1. Define-Use Guided Path Exploration for Better Forced Execution
    Dongnan He, Dongchen Xie, Yujie Wang, Wei You, Bin Liang, Jianjun Huang, Wenchang Shi, Zhuo Zhang, Xiangyu Zhang,
    Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024)
    Vienna, Austria, September, 2024
  1. CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking
    Zian Su, Xiangzhe Xu, Ziyang Huang, Zhuo Zhang, Yapeng Ye, Jianjun Huang, Xiangyu Zhang
    Proceedings of the 2024 ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2024)
    Porto de Galinhas, Brazil, July, 2024
  1. Consolidating Smart Contracts with Behavioral Contracts
    Guannan Wei, Danning Xie, Wuqi Zhang, Yongwei Yuan, Zhuo Zhang*,
    Proceedings of the ACM on Programming Languages Volume 8 Issue PLDI (PLDI 2024)
    Copenhagen, Demark, June, 2024
  1. On Large Language Models’ Resilience to Coercive Interrogation
    Zhuo Zhang, Guangyu Sheng, Guanhong Tao, Siyuan Cheng, Xiangyu Zhang,
    Proceedings of the 45th IEEE Symposium on Security and Privacy (Oakland 2024)
    San Francisco, CA, May, 2024
  1. Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts
    Wuqi Zhang, Zhuo Zhang, Qingkai Shi, Lu Liu, Lili Wei, Yepang Liu, Xiangyu Zhang, Shing-Chi Cheung
    Proceedings of the 45th IEEE Symposium on Security and Privacy (Oakland 2024)
    San Francisco, CA, May, 2024
  1. ODSCAN: Backdoor Scanning for Object Detection Models
    Siyuan Cheng, Guangyu Shen, Guanhong Tao, Kaiyuan Zhang, Zhuo Zhang, Shengwei An, Xiangzhe Xu, Yingqi Liu, Shiqing Ma, Xiangyu Zhang
    Proceedings of the 45th IEEE Symposium on Security and Privacy (Oakland 2024)
    San Francisco, CA, May, 2024
  1. FuzzInMem: Fuzzing Programs via In-memory Structures
    Xuwei Liu, Wei You, Yapeng Ye, Zhuo Zhang, Jianjun Huang, Xiangyu Zhang
    Proceedings of the 46st ACM/IEEE International Conference on Software Engineering (ICSE 2024)
    Lisbon, Portugal, April, 2024
  1. Threat Behavior Textual Search by Attention Graph Isomorphism
    Chanwoo Bae, Guanhong Tao, Zhuo Zhang, Xiangyu Zhang
    Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2024)
    St. Julians, Malta, March, 2024
  1. LmPa: Improving Decompilation by Synergy of Large Language Model and Program Analysis
    Xiangzhe Xu, Zhuo Zhang, Zian Su, Ziyang Huang, Shiwei Feng, Yapeng Ye, Nan Jiang, Danning Xie, Siyuan Cheng, Lin Tan, Xiangyu Zhang
    ArXiv:2306.02546
  1. ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP
    Lu Yan, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Xuan Chen, Guangyu Shen, Xiangyu Zhang
    Proceedings of Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS 2023)
    New Orleans, LA, December, 2023
  1. PEM: Representing Binary Program Semantics for Similarity Analysis via A Probabilistic Execution Model
    Xiangzhe Xu, Zhou Xuan, Shiwei Feng, Siyuan Cheng, Yapeng Ye, Qingkai Shi, Guanhong Tao, Le Yu, Zhuo Zhang, Xiangyu Zhang,
    Proceedings of the 2023 ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2023)
    San Francisco, CA, December, 2023
  1. Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract
    Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Kaiyuan Zhang
    Proceedings of the 32nd USENIX Security Symposium (Security 2023)
    Anaheim, CA, August, 2023
  1. Pelican: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis   Logo
    Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang
    Proceedings of the 32nd USENIX Security Symposium (Security 2023)
    Anaheim, CA, August, 2023
  1. Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis
    Xiangzhe Xu, Shiwei Feng, Yapeng Ye, Guangyu Shen, Zian Su, Siyuan Cheng, Guanhong Tao, Qingkai Shi, Zhuo Zhang, Xiangyu Zhang,
    Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023)
    Seattle, WA, July, 2023
  1. Demystifying Exploitable Bugs in Smart Contracts
    Zhuo Zhang, Brian Zhang, Wen Xu, Zhiqiang Lin
    Proceedings of the 45st ACM/IEEE International Conference on Software Engineering (ICSE 2023)
    Melbourne, Australia, May 2023
  1. D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling
    Yapeng Ye, Zhuo Zhang, Qingkai Shi, Yousra Aafer, Xiangyu Zhang
    Proceedings of the 44th IEEE Symposiums on Security and Privacy (Oakland 2023)
    San Francisco, CA, May 2023
  1. Poirot: Probabilistically Recommending Protections for the Android Framework
    Zeinab El-Rewini, Zhuo Zhang, Yousra Aafer
    Proceedings of the 29th Conference on Computer and Communications Security (CCS 2022)
    Los Angeles, CA, November 2022
  1. Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense
    Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang
    Proceedings of Thirty-ninth International Conference on Machine Learning (ICML 2022)
    Baltimore, Maryland, July 2022
  1. TensileFuzz: Facilitating Seed Input Generation in Fuzzing via String Constraint Solving
    Xuwei Liu, Wei You, Zhuo Zhang, Xiangyu Zhang
    Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2022)
    Virtual, July 2022
  1. Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security
    Guanhong Tao, Yingqi Liu, Guangyu Shen, Qiuling Xu, Shengwei An, Zhuo Zhang, Xiangyu Zhang
    Proceedings of the 43th IEEE Symposiums on Security and Privacy (Oakland 2022)
    Oakland, CA, May 2022
  1. StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting   Logo
    Zhuo Zhang, Wei You, Guanhong Tao, Yousra Aafer, Xuwei Liu, Xiangyu Zhang
    🏆   CSAW 2021 Best Applied Security Paper Award TOP-10 Finalists
    Proceedings of the 42th IEEE Symposiums on Security and Privacy (Oakland 2021)
    Virtually, May 2021
  1. OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary   Logo
    Zhuo Zhang, Yapeng Ye, Wei You, Guanhong Tao, Wen-chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang
    Proceedings of the 42th IEEE Symposiums on Security and Privacy (Oakland 2021)
    Virtually, May 2021
  1. NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces
    Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu
    Proceedings of the 28th Network and Distributed System Security Symposium (NDSS 2021)
    Virtually, February 2021
  1. ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation
    Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela Ciocarlie, Vinod Yegneswaran, Ashish Gehani
    Proceedings of the 28th Network and Distributed System Security Symposium (NDSS 2021)
    Virtually, February 2021
  1. PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning
    Wei You, Zhuo Zhang, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Makena Harmon, Xiangyu Zhang
    Proceedings of the 41th IEEE Symposiums on Security and Privacy (Oakland 2020)
    Virtually, May 2020
  1. BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-Program Path Sampling and Per-Path Abstract Interpretation Logo
    Zhuo Zhang, Wei You, Guanhong Tao, Guannan Wei, Yonghwi Kwon, Xiangyu Zhang
    🏆   ACM SIGPLAN Distinguished Paper Award
    Proceedings of the ACM on Programming Languages Volume 3 Issue OOPSLA (OOPSLA 2019)
    Athens, Greece, October 2019
  1. Probabilistic Disassembly
    Kenneth Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang, Xiangyu Zhang, Zhiqiang Lin
    Proceedings of the 41st ACM/IEEE International Conference on Software Engineering (ICSE 2019)
    Montréal, QC, Canada, May 2019