AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction J Huang, X Zhang, L Tan, P Wang, B Liang Proceedings of the 36th International Conference on Software Engineering …, 2014 | 291 | 2014 |
Supor: Precise and scalable sensitive user input detection for android apps J Huang, Z Li, X Xiao, Z Wu, K Lu, X Zhang, G Jiang 24th USENIX Security Symposium (USENIX Security 15), 977-992, 2015 | 164 | 2015 |
Profuzzer: On-the-fly input type probing for better zero-day vulnerability discovery W You, X Wang, S Ma, J Huang, X Zhang, XF Wang, B Liang 2019 IEEE Symposium on Security and Privacy (SP), 769-786, 2019 | 140 | 2019 |
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching J Huang, S Han, W You, W Shi, B Liang, J Wu, Y Wu IEEE Transactions on Information Forensics and Security 16, 2144-2156, 2021 | 62 | 2021 |
Precise Android API Protection Mapping Derivation and Reasoning Y Aafer, G Tao, J Huang, X Zhang, N Li Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 61 | 2018 |
Automatic model generation from documentation for Java API functions J Zhai, J Huang, S Ma, X Zhang, L Tan, J Zhao, F Qin 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016 | 61 | 2016 |
NAR-miner: discovering negative association rules from code for bug detection P Bian, B Liang, W Shi, J Huang, Y Cai Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018 | 51 | 2018 |
Malicious Web Pages Detection Based on Abnormal Visibility Recognition B Liang, J Huang, F Liu, D Wang, D Dong, Z Liang 2009 International Conference on E-Business and Information System Security, 1-5, 2009 | 50 | 2009 |
Detecting sensitive data disclosure via bi-directional text correlation analysis J Huang, X Zhang, L Tan Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 37 | 2016 |
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection Y Aafer, J Huang, Y Sun, X Zhang, N Li, C Tian 25th Annual Network and Distributed System Security Symposium, NDSS, 18-21, 2018 | 33 | 2018 |
Android permission re-delegation detection and test case generation J Zhong, J Huang, B Liang 2012 International Conference on Computer Science and Service System, 871-874, 2012 | 16 | 2012 |
UI driven Android application reduction J Huang, Y Aafer, D Perry, X Zhang, C Tian Proceedings of the 32nd IEEE/ACM International Conference on Automated …, 2017 | 15 | 2017 |
SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed P Bian, B Liang, J Huang, W Shi, X Wang, J Zhang Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 14 | 2020 |
We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature B Liang, J Li, J Huang arXiv preprint arXiv:2106.05261, 2021 | 10 | 2021 |
Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts J Huang, J Jiang, W You, B Liang IEEE Transactions on Computers 71 (7), 1551-1563, 2021 | 6 | 2021 |
Do not jail my app: Detecting the Android plugin environments by time lag contradiction Y Wu, J Huang, B Liang, W Shi Journal of Computer Security 28 (2), 269-293, 2020 | 6 | 2020 |
Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering J Huang, B Xue, J Jiang, W You, B Liang, J Wu, Y Wu IEEE Transactions on Software Engineering 49 (4), 2272-2284, 2022 | 4 | 2022 |
Vulnerabilities static detection for Web applications with false positive suppression J Huang, B Liang, J Zhong, Q Wang, J Cai 2010 IEEE International Conference on Information Theory and Information …, 2010 | 4 | 2010 |
Hunting bugs with accelerated optimal graph vertex matching X Zhang, Y Gong, B Liang, J Huang, W You, W Shi, J Zhang Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 3 | 2022 |
基于植入特征的网页恶意代码检测 黄建军, 梁彬 清华大学学报: 自然科学版, 2208-2214, 2009 | 3 | 2009 |