eDoctor: Automatically diagnosing abnormal battery drain issues on smartphones. X Ma, P Huang, X Jin, P Wang, S Park, D Shen, Y Zhou, LK Saul, ... NSDI 13, 57-70, 2013 | 121 | 2013 |
Reassembleable disassembling S Wang, P Wang, D Wu 24th USENIX Security Symposium, 627-642, 2015 | 99 | 2015 |
LibD: Scalable and precise third-party library detection in Android markets M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo Proceedings of the 39th International Conference on Software Engineering …, 2017 | 96 | 2017 |
CacheD: Identifying cache-based timing channels in production software S Wang, P Wang, X Liu, D Zhang, D Wu Proceedings of the 26th USENIX Security Symposium, 2017 | 67 | 2017 |
Credal: Towards locating a memory corruption vulnerability with your core dump J Xu, D Mu, P Chen, X Xing, P Wang, P Liu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 37 | 2016 |
Uroboros: Instrumenting stripped binaries with static reassembling S Wang, P Wang, D Wu 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016 | 36 | 2016 |
Generating precise dependencies for large software P Wang, J Yang, L Tan, R Kroeger, JD Morgenthaler 2013 4th International Workshop on Managing Technical Debt (MTD), 47-50, 2013 | 24 | 2013 |
Translingual Obfuscation P Wang, S Wang, M Jiang, Y Jiang, D Wu 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 128-144, 2016 | 23 | 2016 |
Towards memory safe enclave programming with rust-sgx H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 22 | 2019 |
Semantics-aware machine learning for function recognition in binary code S Wang, P Wang, D Wu 2017 IEEE International Conference on Software Maintenance and Evolution …, 2017 | 20 | 2017 |
Identifying cache-based side channels through secret-augmented abstract interpretation S Wang, Y Bao, X Liu, P Wang, D Zhang, D Wu 28th {USENIX} Security Symposium ({USENIX} Security 19), 657-674, 2019 | 17 | 2019 |
Software protection on the go: A large-scale empirical study on mobile app obfuscation P Wang, Q Bao, L Wang, S Wang, Z Chen, T Wei, D Wu 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE …, 2018 | 16 | 2018 |
Composite software diversification S Wang, P Wang, D Wu 2017 IEEE International Conference on Software Maintenance and Evolution …, 2017 | 11 | 2017 |
Automatic grading of programming assignments: an approach based on formal semantics X Liu, S Wang, P Wang, D Wu 2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019 | 9 | 2019 |
Lambda obfuscation P Lan, P Wang, S Wang, D Wu International Conference on Security and Privacy in Communication Systems …, 2017 | 7 | 2017 |
Turing obfuscation Y Wang, S Wang, P Wang, D Wu International Conference on Security and Privacy in Communication Systems …, 2017 | 7 | 2017 |
Binary code retrofitting and hardening using SGX S Wang, W Wang, Q Bao, P Wang, XF Wang, D Wu Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017 | 6 | 2017 |
Protecting million-user ios apps with obfuscation: motivations, pitfalls, and experience P Wang, D Wu, Z Chen, T Wei 2018 IEEE/ACM 40th International Conference on Software Engineering …, 2018 | 5 | 2018 |
Large-scale third-party library detection in android markets M Li, P Wang, W Wang, S Wang, D Wu, J Liu, R Xue, W Huo, W Zou IEEE Transactions on Software Engineering 46 (9), 981-1003, 2018 | 4 | 2018 |
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries P Wang, J Zhang, S Wang, D Wu 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 1-16, 2020 | 1 | 2020 |