Binary code clone detection across architectures and compiling configurations Y Hu, Y Zhang, J Li, D Gu 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017 | 110 | 2017 |
Cross-architecture binary semantics understanding via similar code comparison Y Hu, Y Zhang, J Li, D Gu 2016 IEEE 23rd international conference on software analysis, evolution, and …, 2016 | 56 | 2016 |
Binmatch: A semantics-based hybrid approach on binary code clone analysis Y Hu, Y Zhang, J Li, H Wang, B Li, D Gu 2018 IEEE international conference on software maintenance and evolution …, 2018 | 47 | 2018 |
A semantics-based hybrid approach on binary code similarity comparison Y Hu, H Wang, Y Zhang, B Li, D Gu IEEE Transactions on Software Engineering 47 (6), 1241-1258, 2019 | 22 | 2019 |
Embroidery: Patching vulnerable binary code of fragmentized android devices X Zhang, Y Zhang, J Li, Y Hu, H Li, D Gu 2017 IEEE International Conference on Software Maintenance and Evolution …, 2017 | 21 | 2017 |
Automatically patching vulnerabilities of binary programs via code transfer from correct versions Y Hu, Y Zhang, D Gu IEEE Access 7, 28170-28184, 2019 | 14 | 2019 |
NativeSpeaker: Identifying crypto misuses in Android native code libraries Q Wang, J Li, Y Zhang, H Wang, Y Hu, B Li, D Gu International Conference on Information Security and Cryptology, 301-320, 2017 | 9 | 2017 |
iservice: Detecting and evaluating the impact of confused deputy problem in appleos Y Wang, Y Hu, X Xiao, D Gu Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 7 | 2022 |
xvmp: An llvm-based code virtualization obfuscator X Xiao, Y Wang, Y Hu, D Gu 2023 IEEE International Conference on Software Analysis, Evolution and …, 2023 | 3 | 2023 |
An empirical study of security issues in SSO server-side implementations H Wang, D Gu, Y Zhang, Y Hu Science China. Information Sciences 65 (7), 179104, 2022 | 2 | 2022 |
ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation A Zhou, Y Hu, X Xu, C Zhang ACM Transactions on Software Engineering and Methodology 33 (4), 1-31, 2024 | 1 | 2024 |
RGDroid: Detecting Android malware with graph convolutional networks against structural attacks Y Li, Y Hu, Y Wang, Y He, H Lu, D Gu 2023 IEEE International Conference on Software Analysis, Evolution and …, 2023 | 1 | 2023 |
Transcode: detecting status code mapping errors in large-scale systems W Tang, Y Hu, G Fan, P Yao, R Wu, G Bai, P Wang, C Zhang 2021 36th IEEE/ACM International Conference on Automated Software …, 2021 | 1 | 2021 |
Strtune: Data Dependence-Based Code Slicing for Binary Similarity Detection With Fine-Tuned Representation K He, Y Hu, X Li, Y Song, Y Zhao, D Gu IEEE Transactions on Information Forensics and Security 19, 10233-10245, 2024 | | 2024 |
On the (In) Security of Manufacturer-Provided Remote Attestation Frameworks in Android Z Zhou, X Xiao, T Hou, Y Hu, D Gu European Symposium on Research in Computer Security, 250-270, 2023 | | 2023 |