation</h3>
<p class="authors">Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, and Abhik Roychoudhury.</p>
<p class="publisher">In Proceedings of the 31st USENIX Security Symposium, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">TeLL: Log Level Suggestions via Modeling Multi-level Code Block Information</h3>
<p class="authors">Jiahao Liu, Jun Zeng, Xiang Wang, Kaihang Ji, and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records</h3>
<p class="authors">Jun Zeng, Xiang Wang, Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, and Zheng Leong Chua.</p>
<p class="publisher">In Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">Extensible Virtual Call Integrity</h3>
<p class="authors">Yuancheng Jiang, Gregory J. Duck, Roland Yap, Zhenkai Liang, Pinghai Yuan.</p>
<p class="publisher">In the 27th European Symposium on Research in Computer Security, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports</h3>
<p class="authors">Zhenyuan Li, Jun Zeng, Yan Chen, and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 27th European Symposium on Research in Computer Security, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">RecIPE: Revisiting the Evaluation of Memory Error Defenses</h3>
<p class="authors">Yuancheng Jiang, Roland Yap, Zhenkai Liang, Hubert Rosier.</p>
<p class="publisher">In the 17th ACM ASIA Conference on Computer and Communications Security, 2022.</p>
</div>
<div class="publication">
<h3 class="paper-title">Watson: Abstracting Behaviors from Audit logs via Aggregation of Contextual Semantics</h3>
<p class="authors">Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, and Jian Mao.</p>
<p class="publisher">In Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021.</p>
</div>
<div class="publication">
<h3 class="paper-title">Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment</h3>
<p class="authors">Ziqi Yang, Jiyi Zhang, Ee-Chien Chang, and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019.</p>
</div>
<div class="publication">
<h3 class="paper-title">One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.</h3>
<p class="authors"> Zheng Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, and Purui Su.</p>
<p class="publisher">In NDSS, 2019.</p>
</div>
<div class="publication">
<h3 class="paper-title">Neural Nets Can Learn Function Type Signatures From Binaries</h3>
<p class="authors">Zheng Leong Chua, Shiqi Shen, Prateek Saxena, and Zhenkai Liang.</p>
<p class="publisher">In 26th USENIX Security Symposium, 2017.</p>
</div>
<div class="publication">
<h3 class="paper-title">"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing</h3>
<p class="authors">Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, and Zhenkai Liang.</p>
<p class="publisher">In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016.</p>
</div>
<div class="publication">
<h3 class="paper-title">Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks</h3>
<p class="authors">Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang.</p>
<p class="publisher">In 2016 IEEE Symposium on Security and Privacy, 2016.</p>
</div>
<div class="publication">
<h3 class="paper-title">Automatic Generation of Data-Oriented Exploits</h3>
<p class="authors">Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, and Zhenkai Liang.</p>
<p class="publisher">In 24th USENIX Security Symposium, 2015.</p>
</div>
</main>
</div>
<footer>
<p>© 2024 CuriOSity Research Group. All rights reserved.</p>
</footer>
<script src="js/script.js"></script>
</body>
</html>