Current Projects
- IoT Attacks and Defenses: USENIX Security'21, NDSS'21, Oakland'22, USENIX Security'23, MobiSys'23, USENIX Security'24, MobiCom'25, USENIX Security'25
- IoT Pairing and Authentication: MobiCom'19, CCS'20, MobiSys'22, MobiCom'22, UbiComp'22, TDSC'22, TMC'24, USENIX Security'24, TDSC'25
- Natural Language Processing Inspired Binary Code Analysis: NDSS'19, USENIX Security'23
- Adversarial Machine Learning: USENIX Security'25, ICCV'25
Past Projects
- Insecurity Analysis of Middleware on Mobile Platforms (MobiSys'17, TMC'19)
- Android Application Repackaging and Tampering Detection (CGO'18, TDSC'19)
- Wolverine: A Self-evolving Business Continuity Protector (DSN'15, DSN'19)
- DeltaPath: Precise and Scalable Calling Context Encoding (CGO'14)
- Kruiser: A Concurrent Kernel Heap Protector (NDSS'12)
- Cruiser: A Lock-free Concurrent User-space Memory Monitor (PLDI'11)
- Safe Query Processing in Multi-party Distributed Databases (TKDE)
Software Release
- Fuzzing assisted dynamic symbolic execution: the first IoT-app fuzzer in the literature (ACSAC'21)
- Erase-and-Restore: Accurate and Model-Agnostic Detection of L2 Adversarial Examples (AsiaCCS'21)
- InnerEye: Neural Machine Translation Inspired Binary Code Similarity Comparison (NDSS'19)
- MVP-Ears: Multiversion Programming Inspired Detection of Audio Adversarial Examples (DSN'19)
- AEPecker: Detecting and Rectifying L0 Adversarial Examples (RAID'19)
- Centaur: Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation (MobiSys'17)
- Cruiser: A Shared Library Protecting Your Heap Memory Transparently and Efficiently (PLDI'11)