publications
# students supervised (or co-supervised) by me, * co-first author, † corresponding author
2024
-
JSimpo: Structural Deobfuscation of JavaScript ProgramsACM Transactions on Software Engineering and Methodology (TOSEM), 2024
-
NodLink: An Online System for Fine-Grained APT Attack Detection and InvestigationIn Network and Distributed System Security Symposium (NDSS) , 2024
-
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLIn IEEE Symposium on Security and Privacy (S&P), 2024
2023
-
Towards OS Heterogeneity Aware Cluster Management for HPCIn ACM SIGOPS Asia-Pacific Workshop on Systems (APSys), 2023
-
Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM ApplicationsIn the ACM Conference on Computer and Communications Security (CCS), 2023
-
SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic ExecutionIn the ACM Conference on Computer and Communications Security (CCS), 2023
-
APIMind: an API-Driven Automated Tool for Assessing Runtime Description-to-Permission Fidelity in Android AppsIn IEEE International Symposium on Software Reliability Engineering (ISSRE), 2023
-
ReSPlay: Improving Cross-Platform Record-and-Replay with GUI Sequence MatchingIn IEEE International Symposium on Software Reliability Engineering (ISSRE), 2023
-
Towards OS Heterogeneity Aware Cluster Management for HPCIn ACM SIGOPS Asia-Pacific Workshop on Systems (APSys), 2023
-
How Android Apps Break the Data Minimization Principle: An Empirical StudyIn IEEE/ACM International Conference on Automated Software Engineering (ASE), 2023
-
Fuzzing the Latest NTFS in Linux with Papora: An Empirical StudyIn IEEE Workshop on Offensive Technologies (WOOT), 2023
-
DISTDET: A Cost-Effective Distributed Cyber Threat Detection SystemIn Proceedings of the USENIX Security Symposium (Security), 2023
-
FedSlice: Protecting Federated Learning Models from Malicious Participants with Model SlicingIn Proceedings of the International Conference on Software Engineering (ICSE), 2023
-
Beyond Fine-Tuning: Efficient and Effective Fed-Tuning for Mobile/Web UsersIn Proceedings of the International World Wide Web Conference (WWW), 2023
-
Eunomia: Enabling User-specified Fine-Grained Search in Symbolic ExecutionIn Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2023
-
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its MitigationIn Proceedings of the USENIX Security Symposium (Security), 2023
-
Are We There Yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response ToolsIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2023
-
Detecting Malicious Websites from the Perspective of System Provenance AnalysisIEEE Transactions on Dependable and Secure Computing (TDSC), 2023
-
Adonis : Practical and Efficient Control Flow Recovery through OS-Level TracesACM Transactions on Software Engineering and Methodology (TOSEM), 2023
-
FaaSLight: General Application-Level Cold-Start Latency Optimization for Function-as-a-Service in Serverless ComputingACM Transactions on Software Engineering and Methodology, 2023
2022
-
ReMoS: reducing defect inheritance in transfer learning via relevant model slicingIn Proceedings of the International Conference on Software Engineering (ICSE), 2022
-
DistFL: Distribution-aware Federated Learning for Mobile ScenariosProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (Ubicomp), 2022
-
Teeslice: slicing dnn models for secure and efficient deploymentIn Proceedings of the ACM International Workshop on AI and Software Testing/Analysis, 2022
2021
-
Structural Temporal Graph Neural Networks for Anomaly Detection in Dynamic GraphsIn Proceedings of the 30th ACM international conference on Information & Knowledge Management, 2021
-
SIGL: Securing Software Installations Through Deep Graph Learning.In Proceedings of the USENIX Security Symposium (Security), 2021
-
SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression.In Proceedings of the USENIX Security Symposium (Security), 2021
2020
-
Temporal Context-Aware Representation Learning for Question RoutingIn Proceedings of the International Conference on Web Search and Data Mining (WSDM), 2020
-
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.In Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2020
-
APTrace: A responsive system for agile enterprise level causality analysisIn Proceedings of the IEEE International Conference on Data Engineering (ICDE), 2020
-
Querying Streaming System Monitoring Data for Enterprise System Anomaly DetectionIn 2020 IEEE 36th International Conference on Data Engineering (ICDE), 2020
-
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storageIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2020
2019
-
Nodoze: Combatting threat alert fatigue with automated provenance triageIn Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2019
-
Attentional Heterogeneous Graph Neural Network: Application to Program ReidentificationIn Proceedings of the SIAM International Conference on Data Mining, 2019
-
Countering Malicious Processes with Process-DNS Association.In Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2019
-
Progressive Processing of System-Behavioral QueryIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2019
2018
-
Towards a Timely Causality Analysis for Enterprise SecurityIn Proceedings of the Network and Distributed System Security Symposium (NDSS), 2018
-
Remove Rats from Your Code: Automated Optimization of Resource Inefficient Database Writes for Mobile ApplicationsIn Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2018
-
{SAQL}: A Stream-based Query System for Real-time Abnormal System Behavior DetectionIn Proceedings of the USENIX Security Symposium (Security), 2018
-
Nodemerge: Template Based Efficient Data Reduction for Big-data Causality AnalysisIn Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2018
2017
-
Detecting Display Energy Hotspots in Android AppsSoftware Testing, Verification and Reliability, 2017
2016
-
Automated Energy Optimization of HTTP Requests for Mobile ApplicationsIn Proceedings of the International Conference on Software Engineering (ICSE), 2016
-
Lightweight Measurement and Estimation of Mobile Ad Energy ConsumptionIn Proceedings of the International Workshop on Green and Sustainable Software, 2016
2015
-
String analysis for Java and Android applicationsIn Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), 2015
-
Nyx: A Display Energy Optimizer for Mobile Web AppsIn Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), 2015
-
Optimizing Energy of HTTP Requests in Android ApplicationsIn Proceedings of the International Workshop on Software Development Lifecycle for Mobile, 2015
-
Domino: understanding wide-area, asynchronous event causality in web applicationsIn Proceedings of the ACM Symposium on Cloud Computing (SoCC), 2015
-
Optimizing display energy consumption for hybrid Android apps (invited talk)In Proceedings of the International Workshop on Software Development Lifecycle for Mobile, 2015
2014
-
Making Web Applications More Energy Efficient for OLED SmartphonesIn Proceedings of the International Conference on Software Engineering (ICSE), 2014
-
An Investigation Into Energy-Saving Programming Practices for Android Smartphone App DevelopmentIn Proceedings of the International Workshop on Green and Sustainable Software (Greens), 2014
-
Integrated Energy-Directed Test Suite OptimizationIn Proceedings of the International Symposium on Software Testing and Analysis (ISSTA), 2014
-
An Empirical Study of the Energy Consumption of Android ApplicationsIn Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2014
2013
-
Energy-Directed Test Suite OptimizationIn Proceedings of the International Workshop on Green and Sustainable Software (GREENS), 2013
-
Estimating Mobile Application Energy Consumption Using Program AnalysisIn Proceedings of the International Conference on Software Engineering (ICSE), 2013
-
Sif: A Selective Instrumentation Framework for Mobile ApplicationsIn Proceeding of the Annual International Conference on Mobile systems, Applications, and Services (Mobisys), 2013
-
Calculating Source Line Level Energy Information for Android ApplicationsIn Proceedings of the International Symposium on Software Testing and Analysis (ISSTA), 2013
2012
-
Estimating Android Applications’ CPU Energy Usage via Bytecode ProfilingIn Proceedings of the International Workshop on Green and Sustainable Software (GREENS), 2012