2020-05-26Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks(S&P 2016)papers / security / others
2020-05-19BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals(NDSS 2019)papers / security / mobile_security
2020-05-18LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment through Program Metrics(ICSE 2019)papers / security / automatic_analyse
2020-05-11B2SFinder——Detecting Open-Source Software Reuse in COTS Software(ASE 2019)papers / security / automatic_analyse
2021-10-22Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths(CCS 2021)papers / security / automatic_analyse