Order matters: Semantic-aware neural networks for binary code similarity detection Z Yu, R Cao, Q Tang, S Nie, J Huang, S Wu Proceedings of the AAAI conference on artificial intelligence 34 (01), 1145-1152, 2020 | 239 | 2020 |
Codecmr: Cross-modal retrieval for function-level binary source code matching Z Yu, W Zheng, J Wang, Q Tang, S Nie, S Wu Advances in Neural Information Processing Systems 33, 3872-3883, 2020 | 86 | 2020 |
Are your sensitive attributes private? novel model inversion attribute inference attacks on classification models S Mehnaz, SV Dibbo, R De Viti, E Kabir, BB Brandenburg, S Mangard, ... 31st USENIX Security Symposium (USENIX Security 22), 4579-4596, 2022 | 76 | 2022 |
Too good to be safe: Tricking lane detection in autonomous driving with crafted perturbations P Jing, Q Tang, Y Du, L Xue, X Luo, T Wang, S Nie, S Wu 30th USENIX Security Symposium (USENIX Security 21), 3237-3254, 2021 | 66 | 2021 |
Rolling colors: Adversarial laser exploits against traffic light recognition C Yan, Z Xu, Z Yin, S Mangard, X Ji, W Xu, K Zhao, Y Zhou, T Wang, G Gu, ... 31st USENIX Security Symposium (USENIX Security 22), 1957-1974, 2022 | 51 | 2022 |
Evaluating and improving neural program-smoothing-based fuzzing M Wu, L Jiang, J Xiang, Y Zhang, G Yang, H Ma, S Nie, S Wu, H Cui, ... Proceedings of the 44th International Conference on Software Engineering …, 2022 | 33 | 2022 |
Unleashing the power of compiler intermediate representation to enhance neural program embeddings Z Li, P Ma, H Wang, S Wang, Q Tang, S Nie, S Wu Proceedings of the 44th International Conference on Software Engineering …, 2022 | 31 | 2022 |
Third-party library dependency for large-scale sca in the c/c++ ecosystem: How far are we? L Jiang, H Yuan, Q Tang, S Nie, S Wu, Y Zhang Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 19 | 2023 |
Refining decompiled c code with large language models WK Wong, H Wang, Z Li, Z Liu, S Wang, Q Tang, S Nie, S Wu arXiv preprint arXiv:2310.06530, 2023 | 17 | 2023 |
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis A Jia, M Fan, W Jin, X Xu, Z Zhou, Q Tang, S Nie, S Wu, T Liu ACM Transactions on Software Engineering and Methodology 32 (4), 1-26, 2023 | 16 | 2023 |
Towards automatically reverse engineering vehicle diagnostic protocols L Yu, Y Liu, P Jing, X Luo, L Xue, K Zhao, Y Zhou, T Wang, G Gu, S Nie, ... 31st USENIX Security Symposium (USENIX Security 22), 1939-1956, 2022 | 15 | 2022 |
Enhancing dnn-based binary code function search with low-cost equivalence checking H Wang, P Ma, Y Yuan, Z Liu, S Wang, Q Tang, S Nie, S Wu IEEE Transactions on Software Engineering 49 (1), 226-250, 2022 | 14 | 2022 |
sem2vec: Semantics-aware Assembly Tracelet Embedding H Wang, P Ma, S Wang, Q Tang, S Nie, S Wu ACM Transactions on Software Engineering and Methodology 32 (4), 1-34, 2023 | 12 | 2023 |
Binaryai: binary software composition analysis via intelligent binary source code matching L Jiang, J An, H Huang, Q Tang, S Nie, S Wu, Y Zhang Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | 9 | 2024 |
Revisiting automotive attack surfaces: A practitioners’ perspective P Jing, Z Cai, Y Cao, L Yu, Y Du, W Zhang, C Qian, X Luo, S Nie, S Wu 2024 IEEE Symposium on Security and Privacy (SP), 2348-2365, 2024 | 7 | 2024 |
Comparing One with Many--Solving Binary2source Function Matching Under Function Inlining A Jia, M Fan, X Xu, W Jin, H Wang, Q Tang, S Nie, S Wu, T Liu arXiv preprint arXiv:2210.15159, 2022 | 3 | 2022 |
Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial Programs WK Wong, H Wang, P Ma, S Wang, M Jiang, TY Chen, Q Tang, S Nie, ... 2022 IEEE International Conference on Software Maintenance and Evolution …, 2022 | 3 | 2022 |
Tbdetector: Transformer-based detector for advanced persistent threats with provenance graph N Wang, X Wen, D Zhang, X Zhao, J Ma, M Luo, S Nie, S Wu, J Liu arXiv preprint arXiv:2304.02838, 2023 | 2 | 2023 |
Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis H Wang, Z Liu, S Wang, Y Wang, Q Tang, S Nie, S Wu 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P), 506-523, 2024 | 1 | 2024 |
1-to-1 or 1-to-n? Investigating the effect of function inlining on binary similarity analysis A Jia, M Fan, W Jin, X Xu, Z Zhou, Q Tang, S Nie, S Wu, T Liu arXiv preprint arXiv:2112.12928, 2021 | 1 | 2021 |