BibTeX records: Debin Gao

download as .bib file

@inproceedings{DBLP:conf/acisp/Ismail0HG23,
  author       = {Maliha Ismail and
                  Yan Lin and
                  DongGyun Han and
                  Debin Gao},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {BinAlign: Alignment Padding Based Compiler Provenance Recovery},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {609--629},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_26},
  doi          = {10.1007/978-3-031-35486-1\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Ismail0HG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LinLLMGM23,
  author       = {Ziyi Lin and
                  Jinku Li and
                  Bowen Li and
                  Haoyu Ma and
                  Debin Gao and
                  Jianfeng Ma},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {TypeSqueezer: When Static Recovery of Function Signatures for Binary
                  Executables Meets Dynamic Analysis},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2725--2739},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623214},
  doi          = {10.1145/3576915.3623214},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LinLLMGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/LiuHTMTGL23,
  author       = {Jiakun Liu and
                  Xing Hu and
                  Ferdian Thung and
                  Shahar Maoz and
                  Eran Toch and
                  Debin Gao and
                  David Lo},
  title        = {AutoDebloater: Automated Android App Debloating},
  booktitle    = {38th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2023, Luxembourg, September 11-15, 2023},
  pages        = {2090--2093},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ASE56229.2023.00017},
  doi          = {10.1109/ASE56229.2023.00017},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/LiuHTMTGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TianQG0KZ23,
  author       = {Jianwen Tian and
                  Kefan Qiu and
                  Debin Gao and
                  Zhi Wang and
                  Xiaohui Kuang and
                  Gang Zhao},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor
                  Attacks},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {2689--2706},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/tian},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TianQG0KZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/0003WG23,
  author       = {Yan Lin and
                  Joshua Wong and
                  Debin Gao},
  title        = {FA\({}^{\mbox{3}}\): Fine-Grained Android Application Analysis},
  booktitle    = {Proceedings of the 24th International Workshop on Mobile Computing
                  Systems and Applications, HotMobile 2023, Newport Beach, California,
                  February 22-23, 2023},
  pages        = {74--80},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3572864.3580338},
  doi          = {10.1145/3572864.3580338},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wmcsa/0003WG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaTGJ22,
  author       = {Haoyu Ma and
                  Jianwen Tian and
                  Debin Gao and
                  Chunfu Jia},
  title        = {On the Effectiveness of Using Graphics Interrupt as a Side Channel
                  for User Behavior Snooping},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3257--3270},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3091159},
  doi          = {10.1109/TDSC.2021.3091159},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaTGJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaLGJ22,
  author       = {Haoyu Ma and
                  Shijia Li and
                  Debin Gao and
                  Chunfu Jia},
  title        = {Secure Repackage-Proofing Framework for Android Apps Using Collatz
                  Conjecture},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3271--3285},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3091654},
  doi          = {10.1109/TDSC.2021.3091654},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaLGJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaLGWJJ22,
  author       = {Haoyu Ma and
                  Shijia Li and
                  Debin Gao and
                  Daoyuan Wu and
                  Qiaowen Jia and
                  Chunfu Jia},
  title        = {Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3508--3520},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3100877},
  doi          = {10.1109/TDSC.2021.3100877},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaLGWJJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/0003G022,
  author       = {Yan Lin and
                  Debin Gao and
                  David Lo},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {ReSIL: Revivifying Function Signature Inference using Deep Learning
                  with Domain-Specific Knowledge},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {107--118},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3511502},
  doi          = {10.1145/3508398.3511502},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/0003G022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/DuanJSG22,
  author       = {Mulin Duan and
                  Lingxiao Jiang and
                  Lwin Khin Shar and
                  Debin Gao},
  title        = {UIPDroid: Unrooted Dynamic Monitor of Android App UIs for Fine-Grained
                  Permission Control},
  booktitle    = {44th {IEEE/ACM} International Conference on Software Engineering:
                  Companion Proceedings, {ICSE} Companion 2022, Pittsburgh, PA, USA,
                  May 22-24, 2022},
  pages        = {227--231},
  publisher    = {{ACM/IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510454.3516844},
  doi          = {10.1145/3510454.3516844},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/DuanJSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiJQC0G22,
  author       = {Shijia Li and
                  Chunfu Jia and
                  Pengda Qiu and
                  Qiyuan Chen and
                  Jiang Ming and
                  Debin Gao},
  title        = {Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-210/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LiJQC0G22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-01568,
  author       = {Zicheng Zhang and
                  Daoyuan Wu and
                  Lixiang Li and
                  Debin Gao},
  title        = {On the Usability (In)Security of In-App Browsing Interfaces in Mobile
                  Apps},
  journal      = {CoRR},
  volume       = {abs/2209.01568},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.01568},
  doi          = {10.48550/ARXIV.2209.01568},
  eprinttype    = {arXiv},
  eprint       = {2209.01568},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-01568.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/WuGL21,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  David Lo},
  title        = {Scalable online vetting of Android apps for measuring declared {SDK}
                  versions and their consistency with {API} calls},
  journal      = {Empir. Softw. Eng.},
  volume       = {26},
  number       = {1},
  pages        = {7},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10664-020-09897-6},
  doi          = {10.1007/S10664-020-09897-6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/WuGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/MaTQLGWJB21,
  author       = {Haoyu Ma and
                  Jianwen Tian and
                  Kefan Qiu and
                  David Lo and
                  Debin Gao and
                  Daoyuan Wu and
                  Chunfu Jia and
                  Thar Baker},
  title        = {Deep-Learning-Based App Sensitive Behavior Surveillance for Android
                  Powered Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {8},
  pages        = {5840--5850},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3038745},
  doi          = {10.1109/TII.2020.3038745},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/MaTQLGWJB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WuGDC21,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Robert H. Deng and
                  Rocky K. C. Chang},
  title        = {When Program Analysis Meets Bytecode Search: Targeted and Efficient
                  Inter-procedural Analysis of Modern Android Apps in BackDroid},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {543--554},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00063},
  doi          = {10.1109/DSN48987.2021.00063},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WuGDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mhci/MendelG0T21,
  author       = {Tamir Mendel and
                  Debin Gao and
                  David Lo and
                  Eran Toch},
  editor       = {Jessica R. Cauchard and
                  Marcos Serrano},
  title        = {An Exploratory Study of Social Support Systems to Help Older Adults
                  in Managing Mobile Safety},
  booktitle    = {MobileHCI '21: 23rd International Conference on Mobile Human-Computer
                  Interaction, Toulouse {\&} Virtual Event, France, 27 September
                  2021 - 1 October 2021},
  pages        = {30:1--30:13},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447526.3472047},
  doi          = {10.1145/3447526.3472047},
  timestamp    = {Mon, 03 Jan 2022 22:34:17 +0100},
  biburl       = {https://dblp.org/rec/conf/mhci/MendelG0T21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LinG21,
  author       = {Yan Lin and
                  Debin Gao},
  title        = {When Function Signature Recovery Meets Compiler Optimization},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {36--52},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00006},
  doi          = {10.1109/SP40001.2021.00006},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LinG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2021-1,
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12918},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86890-1},
  doi          = {10.1007/978-3-030-86890-1},
  isbn         = {978-3-030-86889-5},
  timestamp    = {Tue, 21 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2021-2,
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12919},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88052-1},
  doi          = {10.1007/978-3-030-88052-1},
  isbn         = {978-3-030-88051-4},
  timestamp    = {Tue, 21 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/MaTGJ20,
  author       = {Haoyu Ma and
                  Jianwen Tian and
                  Debin Gao and
                  Chunfu Jia},
  editor       = {Willy Susilo and
                  Robert H. Deng and
                  Fuchun Guo and
                  Yannan Li and
                  Rolly Intan},
  title        = {Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based
                  Side Channel},
  booktitle    = {Information Security - 23rd International Conference, {ISC} 2020,
                  Bali, Indonesia, December 16-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12472},
  pages        = {178--195},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62974-8\_11},
  doi          = {10.1007/978-3-030-62974-8\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/MaTGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-11527,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Robert H. Deng and
                  Rocky K. C. Chang},
  title        = {When Program Analysis Meets Bytecode Search: Targeted and Efficient
                  Inter-procedural Analysis of Modern Android Apps in BackDroid},
  journal      = {CoRR},
  volume       = {abs/2005.11527},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.11527},
  eprinttype    = {arXiv},
  eprint       = {2005.11527},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-11527.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/WanBGTXML19,
  author       = {Zhiyuan Wan and
                  Lingfeng Bao and
                  Debin Gao and
                  Eran Toch and
                  Xin Xia and
                  Tamir Mendel and
                  David Lo},
  title        = {AppMoD: Helping Older Adults Manage Mobile Security with Online Social
                  Help},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {3},
  number       = {4},
  pages        = {154:1--154:22},
  year         = {2019},
  url          = {https://doi.org/10.1145/3369819},
  doi          = {10.1145/3369819},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imwut/WanBGTXML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Cheng0GJ19,
  author       = {Xiaoyang Cheng and
                  Yan Lin and
                  Debin Gao and
                  Chunfu Jia},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {155--174},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_8},
  doi          = {10.1007/978-3-030-21568-2\_8},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/Cheng0GJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0003CG19,
  author       = {Yan Lin and
                  Xiaoyang Cheng and
                  Debin Gao},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Control-Flow Carrying Code},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329815},
  doi          = {10.1145/3321705.3329815},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0003CG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuGCCJD19,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Eric K. T. Cheng and
                  Yichen Cao and
                  Jintao Jiang and
                  Robert H. Deng},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Towards Understanding Android System Vulnerabilities: Techniques and
                  Insights},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {295--306},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329831},
  doi          = {10.1145/3321705.3329831},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WuGCCJD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/ZhangLWJCGWM19,
  author       = {Shiwei Zhang and
                  Weichao Li and
                  Daoyuan Wu and
                  Bo Jin and
                  Rocky K. C. Chang and
                  Debin Gao and
                  Yi Wang and
                  Ricky K. P. Mok},
  title        = {An empirical study of mobile network behavior and application performance
                  in the wild},
  booktitle    = {Proceedings of the International Symposium on Quality of Service,
                  IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019},
  pages        = {4:1--4:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3326285.3329039},
  doi          = {10.1145/3326285.3329039},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/ZhangLWJCGWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WuGCHCD19,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Rocky K. C. Chang and
                  En He and
                  Eric K. T. Cheng and
                  Robert H. Deng},
  title        = {Understanding Open Ports in Android Applications: Discovery, Diagnosis,
                  and Security Assessment},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/understanding-open-ports-in-android-applications-discovery-diagnosis-and-security-assessment/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WuGCHCD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/LeeRG19,
  author       = {Jehyun Lee and
                  Akshaya Venkateswara Raja and
                  Debin Gao},
  title        = {SplitSecond: Flexible Privilege Separation of Android Apps},
  booktitle    = {17th International Conference on Privacy, Security and Trust, {PST}
                  2019, Fredericton, NB, Canada, August 26-28, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PST47121.2019.8949067},
  doi          = {10.1109/PST47121.2019.8949067},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/LeeRG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-12982,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  David Lo},
  title        = {Scalable Online Vetting of Android Apps for Measuring Declared {SDK}
                  Versions and Their Consistency with {API} Calls},
  journal      = {CoRR},
  volume       = {abs/1912.12982},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.12982},
  eprinttype    = {arXiv},
  eprint       = {1912.12982},
  timestamp    = {Sat, 04 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-12982.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/WuCGLD18,
  author       = {Daoyuan Wu and
                  Yao Cheng and
                  Debin Gao and
                  Yingjiu Li and
                  Robert H. Deng},
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {SCLib: {A} Practical and Lightweight Defense against Component Hijacking
                  in Android Applications},
  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {299--306},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176258.3176336},
  doi          = {10.1145/3176258.3176336},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/WuCGLD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/LeB0GL18,
  author       = {Tien{-}Duy B. Le and
                  Lingfeng Bao and
                  David Lo and
                  Debin Gao and
                  Li Li},
  title        = {Towards Mining Comprehensive Android Sandboxes},
  booktitle    = {23rd International Conference on Engineering of Complex Computer Systems,
                  {ICECCS} 2018, Melbourne, Australia, December 12-14, 2018},
  pages        = {51--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICECCS2018.2018.00014},
  doi          = {10.1109/ICECCS2018.2018.00014},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/LeB0GL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Tang0WG18,
  author       = {Xiaoxiao Tang and
                  Yan Lin and
                  Daoyuan Wu and
                  Debin Gao},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Towards Dynamically Monitoring Android Applications on Non-rooted
                  Devices in the Wild},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {212--223},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212504},
  doi          = {10.1145/3212480.3212504},
  timestamp    = {Mon, 16 Sep 2019 13:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Tang0WG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-04372,
  author       = {Daoyuan Wu and
                  Yao Cheng and
                  Debin Gao and
                  Yingjiu Li and
                  Robert H. Deng},
  title        = {SCLib: {A} Practical and Lightweight Defense against Component Hijacking
                  in Android Applications},
  journal      = {CoRR},
  volume       = {abs/1801.04372},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.04372},
  eprinttype    = {arXiv},
  eprint       = {1801.04372},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-04372.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LinTG17,
  author       = {Yan Lin and
                  Xiaoxiao Tang and
                  Debin Gao},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {SafeStack {\^{}}+ : Enhanced Dual Stack to Combat Data-Flow Hijacking},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {95--112},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_6},
  doi          = {10.1007/978-3-319-59870-3\_6},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LinTG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuGR17,
  author       = {Weijie Liu and
                  Debin Gao and
                  Michael K. Reiter},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {On-Demand Time Blurring to Support Side-Channel Defense},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {210--228},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_12},
  doi          = {10.1007/978-3-319-66399-9\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/RajaLG17,
  author       = {Akshaya Venkateswara Raja and
                  Jehyun Lee and
                  Debin Gao},
  title        = {On Return Oriented Programming Threats in Android Runtime},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {259--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00038},
  doi          = {10.1109/PST.2017.00038},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/RajaLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/WuCLCG17,
  author       = {Daoyuan Wu and
                  Rocky K. C. Chang and
                  Weichao Li and
                  Eric K. T. Cheng and
                  Debin Gao},
  editor       = {Dilma Da Silva and
                  Bryan Ford},
  title        = {MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance},
  booktitle    = {2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa
                  Clara, CA, USA, July 12-14, 2017},
  pages        = {445--457},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/wu},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/WuCLCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/WuLXLG17,
  author       = {Daoyuan Wu and
                  Ximing Liu and
                  Jiayun Xu and
                  David Lo and
                  Debin Gao},
  editor       = {Liran Ma and
                  Abdallah Khreishah and
                  Yan Zhang and
                  Mingyuan Yan},
  title        = {Measuring the Declared {SDK} Versions and Their Consistency with {API}
                  Calls in Android Apps},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 12th International
                  Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10251},
  pages        = {678--690},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60033-8\_58},
  doi          = {10.1007/978-3-319-60033-8\_58},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/WuLXLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuLXLG17,
  author       = {Daoyuan Wu and
                  Ximing Liu and
                  Jiayun Xu and
                  David Lo and
                  Debin Gao},
  title        = {Measuring the Declared {SDK} Versions and Their Consistency with {API}
                  Calls in Android Apps},
  journal      = {CoRR},
  volume       = {abs/1702.04872},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.04872},
  eprinttype    = {arXiv},
  eprint       = {1702.04872},
  timestamp    = {Sat, 15 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuLXLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuCLCG17,
  author       = {Daoyuan Wu and
                  Rocky K. C. Chang and
                  Weichao Li and
                  Eric K. T. Cheng and
                  Debin Gao},
  title        = {MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance},
  journal      = {CoRR},
  volume       = {abs/1703.07551},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.07551},
  eprinttype    = {arXiv},
  eprint       = {1703.07551},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuCLCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangLKHTG16,
  author       = {Lina Wang and
                  Weijie Liu and
                  Neeraj Kumar and
                  Debiao He and
                  Cheng Tan and
                  Debin Gao},
  title        = {A novel covert channel detection method in cloud based on {XSRM} and
                  improved event association algorithm},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3543--3557},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1560},
  doi          = {10.1002/SEC.1560},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangLKHTG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaLYJG16,
  author       = {Haoyu Ma and
                  Ruiqi Li and
                  Xiaoxu Yu and
                  Chunfu Jia and
                  Debin Gao},
  title        = {Integrated Software Fingerprinting via Neural-Network-Based Control
                  Flow Obfuscation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {10},
  pages        = {2322--2337},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2555287},
  doi          = {10.1109/TIFS.2016.2555287},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaLYJG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalduzziGGGA16,
  author       = {Marco Balduzzi and
                  Payas Gupta and
                  Lion Gu and
                  Debin Gao and
                  Mustaque Ahamad},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {MobiPot: Understanding Mobile Telephony Threats with Honeycards},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {723--734},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897890},
  doi          = {10.1145/2897845.2897890},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BalduzziGGGA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TangLMLG16,
  author       = {Xiaoxiao Tang and
                  Yu Liang and
                  Xinjie Ma and
                  Yan Lin and
                  Debin Gao},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {On the Effectiveness of Code-Reuse-Based Android Application Obfuscation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {333--349},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_18},
  doi          = {10.1007/978-3-319-53177-9\_18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/TangLMLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LinTGF16,
  author       = {Yan Lin and
                  Xiaoxiao Tang and
                  Debin Gao and
                  Jianming Fu},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Control Flow Integrity Enforcement with Dynamic Code Optimization},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {366--385},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_22},
  doi          = {10.1007/978-3-319-45871-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LinTGF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuGLD16,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Yingjiu Li and
                  Robert H. Deng},
  title        = {SecComp: Towards Practically Defending Against Component Hijacking
                  in Android Applications},
  journal      = {CoRR},
  volume       = {abs/1609.03322},
  year         = {2016},
  url          = {http://arxiv.org/abs/1609.03322},
  eprinttype    = {arXiv},
  eprint       = {1609.03322},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuGLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuLCG16,
  author       = {Daoyuan Wu and
                  Weichao Li and
                  Rocky K. C. Chang and
                  Debin Gao},
  title        = {MopEye: Monitoring Per-app Network Performance with Zero Measurement
                  Traffic},
  journal      = {CoRR},
  volume       = {abs/1610.01282},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.01282},
  eprinttype    = {arXiv},
  eprint       = {1610.01282},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuLCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaLMZJG15,
  author       = {Haoyu Ma and
                  Kangjie Lu and
                  Xinjie Ma and
                  Haining Zhang and
                  Chunfu Jia and
                  Debin Gao},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Software Watermarking using Return-Oriented Programming},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {369--380},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714582},
  doi          = {10.1145/2714576.2714582},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MaLMZJG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/LiGR15,
  author       = {Peng Li and
                  Debin Gao and
                  Michael K. Reiter},
  title        = {Replica Placement for Availability in the Worst Case},
  booktitle    = {35th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015},
  pages        = {599--608},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICDCS.2015.67},
  doi          = {10.1109/ICDCS.2015.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/LiGR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiangMWTGPJZ15,
  author       = {Yu Liang and
                  Xinjie Ma and
                  Daoyuan Wu and
                  Xiaoxiao Tang and
                  Debin Gao and
                  Guojun Peng and
                  Chunfu Jia and
                  Huanguo Zhang},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {Stack Layout Randomization with Minimal Rewriting of Android Binaries},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {229--245},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_15},
  doi          = {10.1007/978-3-319-30840-1\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiangMWTGPJZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiGR14,
  author       = {Peng Li and
                  Debin Gao and
                  Michael K. Reiter},
  title        = {StopWatch: {A} Cloud Architecture for Timing Channel Mitigation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {8:1--8:28},
  year         = {2014},
  url          = {https://doi.org/10.1145/2670940},
  doi          = {10.1145/2670940},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LuXG14,
  author       = {Kangjie Lu and
                  Siyang Xiong and
                  Debin Gao},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {RopSteg: program steganography with return oriented programming},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {265--272},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557572},
  doi          = {10.1145/2557547.2557572},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/LuXG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/TeyGMG14,
  author       = {Chee Meng Tey and
                  Payas Gupta and
                  Kartik Muralidharan and
                  Debin Gao},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {Keystroke biometrics: the user perspective},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {289--296},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557573},
  doi          = {10.1145/2557547.2557573},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/TeyGMG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MaMLHGJ14,
  author       = {Haoyu Ma and
                  Xinjie Ma and
                  Weijie Liu and
                  Zhipeng Huang and
                  Debin Gao and
                  Chunfu Jia},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Control Flow Obfuscation Using Neural Network to Fight Concolic Testing},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {287--304},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_21},
  doi          = {10.1007/978-3-319-23829-6\_21},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/MaMLHGJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HanKYBDGLZ13,
  author       = {Jin Han and
                  Su Mon Kywe and
                  Qiang Yan and
                  Feng Bao and
                  Robert H. Deng and
                  Debin Gao and
                  Yingjiu Li and
                  Jianying Zhou},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Launching Generic Attacks on iOS with Approved Third-Party Applications},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {272--289},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_17},
  doi          = {10.1007/978-3-642-38980-1\_17},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/HanKYBDGLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TeyGGZ13,
  author       = {Chee Meng Tey and
                  Payas Gupta and
                  Debin Gao and
                  Yan Zhang},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Keystroke Timing Analysis of on-the-fly Web Apps},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {405--413},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_25},
  doi          = {10.1007/978-3-642-38980-1\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/TeyGGZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuptaGJG13,
  author       = {Payas Gupta and
                  Swapna Gottipati and
                  Jing Jiang and
                  Debin Gao},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Your love is public now: questioning the use of personal information
                  in authentication},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484319},
  doi          = {10.1145/2484313.2484319},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuptaGJG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiGR13,
  author       = {Peng Li and
                  Debin Gao and
                  Michael K. Reiter},
  title        = {Mitigating access-driven timing channels in clouds using StopWatch},
  booktitle    = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSN.2013.6575299},
  doi          = {10.1109/DSN.2013.6575299},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LiGR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TeyG13,
  author       = {Chee Meng Tey and
                  Debin Gao},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {Defending against Heap Overflow by Using Randomization in Nested Virtual
                  Clusters},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_1},
  doi          = {10.1007/978-3-319-02726-5\_1},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/TeyG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HanYGZD13,
  author       = {Jin Han and
                  Qiang Yan and
                  Debin Gao and
                  Jianying Zhou and
                  Robert H. Deng},
  title        = {Comparing Mobile Privacy Protection through Cross-Platform Applications},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/comparing-mobile-privacy-protection-through-cross-platform-applications},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HanYGZD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/TeyGG13,
  author       = {Chee Meng Tey and
                  Payas Gupta and
                  Debin Gao},
  title        = {I can be You: Questioning the use of Keystroke Dynamics as Biometrics},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/i-can-be-you-questioning-use-keystroke-dynamics-biometrics},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/TeyGG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aamas/WilliamsonVHG12,
  author       = {Simon Andrew Williamson and
                  Pradeep Varakantham and
                  Ong Chen Hui and
                  Debin Gao},
  editor       = {Wiebe van der Hoek and
                  Lin Padgham and
                  Vincent Conitzer and
                  Michael Winikoff},
  title        = {Active malware analysis using stochastic games},
  booktitle    = {International Conference on Autonomous Agents and Multiagent Systems,
                  {AAMAS} 2012, Valencia, Spain, June 4-8, 2012 {(3} Volumes)},
  pages        = {29--36},
  publisher    = {{IFAAMAS}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2343580},
  timestamp    = {Tue, 30 Aug 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aamas/WilliamsonVHG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuptaDG12,
  author       = {Payas Gupta and
                  Xuhua Ding and
                  Debin Gao},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Coercion resistance in authentication responsibility shifting},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {97--98},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414512},
  doi          = {10.1145/2414456.2414512},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuptaDG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimGHOHPG12,
  author       = {Tiffany Hyun{-}Jin Kim and
                  Payas Gupta and
                  Jun Han and
                  Emmanuel Owusu and
                  Jason I. Hong and
                  Adrian Perrig and
                  Debin Gao},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {{OTO:} online trust oracle for user-centric trust establishment},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {391--403},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382239},
  doi          = {10.1145/2382196.2382239},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KimGHOHPG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MingPG12,
  author       = {Jiang Ming and
                  Meng Pan and
                  Debin Gao},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {iBinHunt: Binary Hunting with Inter-procedural Control Flow},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {92--109},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_8},
  doi          = {10.1007/978-3-642-37682-5\_8},
  timestamp    = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MingPG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhaoGW12,
  author       = {Lei Zhao and
                  Debin Gao and
                  Lina Wang},
  editor       = {Dieter Gollmann and
                  Felix C. Freiling},
  title        = {Learning Fine-Grained Structured Input for Memory Corruption Detection},
  booktitle    = {Information Security - 15th International Conference, {ISC} 2012,
                  Passau, Germany, September 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7483},
  pages        = {151--167},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33383-5\_10},
  doi          = {10.1007/978-3-642-33383-5\_10},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ZhaoGW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/GuptaWRLGB12,
  author       = {Payas Gupta and
                  Tan Kiat Wee and
                  Narayan Ramasubbu and
                  David Lo and
                  Debin Gao and
                  Rajesh Krishna Balan},
  title        = {HuMan: Creating memorable fingerprints of mobile users},
  booktitle    = {Tenth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland,
                  Workshop Proceedings},
  pages        = {479--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PerComW.2012.6197540},
  doi          = {10.1109/PERCOMW.2012.6197540},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/GuptaWRLGB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuZWG11,
  author       = {Kangjie Lu and
                  Dabi Zou and
                  Weiping Wen and
                  Debin Gao},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {deRop: removing return-oriented programming from malware},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {363--372},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076784},
  doi          = {10.1145/2076732.2076784},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LuZWG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangMJG11,
  author       = {Zhi Wang and
                  Jiang Ming and
                  Chunfu Jia and
                  Debin Gao},
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {Linear Obfuscation to Combat Symbolic Execution},
  booktitle    = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  pages        = {210--226},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2\_12},
  doi          = {10.1007/978-3-642-23822-2\_12},
  timestamp    = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangMJG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MingZG11,
  author       = {Jiang Ming and
                  Haibin Zhang and
                  Debin Gao},
  editor       = {Pierangela Samarati and
                  Sara Foresti and
                  Jiankun Hu and
                  Giovanni Livraga},
  title        = {Towards ground truthing observations in gray-box anomaly detection},
  booktitle    = {5th International Conference on Network and System Security, {NSS}
                  2011, Milan, Italy, September 6-8, 2011},
  pages        = {25--32},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNSS.2011.6059956},
  doi          = {10.1109/ICNSS.2011.6059956},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/MingZG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LuZWG11,
  author       = {Kangjie Lu and
                  Dabi Zou and
                  Weiping Wen and
                  Debin Gao},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Packed, Printable, and Polymorphic Return-Oriented Programming},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {101--120},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_6},
  doi          = {10.1007/978-3-642-23644-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LuZWG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/HanYDG11,
  author       = {Jin Han and
                  Qiang Yan and
                  Robert H. Deng and
                  Debin Gao},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {On Detection of Erratic Arguments},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {172--189},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_10},
  doi          = {10.1007/978-3-642-31909-9\_10},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/HanYDG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuHGJZ11,
  author       = {Limin Liu and
                  Jin Han and
                  Debin Gao and
                  Jiwu Jing and
                  Daren Zha},
  title        = {Launching Return-Oriented Programming Attacks against Randomized Relocatable
                  Executables},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {37--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.9},
  doi          = {10.1109/TRUSTCOM.2011.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuHGJZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HanPGP10,
  author       = {Jin Han and
                  Meng Pan and
                  Debin Gao and
                  HweeHwa Pang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {A multi-user steganographic file system on untrusted shared storage},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {317--326},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920309},
  doi          = {10.1145/1920261.1920309},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HanPGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WangCG10,
  author       = {Zhi Wang and
                  Renquan Cheng and
                  Debin Gao},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {Revisiting Address Space Randomization},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {207--221},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_14},
  doi          = {10.1007/978-3-642-24209-0\_14},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WangCG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiLGR10,
  author       = {Peng Li and
                  Limin Liu and
                  Debin Gao and
                  Michael K. Reiter},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {On Challenges in Evaluating Malware Clustering},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {238--255},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_13},
  doi          = {10.1007/978-3-642-15512-3\_13},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LiLGR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GuptaG10,
  author       = {Payas Gupta and
                  Debin Gao},
  title        = {Fighting Coercion Attacks in Key Generation using Skin Conductance},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {469--484},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Gupta.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GuptaG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GaoRS09,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  title        = {Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based
                  Behavioral Distance},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {6},
  number       = {2},
  pages        = {96--110},
  year         = {2009},
  url          = {https://doi.org/10.1109/TDSC.2008.39},
  doi          = {10.1109/TDSC.2008.39},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GaoRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/HanGD09,
  author       = {Jin Han and
                  Debin Gao and
                  Robert H. Deng},
  editor       = {Ulrich Flegel and
                  Danilo Bruschi},
  title        = {On the Effectiveness of Software Diversity: {A} Systematic Study on
                  Real-World Vulnerabilities},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5587},
  pages        = {127--146},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02918-9\_8},
  doi          = {10.1007/978-3-642-02918-9\_8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/HanGD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiuMWGJ09,
  author       = {Limin Liu and
                  Jiang Ming and
                  Zhi Wang and
                  Debin Gao and
                  Chunfu Jia},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Denial-of-Service Attacks on Host-Based Generic Unpackers},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {241--253},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_19},
  doi          = {10.1007/978-3-642-11145-7\_19},
  timestamp    = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiuMWGJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiGR09,
  author       = {Peng Li and
                  Debin Gao and
                  Michael K. Reiter},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Automatically Adapting a Trained Anomaly Detector to Software Patches},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {142--160},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_8},
  doi          = {10.1007/978-3-642-04342-0\_8},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LiGR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiPGF08,
  author       = {Peng Li and
                  Hyundo Park and
                  Debin Gao and
                  Jianming Fu},
  title        = {Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly
                  Detection},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {392--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.17},
  doi          = {10.1109/ACSAC.2008.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiPGF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/GaoRS08,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {BinHunt: Automatically Finding Semantic Differences in Binary Programs},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {238--255},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_16},
  doi          = {10.1007/978-3-540-88625-9\_16},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/GaoRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ParkLGLD08,
  author       = {Hyundo Park and
                  Peng Li and
                  Debin Gao and
                  Heejo Lee and
                  Robert H. Deng},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Distinguishing between {FE} and DDoS Using Randomness Check},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {131--145},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_9},
  doi          = {10.1007/978-3-540-85886-7\_9},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ParkLGLD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GaoRS06,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Behavioral Distance Measurement Using Hidden Markov Models},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {19--40},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_2},
  doi          = {10.1007/11856214\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GaoRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GaoRS05,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Behavioral Distance for Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {63--81},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_4},
  doi          = {10.1007/11663812\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GaoRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaoRS04,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Gray-box extraction of execution graphs for anomaly detection},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {318--329},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030126},
  doi          = {10.1145/1030083.1030126},
  timestamp    = {Fri, 13 Nov 2020 16:10:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GaoRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GaoRS04,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  editor       = {Matt Blaze},
  title        = {On Gray-Box Program Tracking for Anomaly Detection},
  booktitle    = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  pages        = {103--118},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/sec04/tech/gao.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GaoRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics