NDSS |
Shengwei An, Guanhong Tao, Qiuling Xu, Yingqi Liu, Guangyu Shen, Yuan Yao, Jingwei Xu, Xiangyu Zhang, MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity Proceedings of the 29th Network and Distributed System Security Symposium |
NDSS |
Hongjun Choi, Zhiyuan Cheng, Xiangyu Zhang, RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning Proceedings of the 29th Network and Distributed System Security Symposium |
SECURITY |
Fei Wang,Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer , Improving IoT Security via Formalized Protocol Customization USENIX Security |
S&P |
Guanhong Tao, Yingqi Liu, Guangyu Shen, Qiuling Xu, Shengwei An, Zhuo Zhang, Xiangyu Zhang, Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security Proceedings of the 43rd IEEE Symposiums on Security and Privacy |
ESE |
Y Tian, S Ma, M Wen, Y Liu, SC Cheung, X Zhang, To What Extent Do DNN-based Image Classification Models Make Unreliable Inferences? Empirical Software Engineering |
ICML |
G Shen, Y Liu, G Tao, S An, Q Xu, S Cheng, S Ma, X Zhang , Backdoor Scanning for Deep Neural Networks through K-Arm Optimization ICML |
FSE |
M Yan, J Chen, X Zhang, L Tan, G Wang, Z Wang, Exposing Numerical Bugs in Deep Learning via Gradient Back-propagation Foundations of Software Engineering |
FSE |
Sayali Kate, Michael Chinn, Hongjun Choi, Xiangyu Zhang, PHYSFRAME: Type Checking Physical Frames of Reference for Robotic Systems Foundations of Software Engineering |
ICSE |
Xincheng He, Lei Xu, Xiangyu Zhang,
Rui Hao,
Yang Feng,
Baowen Xu, PyART: Python API Recommendation in Real-Time Proceedings of the International Conference on Software Engineering |
AAAI |
Siyuan Cheng, Yingqi Liu, Shiqing Ma, Xiangyu Zhang, Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification Proceedings of the 35th AAAI Conference on Artificial Intelligence |
AAAI |
Qiuling Xu , Guanhong Tao , Siyuan Cheng and Xiangyu Zhang, Towards Feature Space Adversarial Attack Proceedings of the 35th AAAI Conference on Artificial Intelligence |
SECURITY |
Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Greg Walkup, Celik Berkay, Xiangyu Zhang, ATLAS: A Sequence-based Learning Approach for Attack Investigation The 30th USENIX Security Symposium |
SECURITY |
Y. Aafer, W. You, Y. Sun, Y. Shi, X. Zhang, and H. Yin, Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing The 30th USENIX Security Symposium |
S&P |
Zhuo Zhang, Wei You, Guanhong Tao, Yousra Aafer, Xuwei Liu, Xiangyu Zhang, StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting Proceedings of the 42th IEEE Symposiums on Security and Privacy |
S&P |
Zhuo Zhang, Yapeng Ye, Wei You, Guanhong Tao, Wen-chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang, OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary Proceedings of the 42th IEEE Symposiums on Security and Privacy |
NDSS |
Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu, NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces Proceedings of the 28th Network and Distributed System Security Symposium |
NDSS |
Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela Ciocarlie, Vinod Yegneswaran, Ashish Gehani, ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation Proceedings of the 28th Network and Distributed System Security Symposium |
RAID |
Hongjun Choi, Sayali Kate, Yousra Affer, Xinagyu Zhang, Dongyan Xu,, Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses |
OOPSLA |
Hongyu Liu, Sam Silvestro, Xiangyu Zhang, Jian Huang, Tongping Liu, WATCHER: In-Situ Failure Diagnosis Proceedings of Object Oriented Programming, Systems, Languages and Applications |
FSE |
Juan Zhai,
Yu Shi,
Minxue Pan,
Guian Zhou,
Yongxiang Liu,
Chunrong Fang,
Shiqing Ma,
Lin Tan,
Xiangyu Zhang, C2S: translating natural language comments to formal program specifications Proceedings of the 2020 ACM SIGSOFT International Symposium on the Foundations of Software Engineering |
FSE |
Shenao Yan, Guanhong Tao, Xuwei Liu, Juan Zhai, Shiqing Ma, Lei Xu, Xiangyu Zhang, Correlations Between Deep Neural Network Model Coverage Criteria and Model Quality Proceedings of the 2020 ACM SIGSOFT International Symposium on the Foundations of Software Engineering |
SECURITY |
Taegyu Kim,
Chung Hwan Kim,
Fan Fei,
Zhan Tu,
Xiangyu Zhang,
Xinyan Deng,
Dongyan Xu,
Dave (Jing) Tian, From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with Mayday The 29th USENIX Security Symposium |
CCS |
Junyu Lin,
Lei Xu,
Yingqi Liu,
Xiangyu Zhang, Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features Proceedings of the 27th ACM Conference on Computer and Communications Security |
CCS |
Hongjun Choi, Saylai Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Cyber-Physical Inconsistency Vulnerability Idnetification for Safety Checks in Robotic Vehicles Proceedings of the 27th ACM Conference on Computer and Communications Security |
NDSS |
Runqing Yang, Shiqing Ma, Haitao Xu, Xiangyu Zhang, Yan Chen, UISCOPE: Accurate, Instrumentation-free and Visible Attack Investigation for GUI Applications Proceedings of the 27th Network and Distributed System Security Symposium |
ICSE |
Hao Xia, Yuan Zhang, Yingtian Zhou, Xiaoting Chen, Yang Wang, Xiangyu Zhang, Shuaishuai Cui, Geng Hong, Xiaohan Zhang, Min Yang, Zhemin Yang, How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale Study Proceedings of the International Conference on Software Engineering |
ICSE |
Guanhong Tao, Shiqing Ma, Yingqi Liu, Qiuling Xu, Xiangyu Zhang, TRADER: Trace Divergence Analysis and Embedding Regulation for Debugging Recurrent Neural Networks Proceedings of the International Conference on Software Engineering |
ICSE |
Juan Zhai, Xiangzhe Xu, Yu Shi, Guanhong Tao, Minxue Pan, Shiqing Ma, Lei Xu, Weifeng Zhang, Lin Tan, Xiangyu Zhang, CPC: Automatically Classifying and Propagating Natural Language Comments via Program Analysis Proceedings of the International Conference on Software Engineering |
ICSE |
Wanwangying Ma, Lin Chen, Xiangyu Zhang, Yang Feng, Zhaogui Xu, Zhifei Chen, Yuming Zhou, Baowen Xu, Impact Analysis of Cross-Project Bugs on Software Ecosystems Proceedings of the International Conference on Software Engineering |
ICSE |
I Luk Kim, Yunhui Zheng,
Hogun Park,
Weihang Wang, Wei You, Yousra Aafer,
Xiangyu Zhang, Finding Client-side Business Flow Tampering Vulnerabilities Proceedings of the International Conference on Software Engineering |
S&P |
Wei You, Zhuo Zhang, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Makena Harmon, Xiangyu Zhang, PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning Proceedings of the 41th IEEE Symposiums on Security and Privacy |
CCS |
Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang, ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation Proceedings of the 26th ACM Conference on Computer and Communications Security |
OOPSLA |
Zhuo Zhang, Wei You, Guanhong Tao, Guannan Wei, Yonghwi Kwon, Xiangyu Zhang, BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation Proceedings of Object Oriented Programming, Systems, Languages and Applications, ACM SIGPLAN Distinguished Paper Award |
SECURITY |
T Kim, C. H. Kim, F. Fei, Z. Tu, G. Walkup, X. Zhang, X. Deng, D. Xu, RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing ,USENIX Security |
PLDI |
David M. Perry, Dohyeong Kim, Roopsha Samanta, and Xiangyu Zhang
, SemCluster: Clustering of Imperative Programming Assignments Based on Quantitative Semantic Features Proceedings of ACM SIGPLAN Conference on Programming Languages Design and Implementation |
PLDI |
Wen-Chuan Lee, Peng Liu, Yingqi Liu, Shiqing Ma, and Xiangyu Zhang
, Programming Support for Autonomizing Software Proceedings of ACM SIGPLAN Conference on Programming Languages Design and Implementation |
ICSE |
Wei You, Xuwei Liu, Shiqing Ma, David Perry, Xiangyu Zhang, Bin Liang
, SLF: Fuzzing without Valid Seed Inputs Proceedings of the 41st ACM/IEEE Internatinoal Conference on Software Engineering |
ICSE |
Kenneth Miller, Yonghwi Kwon, Xiangyu Zhang, Zhiqiang Lin, Probabilistic Disassembly Proceedings of the 41st ACM/IEEE Internatinoal Conference on Software Engineering |
S&P |
Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, Bin
Liang, ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery Proceedings of the 40th IEEE Symposiums on Security and Privacy (Oakland) |
NDSS |
Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, Xiangyu Zhang, NIC: Detecting Adversarial Samples with Neural Network Invariant Checking Proceedings of Network and Distributed System Security Symposium |
CGO |
Wen-Chuan Lee, Yingqi Liu, Peng Liu, Shiqing Ma, Hongjun Choi, Xiangyu Zhang, Rajiv Gupta, White-Box Program Tuning Proceedings of the International Symposium on Code Generation and Optimization |
NIPS |
G Tao, S Ma, Y Liu, X Zhang, Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples Proceedings of Advances in Neural Information Processing Systems |
ACSAC |
F Wang, Y Kwon, S Ma, X Zhang, D Xu, Lprov: Practical Library-aware Provenance Tracing Proceedings of the 33rd Annual Computer Security Applications Conference |
FSE |
Shiqing Ma, Yingqi Liu, Wen-Chuan Lee, Xiangyu Zhang, Ananth Grama, ,MODE: automated neural network model debugging via state differential analysis and input selection Proceedings of Foundations of Software Engineering |
FSE |
Sayali Kate, John-Paul Ore, Xiangyu Zhang, Sebastian G. Elbaum, Zhaogui Xu, Phys: probabilistic physical unit assignment and inconsistency detection, Proceedings of Foundations of Software Engineering |
CCS |
Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu,
Xinyan Deng, Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach, Proceedings of the ACM Conference on Computer and Communications Security |
CCS |
Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li, Precise Android API Protection Mapping Derivation and Reasoning, Proceedings of the ACM Conference on Computer and Communications Security |
WWW |
I Luk Kim, W Wang, Y Kwon, Y Zheng, Y Aafer, W Meng, X Zhang, AdBudgetKiller: Online Advertising Budget Draining Attack, Proceedings of the Intertional Conference on World Wide Web |
ATC |
S Ma, J Zhai, Y Kwon, K.H. Lee, X Zhang, G Ciocarlie, A Gehani, Vinod Yegneswaran, Dongyan
Xu, Somesh Jha, Kernel-Supported Cost-Effective Audit Logging for Causality Tracking, Proceedings of the USENIX Annual Technical Conference |
ASE |
Z Tang, J Zhai, M Pan, Y Aafer, S Ma, X Zhang, J Zhao, Dual-force: understanding WebView malware via cross-language forced execution, Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering |
ICSE |
Z Xu, S Ma, X Zhang, S Zhu, B Xu, Debugging with intelligence via probabilistic inference, Proceedings of the 40th International Conference on Software Engineering |
COMPSAC |
C Sun, J Jia, H Liu, X Zhang, A Lightweight Program Dependence Based Approach to Concurrent Mutation Analysis, Proceedings of the IEEE 42nd Annual Computer Software and Applications Conference |
ICRA |
Fan Fei, Zhan Tu, Ruikun Yu, Taegyu Kim, Xiangyu Zhang, Dongyan Xu, Xinyan Deng,
, Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks, Proceedings of the IEEE International Conference on Robotics and Automation |
NDSS |
Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma,
Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran
, MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation, Proceedings of Network and Distributed System Security Symposium |
NDSS |
Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha I. Ali-Gombe, Xiangyu Zhang,
Dongyan Xu, Golden G. Richard III, Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images, Proceedings of Network and Distributed System Security Symposium |
NDSS |
Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, Chen Tian, AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection, Proceedings of Network and Distributed System Security Symposium |
NDSS |
C.H. Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu, Securing real-time microcontroller systems through customized memory view switching, Proceedings of Network and Distributed System Security Symposium |
NDSS |
Y Liu, S Ma, Y Aafer, W.C. Lee, J Zhai,W. Wang, X Zhang, Trojaning attack on neural networks, Proceedings of Network and Distributed System Security Symposium |
ACSAC |
H Chen, N Li, W Enck, Y Aafer, X Zhang, Analysis of SEAndroid Policies: Combining MAC and DAC in Android, Proceedings of the 33rd Annual Computer Security Applications Conference |
ACSAC |
Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu
Zhang, Dongyan Xu, RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications, Proceedings of the 33rd Annual Computer Security Applications Conference |
ASE |
W Wang, Y Kwon, Y Zheng, Y Aafer, I Kim, WC Lee, Y Liu, W Meng, PAD: Programming third-party web advertisement censorship, Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering |
ASE |
J Huang, Y Aafer, D Perry, X Zhang, C Tian, UI driven Android application reduction, Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering |
FSE |
S Ma, Y Aafer, Z Xu, WC Lee, J Zhai, Y Liu, X Zhang, LAMP: data provenance for graph based machine learning algorithms through derivative computation, Proceedings of Foundations of Software Engineering |
SECURITY |
S Ma, J Zhai, F Wang, KH Lee, X Zhang, D Xu, MPI: Multiple perspective attack investigation with semantics aware execution partitioning, Proceedings of USENIX Security (Distinguished Paper Award) |
ISSTA |
Y Kwon, W Wang, Y Zheng, X Zhang, D Xu, CPR: cross platform binary code reuse via platform independent trace program, Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis |
ISSTA |
D. Perry, A Mattavelli, X Zhang, C Cadar, Accelerating array constraints in symbolic execution, Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis |
ICSE |
P Liu, X Zhang, M Pistoia, Y Zheng, M Marques, L Zeng, Automatic text input generation for mobile testing, Proceedings of IEEE/ACM 39th International Conference on Software Engineering |
ICSE |
W Ma, L Chen, X Zhang, Y Zhou, B Xu, How Do Developers Fix Cross-Project Correlated Bugs? A Case Study on the GitHub Scientific Python Ecosystem, Proceedings of IEEE/ACM 39th International Conference on Software Engineering |
WWW |
K Kim, I. L. Kim, C.H. Kim, Y Kwon, Y Zheng, X Zhang, D Xu, J-force: Forced execution on javascript, Proceedings of the 26th International Conference on World Wide Web , |
RV |
Zachary Benavides, Rajiv Gupta, Xiangyu Zhang, Annotation Guided Collection of Context- Sensitive Parallel Execution Profiles, Proceedings of Runtime Verification , |
NDSS |
Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, K.H. Lee, X. Zhang, D. Xu, A2C: Self destructing exploit executions via input perturbation, Proceedings of Network and Distributed System Security Symposium , |
HPDC |
Zachary Benavides, Rajiv Gupta, Xiangyu Zhang, Parallel execution profiles Proceedings of the 25th ACM International Symposium on High-Performance Parallel and Distributed Computing , |
OOPSLA |
Dohyeong Kim, Yonghwi Kwon, Peng Liu, I Luk Kim, David Mitchel Perry, Xiangyu Zhang,
Gustavo Rodriguez-Rivera, Apex: automatic programming assignment error explanation ,Proceedings of Object Oriented Programming, Systems, Languages and ApplicationS |
ACSAC |
Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo
Si, Xiangyu Zhang, Dongyan Xu, Hercule: Attack story reconstruction via community discovery on correlated log graph , Proceedings of the 32Nd Annual Conference on Computer Security Applications |
WOOT |
Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu
Zhang, Dongyan Xu, John Qian, Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic , in Proceedings of the USENIX Workshop on Offensive Technologies |
IST |
Chang-ai Sun, Feifei Xue, Huai Liu, Xiangyu Zhang , A path-aware approach to mutant reduction in mutation testing Information and Software Technology |
FSE |
Weihang Wang, Yunhui Zheng, Xinyu Xing, Xiangyu Zhang, Patrick Eugster, WebRanz: Web Page Randomization For Better Advertisement Delivery and Web-Bot Prevention Proceedings of the 2016 ACM SIGSOFT Symposium on the Foundations of Software Engineering |
FSE |
Chung Hwan Kim, Junghwan Rhee, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu, PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments, Proceedings of the 2016 ACM SIGSOFT Symposium on the Foundations of Software Engineering |
FSE |
Jianjun Huang, Xiangyu Zhang, Lin Tan, Detecting Sensitive Data Disclosure via Bi-directional Text Correlation Analysis Proceedings of the 2016 ACM SIGSOFT Symposium on the Foundations of Software Engineering (ACM SIGSOFT Distinguished Paper Award) |
FSE |
Zhaogui Xu, Xiangyu Zhang, Lin Chen, Kexin Pei, Baowen Xu, Python Probabilistic Type Inference with Natural Language Support Proceedings of the 2016 ACM SIGSOFT Symposium on the Foundations of Software Engineering (Distinguished Artifact Award) |
FSE |
Zhaogui Xu, Peng Liu, Xiangyu Zhang, Baowen Xu, Python Predictive Analysis for Bug Detection Proceedings of the 2016 ACM SIGSOFT Symposium on the Foundations of Software Engineering |
ISSTA |
Peng Liu, Omer Tripp, Xiangyu Zhang , IPA: Improving Predictive Analysis with Pointer Analysis The 2016 ACM SIGSOFT International Symposium on Software Testing and Analysis |
ISSTA |
Weihang Wang, Yunhui Zheng, Peng Liu, Lei Xu, Xiangyu Zhang, Patrick Eugster , ARROW: Automated Repair of Races on Client-Side Web Pages The 2016 ACM SIGSOFT International Symposium on Software Testing and Analysis |
ICSE |
Hao Sun, Xiangyu Zhang, Yunhui Zheng, Qingkai Zeng , IntEQ: Recognizing Benign Integer Overflows via Equivalence Checking Across Multiple Precisions Proceedings of the International Conference on Software Engineering |
ICSE |
Wei You, Bin Liang, Wenchang Shi, Shuyang Zhu, Peng Wang, Sikefu Xie, Xiangyu Zhang , Reference Hijacking: Patching, Protecting and Analyzing on Unmodified and Non-Rooted Android Devices Proceedings of the International Conference on Software Engineering |
ICSE |
Juan Zhai, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin , Automatic Model Generation from Documentation for Java API Functions Proceedings of the International Conference on Software Engineering |
ASPLOS |
Yonghwi Kwon, Dohyeong Kim, William Nick Sumner, Kyungtae Kim, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu , LDX: Causality Inference by Lightweight Dual Execution Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems |
NDSS |
Shiqing Ma, Xiangyu Zhang, Dongyan Xu, ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting NDSS (Distinguished Paper Award) |
ACSAC |
Shiqing Ma, K.H. Lee, C.H. Kim, J. Rhee, X. Zhang, D. Xu, Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows Proceedings of the 31st Annual Computer Security Applications Conference |
OOPSLA |
W.C. Lee, T. Bao, Y. Zheng, X. Zhang, K. Vora, R. Gupta, RAIVE: runtime assessment of floating-point instability by vectorization Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications |
CCS |
Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu, iRiS: Vetting Private API Abuse in iOS Applications Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (Contributed to the confirmation and removal of hundreds of privacy-violating apps from Apple's App Store) |
CCS |
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu, GUITAR: Piecing together android app GUIs from memory images Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (Best Paper Award) |
CCS |
Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu, VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security |
JCST |
Roundtable: Research Opportunities and Challenges for Emerging Software Systems, Roundtable: Research Opportunities and Challenges for Emerging Software Systems Journal of Computer Science and Technology |
CAV |
Yunhui Zheng, Vijay Ganesh, Sanu Subramanian, Omer Tripp, Julian Dolby, Xiangyu Zhang, Effective search-space pruning for solvers of string equations, regular expressions and length constraints Computer Aided Verification |
DSN |
Zhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu, LEAPS: Detecting camouflaged attacks with statistical learning guided by program analysis Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on |
PLDI |
Peng Liu, Xiangyu Zhang, Omer Tripp, Yunhui Zheng, Light: replay via tightly bounded recording Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation |
ASIACCS |
Wei You, Bin Liang, Jingzhe Li, Wenchang Shi, Xiangyu Zhang, Android implicit information flow demystified Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (short paper) |
ASIACCS |
Hao Sun, Xiangyu Zhang, Chao Su, Qingkai Zeng, Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security |
ASPLOS |
Dohyeong Kim, Yonghwi Kwon, William N Sumner, Xiangyu Zhang, Dongyan Xu, Dual Execution for On the Fly Fine Grained Execution Comparison Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems |
TS |
Patrick Eugster, Vinaitheerthan Sundaram, Xiangyu Zhang, Debugging the Internet of Things: The Case of Wireless Sensor Networks IEEE Transactions on Software |
NDSS |
Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian, P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions NDSS |
SECURITY |
Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang, SUPOR: precise and scalable sensitive user input detection for android apps 24th USENIX Security Symposium (USENIX Security 15) (CSAW 2015 Best Applied Security Paper Award TOP-10 Finalists) |
TOSEM |
Yueqi Li, S. C. Cheung, X. Zhang, and Y. Liu, Scaling Up Symbolic Analysis by Removing Z-Equivalent States ,ACM Transactions on Software Engineering and Methodology (Journal), accepted. |
OOPSLA |
Peng Liu, Omer Tripp, Xiangyu Zhang, Flint: Fixing Linearizability Violations ,Object Oriented Programming, Systems, Languages and Applications , 2014. |
SECURITY |
Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu, DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse ,USENIX Security (Best Student Paper Award), 2014. |
SECURITY |
Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su, X-Force: Force-Executing Binary Programs for Security Applications , USENIX Security , 2014. |
ECOOP |
Kyu Hyung Lee, Dohyeong Kim and Xiangyu Zhang, Infrastructure-Free Logging and Replay of Concurrent Execution on Multiple Cores , European Conference on Object-Oriented Programming, 2014. |
ISSTA |
Yunxiao Zou, Zhenyu Chen, Yunhui Zheng, Xiangyu Zhang, and Zebao Gao, Virtual DOM Coverage: Drive an Effective Testing for Dynamic Web Applications ,International Symposium on Software Testing and Analysis, 2014. |
DSN |
Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu, FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine ,Proceedings of the 44th IEEE/IFIP International Conference on Dependable Systems and Networks , Atlanda, GA, 2014. |
SIGMETRICS |
Chung Hwan Kim, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Xiangyu Zhang, Dongyan Xu, IntroPerf: Transparent Context-Sensitive Multi-Layer Performance Inference using System Stack Traces ,Proceedings of ACM SIGMETRICS , Austin, TX, 2014. |
ICSE |
Dohyeong Kim, William N. Sumner, Xiangyu Zhang, Dongyan Xu, Hira Agrawal, Reuse-Oriented Reverse Engineering of Functional Components from X86 Binaries ,Proceedings of the 36th International Conference on Software Engineering , Hyderabad, India, 2014. |
ICSE |
Jianjun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, Bin Liang, AsDroid: Detecting Stealthy Behaviors in Android Applications by User Interface and Program Behavior Contradiction ,Proceedings of the 36th International Conference on Software Engineering , Hyderabad, India, 2014. |
OOPSLA |
T. Bao and X. Zhang,, On-the-fly Detection of Instability Problems in Floating-Point Program Execution ,Object Oriented Programming, Systems, Languages and Applications , 2013. |
ACSAC |
Z. Deng, X. Zhang, and D. Xu, SPIDER: Stealthy Binary Program Instrumentation and Debugging via Hardware Virtualization ,Proceedings of the Annual Computer Security Applications Conference, 2013. |
ASE |
W. N. Sumner and X. Zhang, Identifying Execution Points For Dynamic Analyses ,Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, 2013. |
ASE |
Y. Kwon, X. Zhang and D. Xu, PIEtrace: Platform Independent Executable Trace ,Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (Best Paper Award and ACM SIGSOFT Distinguished Paper Award), 2013. |
CCS |
K. H. Lee, X. Zhang and D. Xu, LogGC: Garbage Collecting Audit Log ,Proceedings of the 20th ACM Conference on Computer and Communications Security, 2013. |
CCS |
J. Zeng, Y. Fu, K. Miller, Z. Lin ,X. Zhang and D. Xu, Obfuscation Resilient Binary Code Reuse through Trace-oriented Programming ,Proceedings of the 20th ACM Conference on Computer and Communications Security, 2013. |
ESORICS |
Z. Deng ,X. Zhang and D. Xu, BISTRO: Binary Component Extraction and Embedding for Software Security Applications ,Proceedings of the 18th European Symposium on Research in Computer Security, 2013. |
FSE |
Y. Zheng, X. Zhang, and V. Garnesh, Z3-str: A Z3-Based String Solver for Web Application Analysis , Proceedings of the 9th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013. |
DSN |
Z. Gu, W. N. Sumner, Z. Deng, X. Zhang, and D. Xu,, DRIP: A Framework for Purifying Trojaned Kernel Drivers , the 43rd IEEE/IFIP International Conference on Dependable Systems and Networks , 2013. |
EuroSec |
B. Saltaformaggio, D. Xu, and X. Zhang,, BusMonitor: A Hypervisor-Based Solution for Memory Bus Covert Channels , the 6th European Workshop on Systems Security , 2013. |
ICSE |
Y. Zheng and X. Zhang,, Path Sensitive Static Analysis of Web Applications for Remote Code Execution Vulnerability Detection , the 35th International Conference on Software Engineering , 2013. |
ICSE |
W. N. Sumner and X. Zhang,, Comparative Causality: Explaining the Differences Between Executions , the 35th International Conference on Software Engineering , 2013. |
NDSS |
K. H. Lee, X. Zhang, and Dongyan Xu, High Accuracy Attack Provenance via Binary-based Execution Partition , Network and Distributed System Security Symposium, 2013. |
WCRE |
D. Qi, W. N. Sumner, F. Qin, M. Zheng, X. Zhang and A. Roychoudhury, Modeling Software Execution Environment , the 19th Working Conference on Reverse Engineering , 2012. |
SenSys |
V. Sundaram, P. Eugster, and X. Zhang, Prius: Generic Hybrid Trace Compression for Wireless Sensor Networks , the 10th ACM International Conference on Embedded Networked Sensor Systems , 2012. |
OOPSLA |
T. Bao, Y. Zheng, and X. Zhang, White Box Sampling in Uncertain Data Processing Enabled by Program Analysis , Object Oriented Programming, Systems, Languages and Applications, 2012. |
DFRWS |
Z. Deng, D. Xu, X. Zhang, and X. Jiang, IntroLib: Efficient and Transparent Library Call Introspection for Malware Forensics , the 12th Annual DFRWS Digital Forensics Conference, 2012. |
ICSE |
Y. Zheng and X. Zhang, Static Detection of Resource Contention Problems in Server-Side Scripts , the 34th International Conference on Software Engineering, 2012. |
ESoSS |
R. Potharaju, A. Newell, C. Nita-Rotaru, and X. Zhang, Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques , International Symposium on Engineering Secure Software and Systems, 2012. |
NDSS |
Z. Lin, J. Rhee, C. Wu, X. Zhang, and Dongyan Xu, DIMSUM: Discovering Semantic Data of Interest from Un-mappable Memory with Confidence , Network and Distributed System Security Symposium, 2012. |
OOPSLA |
D. Weeratunge, X. Zhang, and S. Jagannathan, Accentuating the Positive: Atomicity Inference and Enforcement Using Correct Executions , Object Oriented Programming, Systems, Languages and Applications, 2011. |
ISSTA |
W. N. Sumner and X. Zhang, Selecting Peers for Execution Comparison , International Symposium on Software Testing and Analysis, 2011. |
DSN |
K. Lee, W. N. Sumner, X. Zhang and P. Eugster, Unified Debugging of Distributed Systems with Recon ,the 41th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2011. |
PLDI |
K. Lee, Y. Zheng, W. N. Sumner and X. Zhang, Toward Generating Reducible Replay Log, ACM SIGPLAN Conference on Programming Language Design and Implementation, San Jose, 2011 |
WWW |
Y. Zheng, T. Bao and X. Zhang, Statically Locating Web Application Bugs Caused by Asynchronous Calls, the 20th International World Wide Web Conference, India, 2011 |
ICSE |
W. N. Sumner, T. Bao, X. Zhang, and S. Prabhakar, Coalescing Executions for Fast Uncertainty Analysis ,the International Conference of Software Engineering, Hawaii, 2011 |
NDSS |
Z. Lin, J. Rhee, X. Zhang, D. Xu, and X. Jiang, SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures ,the 17th Network and Distributed System Security Symposium, San Diego, US, Feb. 2010 |
SenSys |
V. Sundaram, P. Eugster and X. Zhang, Efficient Diagnostic Tracing Support forWireless Sensor Networks ,the 8th ACM Conference on Embedded Networked Sensor Systems, 2010 |
SRDS |
B. Xin, P. Eugster, X. Zhang, and J. Yang Lightweight Task Graph Inference for Distributed Applications ,the 29th IEEE International Symposium on Reliable Distributed Systems, New Delhi, India, 2010. |
FSE |
W. N. Sumner and X. Zhang Memory Indexing: Canonicalizing Addresses Across Executions , the 18th ACM SIGSOFT Symposium on Foundations of Software, New Mexico, 2010. |
ISSTA |
D. Weeratunge, X. Zhang, W. N. Sumner, and S. Jagannathan Analyzing Concurrency Bugs using Dual Slicing ,International Symposium on Software Testing and Analysis, Trento, Italy, 2010 |
ISSTA |
T. Bao, Y. Zheng, Z. Lin, X. Zhang and D. Xu Strict Control Dependence and Its Effect on Dynamic Information Flow Analyses ,International Symposium on Software Testing and Analysis, Trento, Italy, 2010 |
DSN |
Z. Lin, X. Zhang and D. Xu Reuse-Oriented Camouflaging Trojan: Vulnerability Detection and Attack Construction the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-DCCS 2010), Chicago, 2010. |
ICSE |
W. N. Sumner, Y. Zheng, D. Weeratunge and X. Zhang Precise Calling Context Encoding, International Conference on Software Engineering, Cape Town, South Africa, 2010. |
ASPLOS |
D. Weeratunge, X. Zhang and S. Jagannathan Analyzing Multicore Dumps to Facilitate Concurrency Bug Reproduction, the 15th International Conference on Architectural Support for Programming Languages and Operating Systems, Pittsburb, PA, 2010. |
NDSS |
Z. Lin, X. Zhang and D. Xu Automatic Reverse Engineering of Data Structures from Binary Execution, the 17th Network and Distributed System Security Symposium San Diego, CA, 2010. |
ISSTA |
B. Xin and X. Zhang Memory Slicing, International Symposium on Software Testing and Analysis, Chicago, 2009. |
CGO |
X. Zhang, A. Navabi, and S. Jagannathan Alchemist: A Transparent Dependence Distance Profling Infrastructure, The International Symposium on Code Generation and Optimization ,March 2009. |
FASE |
W. N. Sumner and X. Zhang Algorithms for Automatically Computing the Causal Paths of Failures Fundamental Approaches to Software Engineering York Town, UK, March 2009. |
FSE |
Z. Lin and X. Zhang Deriving Program Input Syntactic Structure from Execution, the 16th ACM SIGSOFT Symposium on Foundations of Software, Atlanta, GA, 2008. |
COMPSAC |
S. Tallam, C. Tian, X. Zhang and R. Gupta Perturbing Program Execution for Avoiding Enviromental Faults the 32nd Annual IEEE International Computer SS oftware and Applications Conference, 2008. |
DSN |
Z. Lin, X. Zhang, and D. Xu Convicting Remote Exploitable Vulnerabilities: An Efficient Input Provenance Based Approach Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks, 2008. |
PLDI |
B. Xin, N. Sumner, and X. Zhang Efficient Program Execution Indexing ACM SIGPLAN Conference on Programming Language Design and Implementation, Tucson, 2008. |
NDSS |
Z. Lin, X. Jiang, D. Xu, and X. Zhang Automatic Protocol Format Reverse Engineering Through Context-Aware Monitored Execution, Network and Distributed System Security Symposium, 2008. |
PPOPP |
A. Navabi, X. Zhang, and S. Jagannathan Quasi-Static Scheduling for Safe Futures, ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, Feb. Salt Lake City, Utah |
ICSM |
C. Liu, X. Zhang, J. Han, Y. Zhang, and B. Bhargava Failure Indexing: A Dynamic Slicing Based Approach, International Conference on Software Maintenance, Paris, September 2007.[PPT] |
ICSM |
V. Nagarajan, R. Gupta, X. Zhang, M. Madou, B. De Sutter, and K. De Bosschere Matching Control Flow of Program Versions, International Conference on Software Maintenance, Paris, September 2007. |
VLDB |
Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, Sunil Prabhakar Tracing Lineage Beyond Relational Operators, Proc. of the 33rd International Conference on Very Large Databases (VLDB), Vienna, Austria, Sep. 2007. |
ISSTA |
B. Xin, X. Zhang Efficient Online Detection of Dynamic Control Dependence, International Symposium on Software Testing and Analysis, London, July 2007. |
ISSTA |
S. Tallam, C. Tian, X. Zhang, and R. Gupta Enabling Tracing of Long-Running Multithreaded Programs via Dynamic Execution Reduction, International Symposium on Software Testing and Analysis, London, July 2007. |
PLDI |
X. Zhang, S. Tallam, N. Gupta, and R. Gupta Towards Locating Execution Omission Errors, ACM SIGPLAN Conference on Programming Language Design and Implementation, San Diego, June 2007. |
FSE |
X. Zhang, S. Tallam, and R. Gupta Dynamic Slicing Long Running Programs through Execution Fast Forwarding, 14th ACM SIGSOFT Symposium on Foundations of Software Engineering, Portland, Oregon, November 2006. |
PLDI |
X. Zhang, N. Gupta, and R. Gupta Pruning Dynamic Slices With Confidence, ACM SIGPLAN Conference on Programming Language Design and Implementation, Ottawa, Canada, June 2006. 21.3%(36/169) |
ICSE |
X. Zhang, N. Gupta, and R. Gupta Locating Faults Through Automated Predicate Switching, IEEE/ACM International Conference on Software Engineering, Shanghai, China, May 2006. 9% (36/395) |
ASE |
N. Gupta, H. He, X. Zhang, and R. Gupta, Locating Faulty Code Using Failure-Inducing Chops, IEEE/ACM International Conference on Automated Software Engineering, pages 263-272, Long Beach, California, Nov. 2005. 9.6 % (28/291) |
AADEBUG |
X. Zhang, H. He, N. Gupta, and R. Gupta Experimental Evaluation of Using Dynamic Slices for Fault Location, SIGSOFT-SIGPLAN Sixth International Symposium on Automated and Analysis-Driven Debugging, pages 33-42, Monterey, California, September 2005. 36.7% (11/30) |
ESEC -FSE |
X. Zhang and R. Gupta, Matching Execution Histories of Program Versions, Joint 10th European Software Engineering Conference and 13th ACM SIGSOFT Symposium on the Foundations of Software Engineering, pages 197-206, Lisbon, Portugal, September 2005. 15.9% (32/201) |
PACT |
S. Tallam, R. Gupta, and X. Zhang, Extended Whole Program Paths, International Conference on Parallel Architectures and Compilation Techniques, pages 17-26, St. Loius, Missouri, September 2005. 25.2% (30/119) |
HPCA |
Y. Zhang, L. Gao, J. Yang, X. Zhang and R. Gupta, SENSS: Security Enhancement to Symmeteric Shared Memory Multiprocessors, IEEE 11th International Symposium on High Performance Computer Architecture, pages 352-362, San Francisco, California, February 2005. 15.5% (28/181) |
MICRO |
X. Zhang and R. Gupta, Whole Execution Traces, IEEE/ACM 37th International Symposium on Microarchitecture, pages 105-116, Portland, Oregan, December 2004. 18.4% (29/158) |
PLDI |
X. Zhang and R. Gupta, Cost Effective Dynamic Program Slicing, ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 94-106, Washington D.C., June 2004. 20% |
ICSE |
X. Zhang, R. Gupta, and Y. Zhang Effective Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams, IEEE/ACM International Conference on Software Engineering, pages 502-511, Edinburgh, UK, May 2004. 13.3% (58/436) |
CGO |
S. Tallam, X. Zhang, and R. Gupta, Extending Path Profiling across Loop Backedges and Procedure Boundaries, Second Annual IEEE/ACM International Symposium on Code Generation and Optimization, pages 251-262, San Jose, CA, March 2004. 31.6% (27/79) |
ICSE |
Recipient of ICSE 2003 Distinguished Paper Award. X. Zhang, R. Gupta, and Y. Zhang Precise Dynamic Slicing Algorithms, IEEE/ACM International Conference on Software Engineering, pages 319-329, Portland, Oregon, May 2003. 13.0% (42/324) |
CGO |
X. Zhang and R. Gupta, Hiding Program Slices for Software Security, First Annual IEEE/ACM International Symposium on Code Generation and Optimization, pages 325-336, San Francisco, CA, March 2003. 35.4% (29/82) |
ICACI |
D. Zhang, L. Zhou and X. Zhang, Enhancing Information Retrieval With Natural Language Processing Technology, Proceedings of IASTED International Conference on Artificial and Computational Intelligence , pages 24-29, Tokyo, Japan, September 2002. |
TOSN |
V. Sundaram, P. Eugster, X. Zhang and V. Addanki, Diagnostic Tracing for Wireless Sensor Networks, ACM Transactions of Sensor Networks, accepted |
TSE |
W. N. Sumner, Y. Zheng, D. Weeratunge and X. Zhang, Precise Calling Context Encoding IEEE Transactions of Software Engineering, 2012 |
SCP |
A. Navabi, X. Zhang, and S. Jagannanthan, Dependence Analysis for Safe Futures. Science of Computer Programming |
TSE |
Z. Lin, X. Zhang, and D. Xu, Deriving Input Syntactic Structure from Program Execution and Its Applications. IEEE Transactions of Software Engineering, 2010. |
TSE |
C. Liu, X. Zhang, and J. Han, A Systematic Study of Failure Proximity, IEEE Transactions of Software Engineering, 2008 |
CRC |
X. Zhang, N. Gupta, and R. Gupta, Whole Execution Traces and Their Use in Debugging, The Compiler Design Handbook: Optimizations and Machine Code Generation, Second Edition Chapter 18, CRC Press. |
SP&E |
X. Zhang, N. Gupta and R. Gupta, Locating Faulty Code By Multiple Points Slicing, Software - Practice & Experience, Vol. 37, Issue 9, pages 935-961, July 2007 |
ESE |
X. Zhang, N. Gupta and R. Gupta, A Study of Effectiveness of Dynamic Slicing in Locating Real Faults, Empirical Software Engineering, Vol. 12, No. 2, pages 143-160, April 2007 |
TACO |
X. Zhang and R. Gupta, Whole Execution Traces and their Applications, ACM Transactions on Architecture and Code Optimization, Vol. 2, No. 3, pages 301-334, Sept. 2005. |
TOPLAS |
X. Zhang, R. Gupta, and Y. Zhang, Cost and Precision Tradeoffs of Dynamic Data Slicing Algorithms, ACM Transactions on Programming Languages and Systems, Vol. 27, No. 4, pages 631-661, July 2005. |