Gptscan: Detecting logic vulnerabilities in smart contracts by combining gpt with program analysis Y Sun, D Wu, Y Xue, H Liu, H Wang, Z Xu, X Xie, Y Liu Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | 49* | 2024 |
On the accuracy of smartphone-based mobile network measurement W Li, RKP Mok, D Wu, RKC Chang 2015 IEEE Conference on Computer Communications (INFOCOM), 370-378, 2015 | 44 | 2015 |
Analyzing Android Browser Apps for file:// Vulnerabilities D Wu, RKC Chang Information Security Conference (ISC), 345-363, 2014 | 36 | 2014 |
MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance D Wu, RKC Chang, W Li, EKT Cheng, D Gao 2017 USENIX Annual Technical Conference (ATC 17), 445-457, 2017 | 33* | 2017 |
Understanding open ports in Android applications: Discovery, diagnosis, and security assessment D Wu, D Gao, RKC Chang, E He, EKT Cheng, RH Deng NDSS, 2019 | 27 | 2019 |
Measuring the declared SDK versions and their consistency with API calls in Android apps D Wu, X Liu, J Xu, D Lo, D Gao Wireless Algorithms, Systems, and Applications: 12th International …, 2017 | 27 | 2017 |
SCLib: A practical and lightweight defense against component hijacking in Android applications D Wu, Y Cheng, D Gao, Y Li, RH Deng Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 25* | 2018 |
On extracting specialized code abilities from large language models: A feasibility study Z Li, C Wang, P Ma, C Liu, S Wang, D Wu, C Gao, Y Liu Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | 23* | 2024 |
Towards understanding Android system vulnerabilities: techniques and insights D Wu, D Gao, EKT Cheng, Y Cao, J Jiang, RH Deng Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019 | 22 | 2019 |
Indirect File Leaks in Mobile Applications D Wu, RKC Chang IEEE Mobile Security Technologies (MoST), in conjunction with S&P (Oakland) 2015, 2015 | 22 | 2015 |
LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning Y Sun, D Wu, Y Xue, H Liu, W Ma, L Zhang, M Shi, Y Liu arXiv preprint arXiv:2401.16185, 2024 | 21 | 2024 |
Split and merge: Aligning position biases in large language model based evaluators Z Li, C Wang, P Ma, D Wu, S Wang, C Gao, Y Liu arXiv preprint arXiv:2310.01432, 2023 | 20 | 2023 |
A sink-driven approach to detecting exposed component vulnerabilities in android apps D Wu, X Luo, RKC Chang arXiv preprint arXiv:1405.6282, 2014 | 18 | 2014 |
Deep-learning–based app sensitive behavior surveillance for Android powered cyber–physical systems H Ma, J Tian, K Qiu, D Lo, D Gao, D Wu, C Jia, T Baker IEEE Transactions on Industrial Informatics 17 (8), 5840-5850, 2020 | 16 | 2020 |
Towards dynamically monitoring android applications on non-rooted devices in the wild X Tang, Y Lin, D Wu, D Gao Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018 | 16 | 2018 |
Stack layout randomization with minimal rewriting of Android binaries Y Liang, X Ma, D Wu, X Tang, D Gao, G Peng, C Jia, H Zhang Information Security and Cryptology-ICISC 2015: 18th International …, 2016 | 15 | 2016 |
When program analysis meets bytecode search: Targeted and efficient inter-procedural analysis of modern Android apps in BackDroid D Wu, D Gao, RH Deng, CR KC 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 14 | 2021 |
Toward accurate network delay measurement on android phones W Li, D Wu, RKC Chang, RKP Mok IEEE Transactions on Mobile Computing 17 (3), 717-732, 2017 | 14 | 2017 |
An empirical study of blockchain system vulnerabilities: Modules, types, and patterns X Yi, D Wu, L Jiang, Y Fang, K Zhang, W Zhang Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 10* | 2022 |
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects X Yi, Y Fang, D Wu, L Jiang NDSS, 2023 | 9 | 2023 |