αdiff: cross-version binary code similarity detection with dnn B Liu, W Huo, C Zhang, W Li, F Li, A Piao, W Zou Proceedings of the 33rd ACM/IEEE international conference on automated …, 2018 | 218 | 2018 |
Libd: Scalable and precise third-party library detection in android markets M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017 | 186 | 2017 |
Level by level: making flow-and context-sensitive pointer analysis scalable for millions of lines of code H Yu, J Xue, W Huo, X Feng, Z Zhang Proceedings of the 8th annual IEEE/ACM international symposium on Code …, 2010 | 142 | 2010 |
{MVP}: Detecting vulnerabilities using {Patch-Enhanced} vulnerability signatures Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu, Y Liu, W Huo, W Zou, ... 29th USENIX Security Symposium (USENIX Security 20), 1165-1182, 2020 | 91 | 2020 |
A large-scale empirical study on vulnerability distribution within projects and the lessons learned B Liu, G Meng, W Zou, Q Gong, F Li, M Lin, D Sun, W Huo, C Zhang Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 47 | 2020 |
SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities Y Zhang, W Huo, K Jian, J Shi, H Lu, L Liu, C Wang, D Sun, C Zhang, ... Proceedings of the 35th annual computer security applications conference …, 2019 | 41 | 2019 |
B2sfinder: Detecting open-source software reuse in cots software Z Yuan, M Feng, F Li, G Ban, Y Xiao, S Wang, Q Tang, H Su, C Yu, J Xu, ... 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 39 | 2019 |
1dvul: Discovering 1-day vulnerabilities through binary patches J Peng, F Li, B Liu, L Xu, B Liu, K Chen, W Huo 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 34 | 2019 |
Sofi: Reflection-augmented fuzzing for javascript engines X He, X Xie, Y Li, J Sun, F Li, W Zou, Y Liu, L Yu, J Zhou, W Shi, W Huo Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 28 | 2021 |
Open-source license violations of binary software at large scale M Feng, W Mao, Z Yuan, Y Xiao, G Ban, W Wang, S Wang, Q Tang, J Xu, ... 2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019 | 18 | 2019 |
Large-scale third-party library detection in android markets M Li, P Wang, W Wang, S Wang, D Wu, J Liu, R Xue, W Huo, W Zou IEEE Transactions on Software Engineering 46 (9), 981-1003, 2018 | 17 | 2018 |
Locating software faults based on minimum debugging frontier set F Li, Z Li, W Huo, X Feng IEEE Transactions on Software Engineering 43 (8), 760-776, 2016 | 17 | 2016 |
Viva: Binary level vulnerability identification via partial signature Y Xiao, Z Xu, W Zhang, C Yu, L Liu, W Zou, Z Yuan, Y Liu, A Piao, W Huo 2021 IEEE International Conference on Software Analysis, Evolution and …, 2021 | 16 | 2021 |
Constructing benchmarks for supporting explainable evaluations of static application security testing tools G Hao, F Li, W Huo, Q Sun, W Wang, X Li, W Zou 2019 International Symposium on Theoretical Aspects of Software Engineering …, 2019 | 12 | 2019 |
B2SMatcher: fine-Grained version identification of open-Source software in binary files G Ban, L Xu, Y Xiao, X Li, Z Yuan, W Huo Cybersecurity 4, 1-21, 2021 | 11 | 2021 |
Can we make it faster? Efficient may-happen-in-parallel analysis revisited C Chen, W Huo, L Li, X Feng, K Xing 2012 13th International Conference on Parallel and Distributed Computing …, 2012 | 10 | 2012 |
Static race detection of interrupt-driven programs W Huo, H Yu, X Feng, Z Zhang Journal of Computer Research and Development 48 (12), 2290-2299, 2011 | 10* | 2011 |
Finding smm privilege-escalation vulnerabilities in uefi firmware with protocol-centric static analysis J Yin, M Li, W Wu, D Sun, J Zhou, W Huo, J Xue 2022 IEEE Symposium on Security and Privacy (SP), 1623-1637, 2022 | 9 | 2022 |
ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities Y Zhang, W Huo, K Jian, J Shi, L Liu, Y Zou, C Zhang, B Liu Cybersecurity 4, 1-22, 2021 | 9 | 2021 |
A light-weight and accurate method of static integer-overflow-to-buffer-overflow vulnerability detection M Xu, S Li, L Xu, F Li, W Huo, J Ma, X Li, Q Huang Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019 | 8 | 2019 |