Semantics-aware android malware classification using weighted contextual api dependency graphs M Zhang, Y Duan, H Yin, Z Zhao Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 614 | 2014 |
DEEPBINDIFF: Learning Program-Wide Code Representations for Binary Diffing Y Duan, X Li, J Wang, H Yin Network and Distributed System Security Symposium (NDSS), 2020 | 178 | 2020 |
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing L Zhao, Y Duan, H Yin, J Xuan Network and Distributed System Security Symposium (NDSS), 2019 | 152 | 2019 |
Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation Y Duan, M Zhang, AV Bhaskar, H Yin, X Pan, T Li, X Wang, XF Wang Network and Distributed System Security Symposium (NDSS), 2018 | 103 | 2018 |
Towards automatic generation of security-centric descriptions for android apps M Zhang, Y Duan, Q Feng, H Yin Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 100 | 2015 |
Be sensitive and collaborative: Analyzing impact of coverage metrics in greybox fuzzing J Wang, Y Duan, W Song, H Yin, C Song 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 90 | 2019 |
Dark hazard: Learning-based, large-scale discovery of hidden sensitive operations in android apps X Pan, X Wang, Y Duan, X Wang, H Yin Network and Distributed System Security Symposium (NDSS), 2017 | 81* | 2017 |
Semantics-aware android malware classification YIN Heng, M Zhang, Y Duan, Z Zhao US Patent App. 14/833,491, 2016 | 45 | 2016 |
Jsforce: A forced execution engine for malicious javascript detection X Hu, Y Cheng, Y Duan, A Henderson, H Yin Security and Privacy in Communication Networks: 13th International …, 2018 | 25 | 2018 |
Privacy-Preserving Offloading of Mobile App to the Public Cloud. Y Duan, M Zhang, H Yin, Y Tang HotCloud 15, 2015 | 14 | 2015 |
Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications Y Duan, X Zhao, Y Pan, S Li, M Li, F Xu, M Zhang Proceedings of the 29nd ACM SIGSAC Conference on Computer and Communications …, 2022 | 13 | 2022 |
Social network based reputation computation and document classification JY Lee, Y Duan, JC Oh, W Du, HA Blair, L Wang, X Jin | 13 | 2012 |
Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains WE Bodell III, S Meisami, Y Duan 32nd USENIX Security Symposium (USENIX Security 23), 2023 | 11 | 2023 |
Automatic reputation computation through document analysis: A social network approach JY Lee, Y Duan, JC Oh, W Du, H Blair, L Wang, X Jin 2011 International Conference on Advances in Social Networks Analysis and …, 2011 | 9 | 2011 |
Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications Y Duan, L Gao, J Hu, H Yin 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 6 | 2019 |
Probabilistic Path Prioritization for Hybrid Fuzzing L Zhao, P Cao, Y Duan, H Yin, J Xuan IEEE Transactions on Dependable and Secure Computing (TDSC), 2022 | 4 | 2022 |
Poster: Privacy-Preserving Offloading of Mobile App to the Public Cloud Y Duan, M Zhang, H Yin, Y Tang Syracuse University, 2015 | 1 | 2015 |
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection S Yan, S Wang, Y Duan, H Hong, K Lee, D Kim, Y Hong 33rd USENIX Security Symposium (USENIX Security 24), 2024 | | 2024 |
Marco: A Stochastic Asynchronous Concolic Explorer J Hu, Y Duan, H Yin 2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE …, 2024 | | 2024 |
SIGMADIFF: Semantics-Aware Deep Graph Matching for Pseudocode Diffing L Gao, Y Qu, S Yu, Y Duan, H Yin Network and Distributed System Security Symposium (NDSS), 2024 | | 2024 |