关注
Daoyuan Wu
Daoyuan Wu
HKUST; NTU; CUHK; SMU; PolyU
在 cse.ust.hk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Gptscan: Detecting logic vulnerabilities in smart contracts by combining gpt with program analysis
Y Sun, D Wu, Y Xue, H Liu, H Wang, Z Xu, X Xie, Y Liu
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
49*2024
On the accuracy of smartphone-based mobile network measurement
W Li, RKP Mok, D Wu, RKC Chang
2015 IEEE Conference on Computer Communications (INFOCOM), 370-378, 2015
442015
Analyzing Android Browser Apps for file:// Vulnerabilities
D Wu, RKC Chang
Information Security Conference (ISC), 345-363, 2014
362014
MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance
D Wu, RKC Chang, W Li, EKT Cheng, D Gao
2017 USENIX Annual Technical Conference (ATC 17), 445-457, 2017
33*2017
Understanding open ports in Android applications: Discovery, diagnosis, and security assessment
D Wu, D Gao, RKC Chang, E He, EKT Cheng, RH Deng
NDSS, 2019
272019
Measuring the declared SDK versions and their consistency with API calls in Android apps
D Wu, X Liu, J Xu, D Lo, D Gao
Wireless Algorithms, Systems, and Applications: 12th International …, 2017
272017
SCLib: A practical and lightweight defense against component hijacking in Android applications
D Wu, Y Cheng, D Gao, Y Li, RH Deng
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
25*2018
On extracting specialized code abilities from large language models: A feasibility study
Z Li, C Wang, P Ma, C Liu, S Wang, D Wu, C Gao, Y Liu
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
23*2024
Towards understanding Android system vulnerabilities: techniques and insights
D Wu, D Gao, EKT Cheng, Y Cao, J Jiang, RH Deng
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
222019
Indirect File Leaks in Mobile Applications
D Wu, RKC Chang
IEEE Mobile Security Technologies (MoST), in conjunction with S&P (Oakland) 2015, 2015
222015
LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning
Y Sun, D Wu, Y Xue, H Liu, W Ma, L Zhang, M Shi, Y Liu
arXiv preprint arXiv:2401.16185, 2024
212024
Split and merge: Aligning position biases in large language model based evaluators
Z Li, C Wang, P Ma, D Wu, S Wang, C Gao, Y Liu
arXiv preprint arXiv:2310.01432, 2023
202023
A sink-driven approach to detecting exposed component vulnerabilities in android apps
D Wu, X Luo, RKC Chang
arXiv preprint arXiv:1405.6282, 2014
182014
Deep-learning–based app sensitive behavior surveillance for Android powered cyber–physical systems
H Ma, J Tian, K Qiu, D Lo, D Gao, D Wu, C Jia, T Baker
IEEE Transactions on Industrial Informatics 17 (8), 5840-5850, 2020
162020
Towards dynamically monitoring android applications on non-rooted devices in the wild
X Tang, Y Lin, D Wu, D Gao
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
162018
Stack layout randomization with minimal rewriting of Android binaries
Y Liang, X Ma, D Wu, X Tang, D Gao, G Peng, C Jia, H Zhang
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
152016
When program analysis meets bytecode search: Targeted and efficient inter-procedural analysis of modern Android apps in BackDroid
D Wu, D Gao, RH Deng, CR KC
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
142021
Toward accurate network delay measurement on android phones
W Li, D Wu, RKC Chang, RKP Mok
IEEE Transactions on Mobile Computing 17 (3), 717-732, 2017
142017
An empirical study of blockchain system vulnerabilities: Modules, types, and patterns
X Yi, D Wu, L Jiang, Y Fang, K Zhang, W Zhang
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
10*2022
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects
X Yi, Y Fang, D Wu, L Jiang
NDSS, 2023
92023
系统目前无法执行此操作,请稍后再试。
文章 1–20