关注
Pei Wang
Pei Wang
在 google.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
LibD: Scalable and precise third-party library detection in Android markets
M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo
Proceedings of the 39th International Conference on Software Engineering …, 2017
1852017
Reassembleable disassembling
S Wang, P Wang, D Wu
24th USENIX Security Symposium, 627-642, 2015
1682015
CacheD: Identifying cache-based timing channels in production software
S Wang, P Wang, X Liu, D Zhang, D Wu
Proceedings of the 26th USENIX Security Symposium, 2017
1432017
eDoctor: Automatically diagnosing abnormal battery drain issues on smartphones.
X Ma, P Huang, X Jin, P Wang, S Park, D Shen, Y Zhou, LK Saul, ...
NSDI 13, 57-70, 2013
1372013
Towards memory safe enclave programming with rust-sgx
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
942019
Automatic grading of programming assignments: an approach based on formal semantics
X Liu, S Wang, P Wang, D Wu
2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019
692019
Uroboros: Instrumenting stripped binaries with static reassembling
S Wang, P Wang, D Wu
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
642016
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation
S Wang, Y Bao, X Liu, P Wang, D Zhang, D Wu
28th USENIX security symposium (USENIX security 19), 657-674, 2019
572019
Credal: Towards locating a memory corruption vulnerability with your core dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
542016
Semantics-aware machine learning for function recognition in binary code
S Wang, P Wang, D Wu
2017 IEEE International Conference on Software Maintenance and Evolution …, 2017
452017
Software protection on the go: A large-scale empirical study on mobile app obfuscation
P Wang, Q Bao, L Wang, S Wang, Z Chen, T Wei, D Wu
Proceedings of the 40th International Conference on Software Engineering, 26-36, 2018
332018
Generating precise dependencies for large software
P Wang, J Yang, L Tan, R Kroeger, JD Morgenthaler
2013 4th International Workshop on Managing Technical Debt (MTD), 47-50, 2013
322013
Translingual Obfuscation
P Wang, S Wang, M Jiang, Y Jiang, D Wu
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 128-144, 2016
312016
Composite software diversification
S Wang, P Wang, D Wu
2017 IEEE International Conference on Software Maintenance and Evolution …, 2017
202017
Binary code retrofitting and hardening using SGX
S Wang, W Wang, Q Bao, P Wang, XF Wang, D Wu
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
182017
Large-scale third-party library detection in android markets
M Li, P Wang, W Wang, S Wang, D Wu, J Liu, R Xue, W Huo, W Zou
IEEE Transactions on Software Engineering 46 (9), 981-1003, 2018
172018
Lambda obfuscation
P Lan, P Wang, S Wang, D Wu
Security and Privacy in Communication Networks: 13th International …, 2018
162018
If it’s not secure, it should not compile: Preventing DOM-based XSS in large-scale web development with API hardening
P Wang, J Bangert, C Kern
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
132021
Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave Development
P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing
The ACM/IEEE 42nd International Conference on Software Engineering: Software …, 2020
122020
Turing obfuscation
Y Wang, S Wang, P Wang, D Wu
Security and Privacy in Communication Networks: 13th International …, 2018
112018
系统目前无法执行此操作,请稍后再试。
文章 1–20