Publications by Year

2022

NDSS Shengwei An, Guanhong Tao, Qiuling Xu, Yingqi Liu, Guangyu Shen, Yuan Yao, Jingwei Xu, Xiangyu Zhang,
MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity Proceedings of the 29th Network and Distributed System Security Symposium
NDSS Hongjun Choi, Zhiyuan Cheng, Xiangyu Zhang,
RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning Proceedings of the 29th Network and Distributed System Security Symposium
SECURITY Fei Wang,Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer ,
Improving IoT Security via Formalized Protocol Customization USENIX Security
S&P Guanhong Tao, Yingqi Liu, Guangyu Shen, Qiuling Xu, Shengwei An, Zhuo Zhang, Xiangyu Zhang,
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security Proceedings of the 43rd IEEE Symposiums on Security and Privacy

2021

ESE Y Tian, S Ma, M Wen, Y Liu, SC Cheung, X Zhang,
To What Extent Do DNN-based Image Classification Models Make Unreliable Inferences? Empirical Software Engineering
ICML G Shen, Y Liu, G Tao, S An, Q Xu, S Cheng, S Ma, X Zhang ,
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization ICML
FSE M Yan, J Chen, X Zhang, L Tan, G Wang, Z Wang,
Exposing Numerical Bugs in Deep Learning via Gradient Back-propagation Foundations of Software Engineering
FSE Sayali Kate, Michael Chinn, Hongjun Choi, Xiangyu Zhang,
PHYSFRAME: Type Checking Physical Frames of Reference for Robotic Systems Foundations of Software Engineering
ICSE Xincheng He, Lei Xu, Xiangyu Zhang, Rui Hao, Yang Feng, Baowen Xu,
PyART: Python API Recommendation in Real-Time Proceedings of the International Conference on Software Engineering
AAAI Siyuan Cheng, Yingqi Liu, Shiqing Ma, Xiangyu Zhang,
Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification Proceedings of the 35th AAAI Conference on Artificial Intelligence
AAAI Qiuling Xu , Guanhong Tao , Siyuan Cheng and Xiangyu Zhang,
Towards Feature Space Adversarial Attack Proceedings of the 35th AAAI Conference on Artificial Intelligence
SECURITY Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Greg Walkup, Celik Berkay, Xiangyu Zhang,
ATLAS: A Sequence-based Learning Approach for Attack Investigation The 30th USENIX Security Symposium
SECURITY Y. Aafer, W. You, Y. Sun, Y. Shi, X. Zhang, and H. Yin,
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing The 30th USENIX Security Symposium
S&P Zhuo Zhang, Wei You, Guanhong Tao, Yousra Aafer, Xuwei Liu, Xiangyu Zhang,
StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting Proceedings of the 42th IEEE Symposiums on Security and Privacy
S&P Zhuo Zhang, Yapeng Ye, Wei You, Guanhong Tao, Wen-chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang,
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary Proceedings of the 42th IEEE Symposiums on Security and Privacy
NDSS Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu,
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces Proceedings of the 28th Network and Distributed System Security Symposium
NDSS Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela Ciocarlie, Vinod Yegneswaran, Ashish Gehani,
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation Proceedings of the 28th Network and Distributed System Security Symposium

2020

RAID Hongjun Choi, Sayali Kate, Yousra Affer, Xinagyu Zhang, Dongyan Xu,,
Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses
OOPSLA Hongyu Liu, Sam Silvestro, Xiangyu Zhang, Jian Huang, Tongping Liu,
WATCHER: In-Situ Failure Diagnosis Proceedings of Object Oriented Programming, Systems, Languages and Applications
FSE Juan Zhai, Yu Shi, Minxue Pan, Guian Zhou, Yongxiang Liu, Chunrong Fang, Shiqing Ma, Lin Tan, Xiangyu Zhang,
C2S: translating natural language comments to formal program specifications Proceedings of the 2020 ACM SIGSOFT International Symposium on the Foundations of Software Engineering
FSE Shenao Yan, Guanhong Tao, Xuwei Liu, Juan Zhai, Shiqing Ma, Lei Xu, Xiangyu Zhang,
Correlations Between Deep Neural Network Model Coverage Criteria and Model Quality Proceedings of the 2020 ACM SIGSOFT International Symposium on the Foundations of Software Engineering
SECURITY Taegyu Kim, Chung Hwan Kim, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dongyan Xu, Dave (Jing) Tian,
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with Mayday The 29th USENIX Security Symposium
CCS Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang,
Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features Proceedings of the 27th ACM Conference on Computer and Communications Security
CCS Hongjun Choi, Saylai Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu,
Cyber-Physical Inconsistency Vulnerability Idnetification for Safety Checks in Robotic Vehicles Proceedings of the 27th ACM Conference on Computer and Communications Security
NDSS Runqing Yang, Shiqing Ma, Haitao Xu, Xiangyu Zhang, Yan Chen,
UISCOPE: Accurate, Instrumentation-free and Visible Attack Investigation for GUI Applications Proceedings of the 27th Network and Distributed System Security Symposium
ICSE Hao Xia, Yuan Zhang, Yingtian Zhou, Xiaoting Chen, Yang Wang, Xiangyu Zhang, Shuaishuai Cui, Geng Hong, Xiaohan Zhang, Min Yang, Zhemin Yang,
How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale Study Proceedings of the International Conference on Software Engineering
ICSE Guanhong Tao, Shiqing Ma, Yingqi Liu, Qiuling Xu, Xiangyu Zhang,
TRADER: Trace Divergence Analysis and Embedding Regulation for Debugging Recurrent Neural Networks Proceedings of the International Conference on Software Engineering
ICSE Juan Zhai, Xiangzhe Xu, Yu Shi, Guanhong Tao, Minxue Pan, Shiqing Ma, Lei Xu, Weifeng Zhang, Lin Tan, Xiangyu Zhang,
CPC: Automatically Classifying and Propagating Natural Language Comments via Program Analysis Proceedings of the International Conference on Software Engineering
ICSE Wanwangying Ma, Lin Chen, Xiangyu Zhang, Yang Feng, Zhaogui Xu, Zhifei Chen, Yuming Zhou, Baowen Xu,
Impact Analysis of Cross-Project Bugs on Software Ecosystems Proceedings of the International Conference on Software Engineering
ICSE I Luk Kim, Yunhui Zheng, Hogun Park, Weihang Wang, Wei You, Yousra Aafer, Xiangyu Zhang,
Finding Client-side Business Flow Tampering Vulnerabilities Proceedings of the International Conference on Software Engineering
S&P Wei You, Zhuo Zhang, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Makena Harmon, Xiangyu Zhang,
PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning Proceedings of the 41th IEEE Symposiums on Security and Privacy

2019

CCS Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang,
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation Proceedings of the 26th ACM Conference on Computer and Communications Security
OOPSLA Zhuo Zhang, Wei You, Guanhong Tao, Guannan Wei, Yonghwi Kwon, Xiangyu Zhang,
BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation Proceedings of Object Oriented Programming, Systems, Languages and Applications, ACM SIGPLAN Distinguished Paper Award
SECURITY T Kim, C. H. Kim, F. Fei, Z. Tu, G. Walkup, X. Zhang, X. Deng, D. Xu,
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing ,USENIX Security
PLDI David M. Perry, Dohyeong Kim, Roopsha Samanta, and Xiangyu Zhang ,
SemCluster: Clustering of Imperative Programming Assignments Based on Quantitative Semantic Features Proceedings of ACM SIGPLAN Conference on Programming Languages Design and Implementation
PLDI Wen-Chuan Lee, Peng Liu, Yingqi Liu, Shiqing Ma, and Xiangyu Zhang ,
Programming Support for Autonomizing Software Proceedings of ACM SIGPLAN Conference on Programming Languages Design and Implementation
ICSE Wei You, Xuwei Liu, Shiqing Ma, David Perry, Xiangyu Zhang, Bin Liang ,
SLF: Fuzzing without Valid Seed Inputs Proceedings of the 41st ACM/IEEE Internatinoal Conference on Software Engineering
ICSE Kenneth Miller, Yonghwi Kwon, Xiangyu Zhang, Zhiqiang Lin,
Probabilistic Disassembly Proceedings of the 41st ACM/IEEE Internatinoal Conference on Software Engineering
S&P Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, Bin Liang,
ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery Proceedings of the 40th IEEE Symposiums on Security and Privacy (Oakland)
NDSS Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, Xiangyu Zhang,
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking Proceedings of Network and Distributed System Security Symposium
CGO Wen-Chuan Lee, Yingqi Liu, Peng Liu, Shiqing Ma, Hongjun Choi, Xiangyu Zhang, Rajiv Gupta,
White-Box Program Tuning Proceedings of the International Symposium on Code Generation and Optimization

2018

NIPS G Tao, S Ma, Y Liu, X Zhang,
Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples Proceedings of Advances in Neural Information Processing Systems
ACSAC F Wang, Y Kwon, S Ma, X Zhang, D Xu,
Lprov: Practical Library-aware Provenance Tracing Proceedings of the 33rd Annual Computer Security Applications Conference
FSE Shiqing Ma, Yingqi Liu, Wen-Chuan Lee, Xiangyu Zhang, Ananth Grama,
,MODE: automated neural network model debugging via state differential analysis and input selection Proceedings of Foundations of Software Engineering
FSE Sayali Kate, John-Paul Ore, Xiangyu Zhang, Sebastian G. Elbaum, Zhaogui Xu,
Phys: probabilistic physical unit assignment and inconsistency detection, Proceedings of Foundations of Software Engineering
CCS Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, Xinyan Deng,
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach, Proceedings of the ACM Conference on Computer and Communications Security
CCS Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li,
Precise Android API Protection Mapping Derivation and Reasoning, Proceedings of the ACM Conference on Computer and Communications Security
WWW I Luk Kim, W Wang, Y Kwon, Y Zheng, Y Aafer, W Meng, X Zhang,
AdBudgetKiller: Online Advertising Budget Draining Attack, Proceedings of the Intertional Conference on World Wide Web
ATC S Ma, J Zhai, Y Kwon, K.H. Lee, X Zhang, G Ciocarlie, A Gehani, Vinod Yegneswaran, Dongyan Xu, Somesh Jha,
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking, Proceedings of the USENIX Annual Technical Conference
ASE Z Tang, J Zhai, M Pan, Y Aafer, S Ma, X Zhang, J Zhao,
Dual-force: understanding WebView malware via cross-language forced execution, Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering
ICSE Z Xu, S Ma, X Zhang, S Zhu, B Xu,
Debugging with intelligence via probabilistic inference, Proceedings of the 40th International Conference on Software Engineering
COMPSAC C Sun, J Jia, H Liu, X Zhang,
A Lightweight Program Dependence Based Approach to Concurrent Mutation Analysis, Proceedings of the IEEE 42nd Annual Computer Software and Applications Conference
ICRA Fan Fei, Zhan Tu, Ruikun Yu, Taegyu Kim, Xiangyu Zhang, Dongyan Xu, Xinyan Deng, ,
Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks, Proceedings of the IEEE International Conference on Robotics and Automation
NDSS Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran ,
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation, Proceedings of Network and Distributed System Security Symposium
NDSS Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha I. Ali-Gombe, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III,
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images, Proceedings of Network and Distributed System Security Symposium
NDSS Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, Chen Tian,
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection, Proceedings of Network and Distributed System Security Symposium
NDSS C.H. Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu,
Securing real-time microcontroller systems through customized memory view switching, Proceedings of Network and Distributed System Security Symposium
NDSS Y Liu, S Ma, Y Aafer, W.C. Lee, J Zhai,W. Wang, X Zhang,
Trojaning attack on neural networks, Proceedings of Network and Distributed System Security Symposium

2017

ACSAC H Chen, N Li, W Enck, Y Aafer, X Zhang,
Analysis of SEAndroid Policies: Combining MAC and DAC in Android, Proceedings of the 33rd Annual Computer Security Applications Conference
ACSAC Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu,
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications, Proceedings of the 33rd Annual Computer Security Applications Conference
ASE W Wang, Y Kwon, Y Zheng, Y Aafer, I Kim, WC Lee, Y Liu, W Meng,
PAD: Programming third-party web advertisement censorship, Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering
ASE J Huang, Y Aafer, D Perry, X Zhang, C Tian,
UI driven Android application reduction, Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering
FSE S Ma, Y Aafer, Z Xu, WC Lee, J Zhai, Y Liu, X Zhang,
LAMP: data provenance for graph based machine learning algorithms through derivative computation, Proceedings of Foundations of Software Engineering
SECURITY S Ma, J Zhai, F Wang, KH Lee, X Zhang, D Xu,
MPI: Multiple perspective attack investigation with semantics aware execution partitioning, Proceedings of USENIX Security
(Distinguished Paper Award)
ISSTA Y Kwon, W Wang, Y Zheng, X Zhang, D Xu,
CPR: cross platform binary code reuse via platform independent trace program, Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis
ISSTA D. Perry, A Mattavelli, X Zhang, C Cadar,
Accelerating array constraints in symbolic execution, Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis
ICSE P Liu, X Zhang, M Pistoia, Y Zheng, M Marques, L Zeng,
Automatic text input generation for mobile testing, Proceedings of IEEE/ACM 39th International Conference on Software Engineering
ICSE W Ma, L Chen, X Zhang, Y Zhou, B Xu,
How Do Developers Fix Cross-Project Correlated Bugs? A Case Study on the GitHub Scientific Python Ecosystem, Proceedings of IEEE/ACM 39th International Conference on Software Engineering
WWW K Kim, I. L. Kim, C.H. Kim, Y Kwon, Y Zheng, X Zhang, D Xu,
J-force: Forced execution on javascript, Proceedings of the 26th International Conference on World Wide Web ,
RV Zachary Benavides, Rajiv Gupta, Xiangyu Zhang,
Annotation Guided Collection of Context- Sensitive Parallel Execution Profiles, Proceedings of Runtime Verification ,
NDSS Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, K.H. Lee, X. Zhang, D. Xu,
A2C: Self destructing exploit executions via input perturbation, Proceedings of Network and Distributed System Security Symposium ,

2016

HPDC Zachary Benavides, Rajiv Gupta, Xiangyu Zhang,
Parallel execution profiles Proceedings of the 25th ACM International Symposium on High-Performance Parallel and Distributed Computing ,
OOPSLA Dohyeong Kim, Yonghwi Kwon, Peng Liu, I Luk Kim, David Mitchel Perry, Xiangyu Zhang, Gustavo Rodriguez-Rivera,
Apex: automatic programming assignment error explanation ,Proceedings of Object Oriented Programming, Systems, Languages and ApplicationS
ACSAC Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu,
Hercule: Attack story reconstruction via community discovery on correlated log graph , Proceedings of the 32Nd Annual Conference on Computer Security Applications
WOOT Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, John Qian,
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic , in Proceedings of the USENIX Workshop on Offensive Technologies
IST Chang-ai Sun, Feifei Xue, Huai Liu, Xiangyu Zhang ,
A path-aware approach to mutant reduction in mutation testing Information and Software Technology
FSE Weihang Wang, Yunhui Zheng, Xinyu Xing, Xiangyu Zhang, Patrick Eugster,
WebRanz: Web Page Randomization For Better Advertisement Delivery and Web-Bot Prevention Proceedings of the 2016 ACM SIGSOFT Symposium on the Foundations of Software Engineering
FSE Chung Hwan Kim, Junghwan Rhee, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu,
PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments, Proceedings of the 2016 ACM SIGSOFT Symposium on the Foundations of Software Engineering
FSE Jianjun Huang, Xiangyu Zhang, Lin Tan,
Detecting Sensitive Data Disclosure via Bi-directional Text Correlation Analysis Proceedings of the 2016 ACM SIGSOFT Symposium on the Foundations of Software Engineering (ACM SIGSOFT Distinguished Paper Award)
FSE Zhaogui Xu, Xiangyu Zhang, Lin Chen, Kexin Pei, Baowen Xu,
Python Probabilistic Type Inference with Natural Language Support Proceedings of the 2016 ACM SIGSOFT Symposium on the Foundations of Software Engineering (Distinguished Artifact Award)
FSE Zhaogui Xu, Peng Liu, Xiangyu Zhang, Baowen Xu,
Python Predictive Analysis for Bug Detection Proceedings of the 2016 ACM SIGSOFT Symposium on the Foundations of Software Engineering
ISSTA Peng Liu, Omer Tripp, Xiangyu Zhang ,
IPA: Improving Predictive Analysis with Pointer Analysis The 2016 ACM SIGSOFT International Symposium on Software Testing and Analysis
ISSTA Weihang Wang, Yunhui Zheng, Peng Liu, Lei Xu, Xiangyu Zhang, Patrick Eugster ,
ARROW: Automated Repair of Races on Client-Side Web Pages The 2016 ACM SIGSOFT International Symposium on Software Testing and Analysis
ICSE Hao Sun, Xiangyu Zhang, Yunhui Zheng, Qingkai Zeng ,
IntEQ: Recognizing Benign Integer Overflows via Equivalence Checking Across Multiple Precisions Proceedings of the International Conference on Software Engineering
ICSE Wei You, Bin Liang, Wenchang Shi, Shuyang Zhu, Peng Wang, Sikefu Xie, Xiangyu Zhang ,
Reference Hijacking: Patching, Protecting and Analyzing on Unmodified and Non-Rooted Android Devices Proceedings of the International Conference on Software Engineering
ICSE Juan Zhai, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin ,
Automatic Model Generation from Documentation for Java API Functions Proceedings of the International Conference on Software Engineering
ASPLOS Yonghwi Kwon, Dohyeong Kim, William Nick Sumner, Kyungtae Kim, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu ,
LDX: Causality Inference by Lightweight Dual Execution Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems
NDSS Shiqing Ma, Xiangyu Zhang, Dongyan Xu,
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting NDSS
(Distinguished Paper Award)

2015

ACSAC Shiqing Ma, K.H. Lee, C.H. Kim, J. Rhee, X. Zhang, D. Xu,
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows Proceedings of the 31st Annual Computer Security Applications Conference
OOPSLA W.C. Lee, T. Bao, Y. Zheng, X. Zhang, K. Vora, R. Gupta,
RAIVE: runtime assessment of floating-point instability by vectorization Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications
CCS Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu,
iRiS: Vetting Private API Abuse in iOS Applications Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
(Contributed to the confirmation and removal of hundreds of privacy-violating apps from Apple's App Store)
CCS Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu,
GUITAR: Piecing together android app GUIs from memory images Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
(Best Paper Award)
CCS Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu,
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
JCST Roundtable: Research Opportunities and Challenges for Emerging Software Systems,
Roundtable: Research Opportunities and Challenges for Emerging Software Systems Journal of Computer Science and Technology
CAV Yunhui Zheng, Vijay Ganesh, Sanu Subramanian, Omer Tripp, Julian Dolby, Xiangyu Zhang,
Effective search-space pruning for solvers of string equations, regular expressions and length constraints Computer Aided Verification
DSN Zhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu,
LEAPS: Detecting camouflaged attacks with statistical learning guided by program analysis Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on
PLDI Peng Liu, Xiangyu Zhang, Omer Tripp, Yunhui Zheng,
Light: replay via tightly bounded recording Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation
ASIACCS Wei You, Bin Liang, Jingzhe Li, Wenchang Shi, Xiangyu Zhang,
Android implicit information flow demystified Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
(short paper)
ASIACCS Hao Sun, Xiangyu Zhang, Chao Su, Qingkai Zeng,
Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
ASPLOS Dohyeong Kim, Yonghwi Kwon, William N Sumner, Xiangyu Zhang, Dongyan Xu,
Dual Execution for On the Fly Fine Grained Execution Comparison Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems
TS Patrick Eugster, Vinaitheerthan Sundaram, Xiangyu Zhang,
Debugging the Internet of Things: The Case of Wireless Sensor Networks IEEE Transactions on Software
NDSS Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian,
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions NDSS
SECURITY Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang,
SUPOR: precise and scalable sensitive user input detection for android apps 24th USENIX Security Symposium (USENIX Security 15)
(CSAW 2015 Best Applied Security Paper Award TOP-10 Finalists)

2014

TOSEM Yueqi Li, S. C. Cheung, X. Zhang, and Y. Liu,
Scaling Up Symbolic Analysis by Removing Z-Equivalent States ,ACM Transactions on Software Engineering and Methodology (Journal), accepted.
OOPSLA Peng Liu, Omer Tripp, Xiangyu Zhang,
Flint: Fixing Linearizability Violations ,Object Oriented Programming, Systems, Languages and Applications , 2014.
SECURITY Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu,
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse ,USENIX Security (Best Student Paper Award), 2014.
SECURITY Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su,
X-Force: Force-Executing Binary Programs for Security Applications , USENIX Security , 2014.
ECOOP Kyu Hyung Lee, Dohyeong Kim and Xiangyu Zhang,
Infrastructure-Free Logging and Replay of Concurrent Execution on Multiple Cores , European Conference on Object-Oriented Programming, 2014.
ISSTA Yunxiao Zou, Zhenyu Chen, Yunhui Zheng, Xiangyu Zhang, and Zebao Gao,
Virtual DOM Coverage: Drive an Effective Testing for Dynamic Web Applications ,International Symposium on Software Testing and Analysis, 2014.
DSN Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu,
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine ,Proceedings of the 44th IEEE/IFIP International Conference on Dependable Systems and Networks , Atlanda, GA, 2014.
SIGMETRICS Chung Hwan Kim, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Xiangyu Zhang, Dongyan Xu,
IntroPerf: Transparent Context-Sensitive Multi-Layer Performance Inference using System Stack Traces ,Proceedings of ACM SIGMETRICS , Austin, TX, 2014.
ICSE Dohyeong Kim, William N. Sumner, Xiangyu Zhang, Dongyan Xu, Hira Agrawal,
Reuse-Oriented Reverse Engineering of Functional Components from X86 Binaries ,Proceedings of the 36th International Conference on Software Engineering , Hyderabad, India, 2014.
ICSE Jianjun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, Bin Liang,
AsDroid: Detecting Stealthy Behaviors in Android Applications by User Interface and Program Behavior Contradiction ,Proceedings of the 36th International Conference on Software Engineering , Hyderabad, India, 2014.

2013

OOPSLA T. Bao and X. Zhang,,
On-the-fly Detection of Instability Problems in Floating-Point Program Execution ,Object Oriented Programming, Systems, Languages and Applications , 2013.
ACSAC Z. Deng, X. Zhang, and D. Xu,
SPIDER: Stealthy Binary Program Instrumentation and Debugging via Hardware Virtualization ,Proceedings of the Annual Computer Security Applications Conference, 2013.
ASE W. N. Sumner and X. Zhang,
Identifying Execution Points For Dynamic Analyses ,Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, 2013.
ASE Y. Kwon, X. Zhang and D. Xu,
PIEtrace: Platform Independent Executable Trace ,Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (Best Paper Award and ACM SIGSOFT Distinguished Paper Award), 2013.
CCS K. H. Lee, X. Zhang and D. Xu,
LogGC: Garbage Collecting Audit Log ,Proceedings of the 20th ACM Conference on Computer and Communications Security, 2013.
CCS J. Zeng, Y. Fu, K. Miller, Z. Lin ,X. Zhang and D. Xu,
Obfuscation Resilient Binary Code Reuse through Trace-oriented Programming ,Proceedings of the 20th ACM Conference on Computer and Communications Security, 2013.
ESORICS Z. Deng ,X. Zhang and D. Xu,
BISTRO: Binary Component Extraction and Embedding for Software Security Applications ,Proceedings of the 18th European Symposium on Research in Computer Security, 2013.
FSE Y. Zheng, X. Zhang, and V. Garnesh,
Z3-str: A Z3-Based String Solver for Web Application Analysis , Proceedings of the 9th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013.
DSN Z. Gu, W. N. Sumner, Z. Deng, X. Zhang, and D. Xu,,
DRIP: A Framework for Purifying Trojaned Kernel Drivers , the 43rd IEEE/IFIP International Conference on Dependable Systems and Networks , 2013.
EuroSec B. Saltaformaggio, D. Xu, and X. Zhang,,
BusMonitor: A Hypervisor-Based Solution for Memory Bus Covert Channels , the 6th European Workshop on Systems Security , 2013.
ICSE Y. Zheng and X. Zhang,,
Path Sensitive Static Analysis of Web Applications for Remote Code Execution Vulnerability Detection , the 35th International Conference on Software Engineering , 2013.
ICSE W. N. Sumner and X. Zhang,,
Comparative Causality: Explaining the Differences Between Executions , the 35th International Conference on Software Engineering , 2013.
NDSS K. H. Lee, X. Zhang, and Dongyan Xu,
High Accuracy Attack Provenance via Binary-based Execution Partition , Network and Distributed System Security Symposium, 2013.

2012

WCRE D. Qi, W. N. Sumner, F. Qin, M. Zheng, X. Zhang and A. Roychoudhury,
Modeling Software Execution Environment , the 19th Working Conference on Reverse Engineering , 2012.
SenSys V. Sundaram, P. Eugster, and X. Zhang,
Prius: Generic Hybrid Trace Compression for Wireless Sensor Networks , the 10th ACM International Conference on Embedded Networked Sensor Systems , 2012.
OOPSLA T. Bao, Y. Zheng, and X. Zhang,
White Box Sampling in Uncertain Data Processing Enabled by Program Analysis , Object Oriented Programming, Systems, Languages and Applications, 2012.
DFRWS Z. Deng, D. Xu, X. Zhang, and X. Jiang,
IntroLib: Efficient and Transparent Library Call Introspection for Malware Forensics , the 12th Annual DFRWS Digital Forensics Conference, 2012.
ICSE Y. Zheng and X. Zhang,
Static Detection of Resource Contention Problems in Server-Side Scripts , the 34th International Conference on Software Engineering, 2012.
ESoSS R. Potharaju, A. Newell, C. Nita-Rotaru, and X. Zhang,
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques , International Symposium on Engineering Secure Software and Systems, 2012.
NDSS Z. Lin, J. Rhee, C. Wu, X. Zhang, and Dongyan Xu,
DIMSUM: Discovering Semantic Data of Interest from Un-mappable Memory with Confidence , Network and Distributed System Security Symposium, 2012.

2011

OOPSLA D. Weeratunge, X. Zhang, and S. Jagannathan,
Accentuating the Positive: Atomicity Inference and Enforcement Using Correct Executions , Object Oriented Programming, Systems, Languages and Applications, 2011.
ISSTA W. N. Sumner and X. Zhang,
Selecting Peers for Execution Comparison , International Symposium on Software Testing and Analysis, 2011.
DSN K. Lee, W. N. Sumner, X. Zhang and P. Eugster,
Unified Debugging of Distributed Systems with Recon ,the 41th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2011.
PLDI K. Lee, Y. Zheng, W. N. Sumner and X. Zhang,
Toward Generating Reducible Replay Log, ACM SIGPLAN Conference on Programming Language Design and Implementation,
San Jose, 2011
WWW Y. Zheng, T. Bao and X. Zhang,
Statically Locating Web Application Bugs Caused by Asynchronous Calls, the 20th International World Wide Web Conference,
India, 2011
ICSE W. N. Sumner, T. Bao, X. Zhang, and S. Prabhakar,
Coalescing Executions for Fast Uncertainty Analysis ,the International Conference of Software Engineering,
Hawaii, 2011
NDSS Z. Lin, J. Rhee, X. Zhang, D. Xu, and X. Jiang,
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures ,the 17th Network and Distributed System Security Symposium, San Diego, US, Feb. 2010

2010

SenSys V. Sundaram, P. Eugster and X. Zhang,
Efficient Diagnostic Tracing Support forWireless Sensor Networks ,the 8th ACM Conference on Embedded Networked Sensor Systems,
2010
SRDS B. Xin, P. Eugster, X. Zhang, and J. Yang
Lightweight Task Graph Inference for Distributed Applications ,the 29th IEEE International Symposium on Reliable Distributed Systems,
New Delhi, India, 2010.
FSE W. N. Sumner and X. Zhang
Memory Indexing: Canonicalizing Addresses Across Executions , the 18th ACM SIGSOFT Symposium on Foundations of Software,
New Mexico, 2010.
ISSTA D. Weeratunge, X. Zhang, W. N. Sumner, and S. Jagannathan
Analyzing Concurrency Bugs using Dual Slicing ,International Symposium on Software Testing and Analysis,
Trento, Italy, 2010
ISSTA T. Bao, Y. Zheng, Z. Lin, X. Zhang and D. Xu
Strict Control Dependence and Its Effect on Dynamic Information Flow Analyses ,International Symposium on Software Testing and Analysis,
Trento, Italy, 2010
DSN Z. Lin, X. Zhang and D. Xu
Reuse-Oriented Camouflaging Trojan: Vulnerability Detection and Attack Construction the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-DCCS 2010),
Chicago, 2010.
ICSE W. N. Sumner, Y. Zheng, D. Weeratunge and X. Zhang
Precise Calling Context Encoding, International Conference on Software Engineering,
Cape Town, South Africa, 2010.
ASPLOS D. Weeratunge, X. Zhang and S. Jagannathan
Analyzing Multicore Dumps to Facilitate Concurrency Bug Reproduction, the 15th International Conference on Architectural Support for Programming Languages and Operating Systems,
Pittsburb, PA, 2010.
NDSS Z. Lin, X. Zhang and D. Xu
Automatic Reverse Engineering of Data Structures from Binary Execution, the 17th Network and Distributed System Security Symposium
San Diego, CA, 2010.

2009

ISSTA B. Xin and X. Zhang
Memory Slicing, International Symposium on Software Testing and Analysis,
Chicago, 2009.
CGO X. Zhang, A. Navabi, and S. Jagannathan
Alchemist: A Transparent Dependence Distance Profling Infrastructure, The International Symposium on Code Generation and Optimization
,March 2009.
FASE W. N. Sumner and X. Zhang
Algorithms for Automatically Computing the Causal Paths of Failures Fundamental Approaches to Software Engineering
York Town, UK, March 2009.

2008

FSE Z. Lin and X. Zhang
Deriving Program Input Syntactic Structure from Execution, the 16th ACM SIGSOFT Symposium on Foundations of Software,
Atlanta, GA, 2008.
COMPSAC S. Tallam, C. Tian, X. Zhang and R. Gupta
Perturbing Program Execution for Avoiding Enviromental Faults the 32nd Annual IEEE International Computer SS oftware and Applications Conference, 2008.
DSN Z. Lin, X. Zhang, and D. Xu
Convicting Remote Exploitable Vulnerabilities: An Efficient Input Provenance Based Approach
Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks, 2008.
PLDI B. Xin, N. Sumner, and X. Zhang
Efficient Program Execution Indexing
ACM SIGPLAN Conference on Programming Language Design and Implementation,
Tucson, 2008.
NDSS Z. Lin, X. Jiang, D. Xu, and X. Zhang
Automatic Protocol Format Reverse Engineering Through Context-Aware Monitored Execution,
Network and Distributed System Security Symposium,
2008.
PPOPP A. Navabi, X. Zhang, and S. Jagannathan
Quasi-Static Scheduling for Safe Futures,
ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming,
Feb. Salt Lake City, Utah

2007

ICSM C. Liu, X. Zhang, J. Han, Y. Zhang, and B. Bhargava
Failure Indexing: A Dynamic Slicing Based Approach,
International Conference on Software Maintenance,
Paris, September 2007.[PPT]
ICSM V. Nagarajan, R. Gupta, X. Zhang, M. Madou, B. De Sutter, and K. De Bosschere
Matching Control Flow of Program Versions,
International Conference on Software Maintenance,
Paris, September 2007.
VLDB Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, Sunil Prabhakar
Tracing Lineage Beyond Relational Operators,
Proc. of the 33rd International Conference on Very Large Databases (VLDB),
Vienna, Austria, Sep. 2007.
ISSTA B. Xin, X. Zhang
Efficient Online Detection of Dynamic Control Dependence,
International Symposium on Software Testing and Analysis,
London, July 2007.
ISSTA S. Tallam, C. Tian, X. Zhang, and R. Gupta
Enabling Tracing of Long-Running Multithreaded Programs via Dynamic Execution Reduction,
International Symposium on Software Testing and Analysis,
London, July 2007.
PLDI X. Zhang, S. Tallam, N. Gupta, and R. Gupta
Towards Locating Execution Omission Errors,
ACM SIGPLAN Conference on Programming Language Design and Implementation,
San Diego, June 2007.

2006

FSE X. Zhang, S. Tallam, and R. Gupta
Dynamic Slicing Long Running Programs through Execution Fast Forwarding,
14th ACM SIGSOFT Symposium on Foundations of Software Engineering,
Portland, Oregon, November 2006.
PLDI X. Zhang, N. Gupta, and R. Gupta
Pruning Dynamic Slices With Confidence,
ACM SIGPLAN Conference on Programming Language Design and Implementation,
Ottawa, Canada, June 2006. 21.3%(36/169)
ICSE X. Zhang, N. Gupta, and R. Gupta
Locating Faults Through Automated Predicate Switching,
IEEE/ACM International Conference on Software Engineering,
Shanghai, China, May 2006. 9% (36/395)

2005

ASE N. Gupta, H. He, X. Zhang, and R. Gupta,
Locating Faulty Code Using Failure-Inducing Chops,
IEEE/ACM International Conference on Automated Software Engineering,
pages 263-272, Long Beach, California, Nov. 2005. 9.6 % (28/291)
AADEBUG X. Zhang, H. He, N. Gupta, and R. Gupta
Experimental Evaluation of Using Dynamic Slices for Fault Location,
SIGSOFT-SIGPLAN Sixth International Symposium on Automated and Analysis-Driven Debugging,
pages 33-42, Monterey, California, September 2005. 36.7% (11/30)
ESEC
-FSE
X. Zhang and R. Gupta,
Matching Execution Histories of Program Versions,
Joint 10th European Software Engineering Conference and
13th ACM SIGSOFT Symposium on the Foundations of Software Engineering
,
pages 197-206, Lisbon, Portugal, September 2005. 15.9% (32/201)
PACT S. Tallam, R. Gupta, and X. Zhang,
Extended Whole Program Paths,
International Conference on Parallel Architectures and Compilation Techniques,
pages 17-26, St. Loius, Missouri, September 2005. 25.2% (30/119)
HPCA Y. Zhang, L. Gao, J. Yang, X. Zhang and R. Gupta,
SENSS: Security Enhancement to Symmeteric Shared Memory Multiprocessors,
IEEE 11th International Symposium on High Performance Computer Architecture,
pages 352-362, San Francisco, California, February 2005. 15.5% (28/181)

2004 and before

MICRO X. Zhang and R. Gupta,
Whole Execution Traces,
IEEE/ACM 37th International Symposium on Microarchitecture,
pages 105-116, Portland, Oregan, December 2004. 18.4% (29/158)
PLDI X. Zhang and R. Gupta,
Cost Effective Dynamic Program Slicing,
ACM SIGPLAN Conference on Programming Language Design and Implementation,
pages 94-106, Washington D.C., June 2004. 20%
ICSE X. Zhang, R. Gupta, and Y. Zhang
Effective Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams,
IEEE/ACM International Conference on Software Engineering,
pages 502-511, Edinburgh, UK, May 2004. 13.3% (58/436)
CGO S. Tallam, X. Zhang, and R. Gupta,
Extending Path Profiling across Loop Backedges and Procedure Boundaries,
Second Annual IEEE/ACM International Symposium on Code Generation and Optimization,
pages 251-262, San Jose, CA, March 2004. 31.6% (27/79)
ICSE Recipient of ICSE 2003 Distinguished Paper Award.
X. Zhang, R. Gupta, and Y. Zhang
Precise Dynamic Slicing Algorithms,
IEEE/ACM International Conference on Software Engineering,
pages 319-329, Portland, Oregon, May 2003. 13.0% (42/324)
CGO X. Zhang and R. Gupta,
Hiding Program Slices for Software Security,
First Annual IEEE/ACM International Symposium on Code Generation and Optimization,
pages 325-336, San Francisco, CA, March 2003. 35.4% (29/82)
ICACI D. Zhang, L. Zhou and X. Zhang,
Enhancing Information Retrieval With Natural Language Processing Technology,
Proceedings of IASTED International Conference on Artificial and Computational Intelligence ,
pages 24-29, Tokyo, Japan, September 2002.

Journal Publications and Book Chapters Before 2014

TOSN V. Sundaram, P. Eugster, X. Zhang and V. Addanki,
Diagnostic Tracing for Wireless Sensor Networks,
ACM Transactions of Sensor Networks, accepted
TSE W. N. Sumner, Y. Zheng, D. Weeratunge and X. Zhang,
Precise Calling Context Encoding
IEEE Transactions of Software Engineering, 2012
SCP A. Navabi, X. Zhang, and S. Jagannanthan,
Dependence Analysis for Safe Futures.
Science of Computer Programming
TSE Z. Lin, X. Zhang, and D. Xu,
Deriving Input Syntactic Structure from Program Execution and Its Applications.
IEEE Transactions of Software Engineering, 2010.
TSE C. Liu, X. Zhang, and J. Han,
A Systematic Study of Failure Proximity,
IEEE Transactions of Software Engineering, 2008
CRC X. Zhang, N. Gupta, and R. Gupta,
Whole Execution Traces and Their Use in Debugging,
The Compiler Design Handbook: Optimizations and Machine Code Generation, Second Edition
Chapter 18, CRC Press.
SP&E X. Zhang, N. Gupta and R. Gupta,
Locating Faulty Code By Multiple Points Slicing,
Software - Practice & Experience,
Vol. 37, Issue 9, pages 935-961, July 2007
ESE X. Zhang, N. Gupta and R. Gupta,
A Study of Effectiveness of Dynamic Slicing in Locating Real Faults,
Empirical Software Engineering,
Vol. 12, No. 2, pages 143-160, April 2007
TACO X. Zhang and R. Gupta,
Whole Execution Traces and their Applications,
ACM Transactions on Architecture and Code Optimization,
Vol. 2, No. 3, pages 301-334, Sept. 2005.
TOPLAS X. Zhang, R. Gupta, and Y. Zhang,
Cost and Precision Tradeoffs of Dynamic Data Slicing Algorithms,
ACM Transactions on Programming Languages and Systems,
Vol. 27, No. 4, pages 631-661, July 2005.