Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Debin Gao
@inproceedings{DBLP:conf/acisp/Ismail0HG23, author = {Maliha Ismail and Yan Lin and DongGyun Han and Debin Gao}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {BinAlign: Alignment Padding Based Compiler Provenance Recovery}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {609--629}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_26}, doi = {10.1007/978-3-031-35486-1\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Ismail0HG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LinLLMGM23, author = {Ziyi Lin and Jinku Li and Bowen Li and Haoyu Ma and Debin Gao and Jianfeng Ma}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2725--2739}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623214}, doi = {10.1145/3576915.3623214}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LinLLMGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/LiuHTMTGL23, author = {Jiakun Liu and Xing Hu and Ferdian Thung and Shahar Maoz and Eran Toch and Debin Gao and David Lo}, title = {AutoDebloater: Automated Android App Debloating}, booktitle = {38th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2023, Luxembourg, September 11-15, 2023}, pages = {2090--2093}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ASE56229.2023.00017}, doi = {10.1109/ASE56229.2023.00017}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/LiuHTMTGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TianQG0KZ23, author = {Jianwen Tian and Kefan Qiu and Debin Gao and Zhi Wang and Xiaohui Kuang and Gang Zhao}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2689--2706}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/tian}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TianQG0KZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/0003WG23, author = {Yan Lin and Joshua Wong and Debin Gao}, title = {FA\({}^{\mbox{3}}\): Fine-Grained Android Application Analysis}, booktitle = {Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications, HotMobile 2023, Newport Beach, California, February 22-23, 2023}, pages = {74--80}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3572864.3580338}, doi = {10.1145/3572864.3580338}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wmcsa/0003WG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaTGJ22, author = {Haoyu Ma and Jianwen Tian and Debin Gao and Chunfu Jia}, title = {On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3257--3270}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3091159}, doi = {10.1109/TDSC.2021.3091159}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaTGJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaLGJ22, author = {Haoyu Ma and Shijia Li and Debin Gao and Chunfu Jia}, title = {Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3271--3285}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3091654}, doi = {10.1109/TDSC.2021.3091654}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaLGJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaLGWJJ22, author = {Haoyu Ma and Shijia Li and Debin Gao and Daoyuan Wu and Qiaowen Jia and Chunfu Jia}, title = {Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3508--3520}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3100877}, doi = {10.1109/TDSC.2021.3100877}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaLGWJJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/0003G022, author = {Yan Lin and Debin Gao and David Lo}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {107--118}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3511502}, doi = {10.1145/3508398.3511502}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/0003G022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/DuanJSG22, author = {Mulin Duan and Lingxiao Jiang and Lwin Khin Shar and Debin Gao}, title = {UIPDroid: Unrooted Dynamic Monitor of Android App UIs for Fine-Grained Permission Control}, booktitle = {44th {IEEE/ACM} International Conference on Software Engineering: Companion Proceedings, {ICSE} Companion 2022, Pittsburgh, PA, USA, May 22-24, 2022}, pages = {227--231}, publisher = {{ACM/IEEE}}, year = {2022}, url = {https://doi.org/10.1145/3510454.3516844}, doi = {10.1145/3510454.3516844}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/DuanJSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiJQC0G22, author = {Shijia Li and Chunfu Jia and Pengda Qiu and Qiyuan Chen and Jiang Ming and Debin Gao}, title = {Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-210/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LiJQC0G22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-01568, author = {Zicheng Zhang and Daoyuan Wu and Lixiang Li and Debin Gao}, title = {On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps}, journal = {CoRR}, volume = {abs/2209.01568}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.01568}, doi = {10.48550/ARXIV.2209.01568}, eprinttype = {arXiv}, eprint = {2209.01568}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-01568.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/WuGL21, author = {Daoyuan Wu and Debin Gao and David Lo}, title = {Scalable online vetting of Android apps for measuring declared {SDK} versions and their consistency with {API} calls}, journal = {Empir. Softw. Eng.}, volume = {26}, number = {1}, pages = {7}, year = {2021}, url = {https://doi.org/10.1007/s10664-020-09897-6}, doi = {10.1007/S10664-020-09897-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/WuGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/MaTQLGWJB21, author = {Haoyu Ma and Jianwen Tian and Kefan Qiu and David Lo and Debin Gao and Daoyuan Wu and Chunfu Jia and Thar Baker}, title = {Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {8}, pages = {5840--5850}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3038745}, doi = {10.1109/TII.2020.3038745}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/MaTQLGWJB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/WuGDC21, author = {Daoyuan Wu and Debin Gao and Robert H. Deng and Rocky K. C. Chang}, title = {When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {543--554}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00063}, doi = {10.1109/DSN48987.2021.00063}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/WuGDC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mhci/MendelG0T21, author = {Tamir Mendel and Debin Gao and David Lo and Eran Toch}, editor = {Jessica R. Cauchard and Marcos Serrano}, title = {An Exploratory Study of Social Support Systems to Help Older Adults in Managing Mobile Safety}, booktitle = {MobileHCI '21: 23rd International Conference on Mobile Human-Computer Interaction, Toulouse {\&} Virtual Event, France, 27 September 2021 - 1 October 2021}, pages = {30:1--30:13}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3447526.3472047}, doi = {10.1145/3447526.3472047}, timestamp = {Mon, 03 Jan 2022 22:34:17 +0100}, biburl = {https://dblp.org/rec/conf/mhci/MendelG0T21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LinG21, author = {Yan Lin and Debin Gao}, title = {When Function Signature Recovery Meets Compiler Optimization}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {36--52}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00006}, doi = {10.1109/SP40001.2021.00006}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/LinG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2021-1, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12918}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86890-1}, doi = {10.1007/978-3-030-86890-1}, isbn = {978-3-030-86889-5}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2021-2, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1}, doi = {10.1007/978-3-030-88052-1}, isbn = {978-3-030-88051-4}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/MaTGJ20, author = {Haoyu Ma and Jianwen Tian and Debin Gao and Chunfu Jia}, editor = {Willy Susilo and Robert H. Deng and Fuchun Guo and Yannan Li and Rolly Intan}, title = {Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel}, booktitle = {Information Security - 23rd International Conference, {ISC} 2020, Bali, Indonesia, December 16-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12472}, pages = {178--195}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62974-8\_11}, doi = {10.1007/978-3-030-62974-8\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/MaTGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-11527, author = {Daoyuan Wu and Debin Gao and Robert H. Deng and Rocky K. C. Chang}, title = {When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid}, journal = {CoRR}, volume = {abs/2005.11527}, year = {2020}, url = {https://arxiv.org/abs/2005.11527}, eprinttype = {arXiv}, eprint = {2005.11527}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-11527.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/WanBGTXML19, author = {Zhiyuan Wan and Lingfeng Bao and Debin Gao and Eran Toch and Xin Xia and Tamir Mendel and David Lo}, title = {AppMoD: Helping Older Adults Manage Mobile Security with Online Social Help}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {3}, number = {4}, pages = {154:1--154:22}, year = {2019}, url = {https://doi.org/10.1145/3369819}, doi = {10.1145/3369819}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/WanBGTXML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Cheng0GJ19, author = {Xiaoyang Cheng and Yan Lin and Debin Gao and Chunfu Jia}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {155--174}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_8}, doi = {10.1007/978-3-030-21568-2\_8}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/Cheng0GJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0003CG19, author = {Yan Lin and Xiaoyang Cheng and Debin Gao}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Control-Flow Carrying Code}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {3--14}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329815}, doi = {10.1145/3321705.3329815}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0003CG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuGCCJD19, author = {Daoyuan Wu and Debin Gao and Eric K. T. Cheng and Yichen Cao and Jintao Jiang and Robert H. Deng}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Towards Understanding Android System Vulnerabilities: Techniques and Insights}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {295--306}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329831}, doi = {10.1145/3321705.3329831}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WuGCCJD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/ZhangLWJCGWM19, author = {Shiwei Zhang and Weichao Li and Daoyuan Wu and Bo Jin and Rocky K. C. Chang and Debin Gao and Yi Wang and Ricky K. P. Mok}, title = {An empirical study of mobile network behavior and application performance in the wild}, booktitle = {Proceedings of the International Symposium on Quality of Service, IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019}, pages = {4:1--4:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3326285.3329039}, doi = {10.1145/3326285.3329039}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/ZhangLWJCGWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WuGCHCD19, author = {Daoyuan Wu and Debin Gao and Rocky K. C. Chang and En He and Eric K. T. Cheng and Robert H. Deng}, title = {Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/understanding-open-ports-in-android-applications-discovery-diagnosis-and-security-assessment/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WuGCHCD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/LeeRG19, author = {Jehyun Lee and Akshaya Venkateswara Raja and Debin Gao}, title = {SplitSecond: Flexible Privilege Separation of Android Apps}, booktitle = {17th International Conference on Privacy, Security and Trust, {PST} 2019, Fredericton, NB, Canada, August 26-28, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PST47121.2019.8949067}, doi = {10.1109/PST47121.2019.8949067}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/LeeRG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-12982, author = {Daoyuan Wu and Debin Gao and David Lo}, title = {Scalable Online Vetting of Android Apps for Measuring Declared {SDK} Versions and Their Consistency with {API} Calls}, journal = {CoRR}, volume = {abs/1912.12982}, year = {2019}, url = {http://arxiv.org/abs/1912.12982}, eprinttype = {arXiv}, eprint = {1912.12982}, timestamp = {Sat, 04 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-12982.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/WuCGLD18, author = {Daoyuan Wu and Yao Cheng and Debin Gao and Yingjiu Li and Robert H. Deng}, editor = {Ziming Zhao and Gail{-}Joon Ahn and Ram Krishnan and Gabriel Ghinita}, title = {SCLib: {A} Practical and Lightweight Defense against Component Hijacking in Android Applications}, booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {299--306}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3176258.3176336}, doi = {10.1145/3176258.3176336}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/WuCGLD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/LeB0GL18, author = {Tien{-}Duy B. Le and Lingfeng Bao and David Lo and Debin Gao and Li Li}, title = {Towards Mining Comprehensive Android Sandboxes}, booktitle = {23rd International Conference on Engineering of Complex Computer Systems, {ICECCS} 2018, Melbourne, Australia, December 12-14, 2018}, pages = {51--60}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICECCS2018.2018.00014}, doi = {10.1109/ICECCS2018.2018.00014}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/LeB0GL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Tang0WG18, author = {Xiaoxiao Tang and Yan Lin and Daoyuan Wu and Debin Gao}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {212--223}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212504}, doi = {10.1145/3212480.3212504}, timestamp = {Mon, 16 Sep 2019 13:25:53 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Tang0WG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-04372, author = {Daoyuan Wu and Yao Cheng and Debin Gao and Yingjiu Li and Robert H. Deng}, title = {SCLib: {A} Practical and Lightweight Defense against Component Hijacking in Android Applications}, journal = {CoRR}, volume = {abs/1801.04372}, year = {2018}, url = {http://arxiv.org/abs/1801.04372}, eprinttype = {arXiv}, eprint = {1801.04372}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-04372.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LinTG17, author = {Yan Lin and Xiaoxiao Tang and Debin Gao}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {SafeStack {\^{}}+ : Enhanced Dual Stack to Combat Data-Flow Hijacking}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {95--112}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_6}, doi = {10.1007/978-3-319-59870-3\_6}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LinTG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuGR17, author = {Weijie Liu and Debin Gao and Michael K. Reiter}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {On-Demand Time Blurring to Support Side-Channel Defense}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {210--228}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_12}, doi = {10.1007/978-3-319-66399-9\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LiuGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/RajaLG17, author = {Akshaya Venkateswara Raja and Jehyun Lee and Debin Gao}, title = {On Return Oriented Programming Threats in Android Runtime}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {259--267}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00038}, doi = {10.1109/PST.2017.00038}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/RajaLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/WuCLCG17, author = {Daoyuan Wu and Rocky K. C. Chang and Weichao Li and Eric K. T. Cheng and Debin Gao}, editor = {Dilma Da Silva and Bryan Ford}, title = {MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance}, booktitle = {2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {445--457}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/wu}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/usenix/WuCLCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/WuLXLG17, author = {Daoyuan Wu and Ximing Liu and Jiayun Xu and David Lo and Debin Gao}, editor = {Liran Ma and Abdallah Khreishah and Yan Zhang and Mingyuan Yan}, title = {Measuring the Declared {SDK} Versions and Their Consistency with {API} Calls in Android Apps}, booktitle = {Wireless Algorithms, Systems, and Applications - 12th International Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10251}, pages = {678--690}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60033-8\_58}, doi = {10.1007/978-3-319-60033-8\_58}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/wasa/WuLXLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuLXLG17, author = {Daoyuan Wu and Ximing Liu and Jiayun Xu and David Lo and Debin Gao}, title = {Measuring the Declared {SDK} Versions and Their Consistency with {API} Calls in Android Apps}, journal = {CoRR}, volume = {abs/1702.04872}, year = {2017}, url = {http://arxiv.org/abs/1702.04872}, eprinttype = {arXiv}, eprint = {1702.04872}, timestamp = {Sat, 15 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuLXLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuCLCG17, author = {Daoyuan Wu and Rocky K. C. Chang and Weichao Li and Eric K. T. Cheng and Debin Gao}, title = {MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance}, journal = {CoRR}, volume = {abs/1703.07551}, year = {2017}, url = {http://arxiv.org/abs/1703.07551}, eprinttype = {arXiv}, eprint = {1703.07551}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuCLCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangLKHTG16, author = {Lina Wang and Weijie Liu and Neeraj Kumar and Debiao He and Cheng Tan and Debin Gao}, title = {A novel covert channel detection method in cloud based on {XSRM} and improved event association algorithm}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3543--3557}, year = {2016}, url = {https://doi.org/10.1002/sec.1560}, doi = {10.1002/SEC.1560}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangLKHTG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaLYJG16, author = {Haoyu Ma and Ruiqi Li and Xiaoxu Yu and Chunfu Jia and Debin Gao}, title = {Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2322--2337}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2555287}, doi = {10.1109/TIFS.2016.2555287}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaLYJG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalduzziGGGA16, author = {Marco Balduzzi and Payas Gupta and Lion Gu and Debin Gao and Mustaque Ahamad}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {MobiPot: Understanding Mobile Telephony Threats with Honeycards}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {723--734}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897890}, doi = {10.1145/2897845.2897890}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BalduzziGGGA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/TangLMLG16, author = {Xiaoxiao Tang and Yu Liang and Xinjie Ma and Yan Lin and Debin Gao}, editor = {Seokhie Hong and Jong Hwan Park}, title = {On the Effectiveness of Code-Reuse-Based Android Application Obfuscation}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {333--349}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_18}, doi = {10.1007/978-3-319-53177-9\_18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/TangLMLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LinTGF16, author = {Yan Lin and Xiaoxiao Tang and Debin Gao and Jianming Fu}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Control Flow Integrity Enforcement with Dynamic Code Optimization}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {366--385}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_22}, doi = {10.1007/978-3-319-45871-7\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/LinTGF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuGLD16, author = {Daoyuan Wu and Debin Gao and Yingjiu Li and Robert H. Deng}, title = {SecComp: Towards Practically Defending Against Component Hijacking in Android Applications}, journal = {CoRR}, volume = {abs/1609.03322}, year = {2016}, url = {http://arxiv.org/abs/1609.03322}, eprinttype = {arXiv}, eprint = {1609.03322}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuGLD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuLCG16, author = {Daoyuan Wu and Weichao Li and Rocky K. C. Chang and Debin Gao}, title = {MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic}, journal = {CoRR}, volume = {abs/1610.01282}, year = {2016}, url = {http://arxiv.org/abs/1610.01282}, eprinttype = {arXiv}, eprint = {1610.01282}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuLCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaLMZJG15, author = {Haoyu Ma and Kangjie Lu and Xinjie Ma and Haining Zhang and Chunfu Jia and Debin Gao}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Software Watermarking using Return-Oriented Programming}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {369--380}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714582}, doi = {10.1145/2714576.2714582}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MaLMZJG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/LiGR15, author = {Peng Li and Debin Gao and Michael K. Reiter}, title = {Replica Placement for Availability in the Worst Case}, booktitle = {35th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015}, pages = {599--608}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICDCS.2015.67}, doi = {10.1109/ICDCS.2015.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/LiGR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiangMWTGPJZ15, author = {Yu Liang and Xinjie Ma and Daoyuan Wu and Xiaoxiao Tang and Debin Gao and Guojun Peng and Chunfu Jia and Huanguo Zhang}, editor = {Soonhak Kwon and Aaram Yun}, title = {Stack Layout Randomization with Minimal Rewriting of Android Binaries}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {229--245}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_15}, doi = {10.1007/978-3-319-30840-1\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiangMWTGPJZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiGR14, author = {Peng Li and Debin Gao and Michael K. Reiter}, title = {StopWatch: {A} Cloud Architecture for Timing Channel Mitigation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {2}, pages = {8:1--8:28}, year = {2014}, url = {https://doi.org/10.1145/2670940}, doi = {10.1145/2670940}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LuXG14, author = {Kangjie Lu and Siyang Xiong and Debin Gao}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {RopSteg: program steganography with return oriented programming}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {265--272}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557572}, doi = {10.1145/2557547.2557572}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/LuXG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/TeyGMG14, author = {Chee Meng Tey and Payas Gupta and Kartik Muralidharan and Debin Gao}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {Keystroke biometrics: the user perspective}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {289--296}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557573}, doi = {10.1145/2557547.2557573}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/TeyGMG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MaMLHGJ14, author = {Haoyu Ma and Xinjie Ma and Weijie Liu and Zhipeng Huang and Debin Gao and Chunfu Jia}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Control Flow Obfuscation Using Neural Network to Fight Concolic Testing}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {287--304}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_21}, doi = {10.1007/978-3-319-23829-6\_21}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/MaMLHGJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HanKYBDGLZ13, author = {Jin Han and Su Mon Kywe and Qiang Yan and Feng Bao and Robert H. Deng and Debin Gao and Yingjiu Li and Jianying Zhou}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Launching Generic Attacks on iOS with Approved Third-Party Applications}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {272--289}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_17}, doi = {10.1007/978-3-642-38980-1\_17}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/HanKYBDGLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TeyGGZ13, author = {Chee Meng Tey and Payas Gupta and Debin Gao and Yan Zhang}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Keystroke Timing Analysis of on-the-fly Web Apps}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {405--413}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_25}, doi = {10.1007/978-3-642-38980-1\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/TeyGGZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuptaGJG13, author = {Payas Gupta and Swapna Gottipati and Jing Jiang and Debin Gao}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Your love is public now: questioning the use of personal information in authentication}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {49--60}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484319}, doi = {10.1145/2484313.2484319}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuptaGJG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiGR13, author = {Peng Li and Debin Gao and Michael K. Reiter}, title = {Mitigating access-driven timing channels in clouds using StopWatch}, booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSN.2013.6575299}, doi = {10.1109/DSN.2013.6575299}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LiGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TeyG13, author = {Chee Meng Tey and Debin Gao}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {Defending against Heap Overflow by Using Randomization in Nested Virtual Clusters}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {1--16}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_1}, doi = {10.1007/978-3-319-02726-5\_1}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/TeyG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HanYGZD13, author = {Jin Han and Qiang Yan and Debin Gao and Jianying Zhou and Robert H. Deng}, title = {Comparing Mobile Privacy Protection through Cross-Platform Applications}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/comparing-mobile-privacy-protection-through-cross-platform-applications}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HanYGZD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/TeyGG13, author = {Chee Meng Tey and Payas Gupta and Debin Gao}, title = {I can be You: Questioning the use of Keystroke Dynamics as Biometrics}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/i-can-be-you-questioning-use-keystroke-dynamics-biometrics}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/TeyGG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aamas/WilliamsonVHG12, author = {Simon Andrew Williamson and Pradeep Varakantham and Ong Chen Hui and Debin Gao}, editor = {Wiebe van der Hoek and Lin Padgham and Vincent Conitzer and Michael Winikoff}, title = {Active malware analysis using stochastic games}, booktitle = {International Conference on Autonomous Agents and Multiagent Systems, {AAMAS} 2012, Valencia, Spain, June 4-8, 2012 {(3} Volumes)}, pages = {29--36}, publisher = {{IFAAMAS}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2343580}, timestamp = {Tue, 30 Aug 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aamas/WilliamsonVHG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuptaDG12, author = {Payas Gupta and Xuhua Ding and Debin Gao}, editor = {Heung Youl Youm and Yoojae Won}, title = {Coercion resistance in authentication responsibility shifting}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {97--98}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414512}, doi = {10.1145/2414456.2414512}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuptaDG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimGHOHPG12, author = {Tiffany Hyun{-}Jin Kim and Payas Gupta and Jun Han and Emmanuel Owusu and Jason I. Hong and Adrian Perrig and Debin Gao}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {{OTO:} online trust oracle for user-centric trust establishment}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {391--403}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382239}, doi = {10.1145/2382196.2382239}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KimGHOHPG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MingPG12, author = {Jiang Ming and Meng Pan and Debin Gao}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {iBinHunt: Binary Hunting with Inter-procedural Control Flow}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {92--109}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_8}, doi = {10.1007/978-3-642-37682-5\_8}, timestamp = {Wed, 23 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MingPG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhaoGW12, author = {Lei Zhao and Debin Gao and Lina Wang}, editor = {Dieter Gollmann and Felix C. Freiling}, title = {Learning Fine-Grained Structured Input for Memory Corruption Detection}, booktitle = {Information Security - 15th International Conference, {ISC} 2012, Passau, Germany, September 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7483}, pages = {151--167}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33383-5\_10}, doi = {10.1007/978-3-642-33383-5\_10}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/ZhaoGW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/GuptaWRLGB12, author = {Payas Gupta and Tan Kiat Wee and Narayan Ramasubbu and David Lo and Debin Gao and Rajesh Krishna Balan}, title = {HuMan: Creating memorable fingerprints of mobile users}, booktitle = {Tenth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2012, March 19-23, 2012, Lugano, Switzerland, Workshop Proceedings}, pages = {479--482}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PerComW.2012.6197540}, doi = {10.1109/PERCOMW.2012.6197540}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/GuptaWRLGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuZWG11, author = {Kangjie Lu and Dabi Zou and Weiping Wen and Debin Gao}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {deRop: removing return-oriented programming from malware}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {363--372}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076784}, doi = {10.1145/2076732.2076784}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LuZWG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangMJG11, author = {Zhi Wang and Jiang Ming and Chunfu Jia and Debin Gao}, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {Linear Obfuscation to Combat Symbolic Execution}, booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, pages = {210--226}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2\_12}, doi = {10.1007/978-3-642-23822-2\_12}, timestamp = {Wed, 23 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangMJG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MingZG11, author = {Jiang Ming and Haibin Zhang and Debin Gao}, editor = {Pierangela Samarati and Sara Foresti and Jiankun Hu and Giovanni Livraga}, title = {Towards ground truthing observations in gray-box anomaly detection}, booktitle = {5th International Conference on Network and System Security, {NSS} 2011, Milan, Italy, September 6-8, 2011}, pages = {25--32}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNSS.2011.6059956}, doi = {10.1109/ICNSS.2011.6059956}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/MingZG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LuZWG11, author = {Kangjie Lu and Dabi Zou and Weiping Wen and Debin Gao}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Packed, Printable, and Polymorphic Return-Oriented Programming}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {101--120}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_6}, doi = {10.1007/978-3-642-23644-0\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/LuZWG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/HanYDG11, author = {Jin Han and Qiang Yan and Robert H. Deng and Debin Gao}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {On Detection of Erratic Arguments}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {172--189}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_10}, doi = {10.1007/978-3-642-31909-9\_10}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/HanYDG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuHGJZ11, author = {Limin Liu and Jin Han and Debin Gao and Jiwu Jing and Daren Zha}, title = {Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {37--44}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.9}, doi = {10.1109/TRUSTCOM.2011.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuHGJZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HanPGP10, author = {Jin Han and Meng Pan and Debin Gao and HweeHwa Pang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {A multi-user steganographic file system on untrusted shared storage}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {317--326}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920309}, doi = {10.1145/1920261.1920309}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HanPGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WangCG10, author = {Zhi Wang and Renquan Cheng and Debin Gao}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {Revisiting Address Space Randomization}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {207--221}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_14}, doi = {10.1007/978-3-642-24209-0\_14}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/WangCG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiLGR10, author = {Peng Li and Limin Liu and Debin Gao and Michael K. Reiter}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {On Challenges in Evaluating Malware Clustering}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {238--255}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_13}, doi = {10.1007/978-3-642-15512-3\_13}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LiLGR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GuptaG10, author = {Payas Gupta and Debin Gao}, title = {Fighting Coercion Attacks in Key Generation using Skin Conductance}, booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}, pages = {469--484}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/sec10/tech/full\_papers/Gupta.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GuptaG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaoRS09, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, title = {Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {2}, pages = {96--110}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.39}, doi = {10.1109/TDSC.2008.39}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GaoRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/HanGD09, author = {Jin Han and Debin Gao and Robert H. Deng}, editor = {Ulrich Flegel and Danilo Bruschi}, title = {On the Effectiveness of Software Diversity: {A} Systematic Study on Real-World Vulnerabilities}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5587}, pages = {127--146}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02918-9\_8}, doi = {10.1007/978-3-642-02918-9\_8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/HanGD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiuMWGJ09, author = {Limin Liu and Jiang Ming and Zhi Wang and Debin Gao and Chunfu Jia}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {Denial-of-Service Attacks on Host-Based Generic Unpackers}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {241--253}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_19}, doi = {10.1007/978-3-642-11145-7\_19}, timestamp = {Wed, 23 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiuMWGJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiGR09, author = {Peng Li and Debin Gao and Michael K. Reiter}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Automatically Adapting a Trained Anomaly Detector to Software Patches}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {142--160}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_8}, doi = {10.1007/978-3-642-04342-0\_8}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LiGR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiPGF08, author = {Peng Li and Hyundo Park and Debin Gao and Jianming Fu}, title = {Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {392--401}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.17}, doi = {10.1109/ACSAC.2008.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiPGF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/GaoRS08, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {BinHunt: Automatically Finding Semantic Differences in Binary Programs}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {238--255}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_16}, doi = {10.1007/978-3-540-88625-9\_16}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/GaoRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ParkLGLD08, author = {Hyundo Park and Peng Li and Debin Gao and Heejo Lee and Robert H. Deng}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {Distinguishing between {FE} and DDoS Using Randomness Check}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {131--145}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_9}, doi = {10.1007/978-3-540-85886-7\_9}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/ParkLGLD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GaoRS06, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Behavioral Distance Measurement Using Hidden Markov Models}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {19--40}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_2}, doi = {10.1007/11856214\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/GaoRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GaoRS05, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Behavioral Distance for Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {63--81}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_4}, doi = {10.1007/11663812\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/GaoRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaoRS04, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Gray-box extraction of execution graphs for anomaly detection}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {318--329}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030126}, doi = {10.1145/1030083.1030126}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GaoRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GaoRS04, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, editor = {Matt Blaze}, title = {On Gray-Box Program Tracking for Anomaly Detection}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, pages = {103--118}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/gao.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GaoRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.