Search Results - "Gao, Debin"

Refine Results
  1. 1

    Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls by Wu, Daoyuan, Gao, Debin, Lo, David

    “…Android has been the most popular smartphone system with multiple platform versions active in the market. To manage the application’s compatibility with one or…”
    Get full text
    Journal Article
  2. 2

    Experimental Study of Compressive Properties and Environmental Impact of Recycled Aggregate by Xuetong, Ma, Debin, Gao

    Published in Frontiers in materials (19-08-2021)
    “…As the main component of fiber-reinforced recycled aggregate concrete, the properties of recycled aggregate determine whether recycled aggregate concrete can…”
    Get full text
    Journal Article
  3. 3

    Study on the influencing factors and evolution of loess bank collapse with physical modelling by Xuetong, Ma, Tonglu, Li, Qipeng, Li, Changsheng, Wang, Debin, Gao, Hao, Zhang, Changhu, Li

    Published in Geoenvironmental disasters (01-12-2023)
    “…Background Reservoir bank collapse in loess areas may lead to the siltation of reservoir and bank retreat. Therefore, the study of reservoir bank collapse has…”
    Get full text
    Journal Article
  4. 4

    Prediction of Reservoir Bank Collapse Based on the Limit Equilibrium Theory by Ma, Xuetong, Li, Qipeng, Zhang, Hao, Gao, Debin, Long, Jiao, Li, Zhengzheng

    Published in Advances in civil engineering (13-06-2023)
    “…The prediction of reservoir bank collapse width is a unique problem encountered in the construction of hydropower projects. Existing empirical graphic methods…”
    Get full text
    Journal Article
  5. 5

    Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation by Ma, Haoyu, Li, Ruiqi, Yu, Xiaoxu, Jia, Chunfu, Gao, Debin

    “…Dynamic software fingerprinting has been an important tool in fighting against software theft and pirating by embedding unique fingerprints into software…”
    Get full text
    Journal Article
  6. 6

    Replica Placement for Availability in the Worst Case by Peng Li, Debin Gao, Reiter, Michael K.

    “…We explore the problem of placing object replicas on nodes in a distributed system to maximize the number of objects that remain available when node failures…”
    Get full text
    Conference Proceeding Journal Article
  7. 7

    Mitigating access-driven timing channels in clouds using StopWatch by Peng Li, Debin Gao, Reiter, Michael K.

    “…This paper presents StopWatch , a system that defends against timing-based side-channel attacks that arise from coresidency of victims and attackers in…”
    Get full text
    Conference Proceeding
  8. 8

    When Function Signature Recovery Meets Compiler Optimization by Lin, Yan, Gao, Debin

    “…Matching indirect function callees and callers using function signatures recovered from binary executables (number of arguments and argument types) has been…”
    Get full text
    Conference Proceeding
  9. 9

    Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection by Peng Li, Hyundo Park, Debin Gao, Jianming Fu

    “…Host-based anomaly detectors monitor the control-flow and data-flow behavior of system calls to detect intrusions. Control-flow-based detectors monitor the…”
    Get full text
    Conference Proceeding
  10. 10

    Analyzing and revivifying function signature inference using deep learning by Lin, Yan, Singhal, Trisha, Gao, Debin, Lo, David

    “…Function signature plays an important role in binary analysis and security enhancement, with typical examples in bug finding and control-flow integrity…”
    Get full text
    Journal Article
  11. 11

    On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping by Ma, Haoyu, Tian, Jianwen, Gao, Debin, Jia, Chunfu

    “…Graphics Processing Units (GPUs) are now a key component of many devices and systems, including those in the cloud and data centers, thus are also subject to…”
    Get full text
    Journal Article
  12. 12

    Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture by Ma, Haoyu, Li, Shijia, Gao, Debin, Jia, Chunfu

    “…App repackaging has been raising serious concerns about the health of the Android ecosystem, and repackage-proofing is an important mitigation against threat…”
    Get full text
    Journal Article
  13. 13

    Study on prediction method of reservoir bank collapse in loess area by Ma, Xuetong, Li, Tonglu, Gao, Debin, Li, Qipeng, Wang, Changsheng, Zhang, Hao, Li, Changhu

    “…Reservoir bank collapse is a type of hydrogeological phenomena encountered in hydropower projects, and its prediction remains a challenge. The reservoir bank…”
    Get full text
    Journal Article
  14. 14

    Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems by Ma, Haoyu, Tian, Jianwen, Qiu, Kefan, Lo, David, Gao, Debin, Wu, Daoyuan, Jia, Chunfu, Baker, Thar

    “…Android as an operating system is now increasingly being adopted in industrial information systems, especially with cyber-physical systems (CPS). This also…”
    Get full text
    Journal Article
  15. 15

    Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing by Ma, Haoyu, Li, Shijia, Gao, Debin, Wu, Daoyuan, Jia, Qiaowen, Jia, Chunfu

    “…App repackaging has raised serious concerns to the Android ecosystem with the repackage-proofing technology attracting attention in the Android research…”
    Get full text
    Journal Article
  16. 16

    AutoDebloater: Automated Android App Debloating by Liu, Jiakun, Hu, Xing, Thung, Ferdian, Maoz, Shahar, Toch, Eran, Gao, Debin, Lo, David

    “…Android applications are getting bigger with an increasing number of features. However, not all the features are needed by a specific user. The unnecessary…”
    Get full text
    Conference Proceeding
  17. 17

    MiniMon: Minimizing Android Applications with Intelligent Monitoring-based Debloating by Liu, Jiakun, Zhang, Zicheng, Hu, Xing, Thung, Ferdian, Maoz, Shahar, Gao, Debin, Toch, Eran, Zhao, Zhipeng, Lo, David

    “…The size of Android applications is getting larger to fulfill the requirements of various users. However, not all the features of the applications are needed…”
    Get full text
    Conference Proceeding
  18. 18

    Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables by Limin Liu, Jin Han, Debin Gao, Jiwu Jing, Zha, Daren

    “…Since the day it was proposed, return-oriented programming has shown to be an effective and powerful attack technique against the write or execute only (W ⊕ X)…”
    Get full text
    Conference Proceeding
  19. 19

    When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid by Wu, Daoyuan, Gao, Debin, Deng, Robert H., Rocky K. C., Chang

    “…Widely-used Android static program analysis tools, e.g., Amandroid and FlowDroid, perform the whole-app inter-procedural analysis that is comprehensive but…”
    Get full text
    Conference Proceeding
  20. 20

    Towards ground truthing observations in gray-box anomaly detection by Jiang Ming, Haibin Zhang, Debin Gao

    “…Anomaly detection has been attracting interests from researchers due to its advantage of being able to detect zero-day exploits. A gray-box anomaly detector…”
    Get full text
    Conference Proceeding