Search Results - "Gao, Debin"
-
1
Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls
Published in Empirical software engineering : an international journal (2021)“…Android has been the most popular smartphone system with multiple platform versions active in the market. To manage the application’s compatibility with one or…”
Get full text
Journal Article -
2
Experimental Study of Compressive Properties and Environmental Impact of Recycled Aggregate
Published in Frontiers in materials (19-08-2021)“…As the main component of fiber-reinforced recycled aggregate concrete, the properties of recycled aggregate determine whether recycled aggregate concrete can…”
Get full text
Journal Article -
3
Study on the influencing factors and evolution of loess bank collapse with physical modelling
Published in Geoenvironmental disasters (01-12-2023)“…Background Reservoir bank collapse in loess areas may lead to the siltation of reservoir and bank retreat. Therefore, the study of reservoir bank collapse has…”
Get full text
Journal Article -
4
Prediction of Reservoir Bank Collapse Based on the Limit Equilibrium Theory
Published in Advances in civil engineering (13-06-2023)“…The prediction of reservoir bank collapse width is a unique problem encountered in the construction of hydropower projects. Existing empirical graphic methods…”
Get full text
Journal Article -
5
Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation
Published in IEEE transactions on information forensics and security (01-10-2016)“…Dynamic software fingerprinting has been an important tool in fighting against software theft and pirating by embedding unique fingerprints into software…”
Get full text
Journal Article -
6
Replica Placement for Availability in the Worst Case
Published in 2015 IEEE 35th International Conference on Distributed Computing Systems (01-06-2015)“…We explore the problem of placing object replicas on nodes in a distributed system to maximize the number of objects that remain available when node failures…”
Get full text
Conference Proceeding Journal Article -
7
Mitigating access-driven timing channels in clouds using StopWatch
Published in 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2013)“…This paper presents StopWatch , a system that defends against timing-based side-channel attacks that arise from coresidency of victims and attackers in…”
Get full text
Conference Proceeding -
8
When Function Signature Recovery Meets Compiler Optimization
Published in 2021 IEEE Symposium on Security and Privacy (SP) (01-05-2021)“…Matching indirect function callees and callers using function signatures recovered from binary executables (number of arguments and argument types) has been…”
Get full text
Conference Proceeding -
9
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection
Published in 2008 Annual Computer Security Applications Conference (ACSAC) (01-12-2008)“…Host-based anomaly detectors monitor the control-flow and data-flow behavior of system calls to detect intrusions. Control-flow-based detectors monitor the…”
Get full text
Conference Proceeding -
10
Analyzing and revivifying function signature inference using deep learning
Published in Empirical software engineering : an international journal (01-05-2024)“…Function signature plays an important role in binary analysis and security enhancement, with typical examples in bug finding and control-flow integrity…”
Get full text
Journal Article -
11
On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping
Published in IEEE transactions on dependable and secure computing (01-09-2022)“…Graphics Processing Units (GPUs) are now a key component of many devices and systems, including those in the cloud and data centers, thus are also subject to…”
Get full text
Journal Article -
12
Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture
Published in IEEE transactions on dependable and secure computing (01-09-2022)“…App repackaging has been raising serious concerns about the health of the Android ecosystem, and repackage-proofing is an important mitigation against threat…”
Get full text
Journal Article -
13
Study on prediction method of reservoir bank collapse in loess area
Published in Bulletin of engineering geology and the environment (01-08-2023)“…Reservoir bank collapse is a type of hydrogeological phenomena encountered in hydropower projects, and its prediction remains a challenge. The reservoir bank…”
Get full text
Journal Article -
14
Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems
Published in IEEE transactions on industrial informatics (01-08-2021)“…Android as an operating system is now increasingly being adopted in industrial information systems, especially with cyber-physical systems (CPS). This also…”
Get full text
Journal Article -
15
Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing
Published in IEEE transactions on dependable and secure computing (01-09-2022)“…App repackaging has raised serious concerns to the Android ecosystem with the repackage-proofing technology attracting attention in the Android research…”
Get full text
Journal Article -
16
AutoDebloater: Automated Android App Debloating
Published in 2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE) (11-09-2023)“…Android applications are getting bigger with an increasing number of features. However, not all the features are needed by a specific user. The unnecessary…”
Get full text
Conference Proceeding -
17
MiniMon: Minimizing Android Applications with Intelligent Monitoring-based Debloating
Published in 2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE) (14-04-2024)“…The size of Android applications is getting larger to fulfill the requirements of various users. However, not all the features of the applications are needed…”
Get full text
Conference Proceeding -
18
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables
Published in 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (01-11-2011)“…Since the day it was proposed, return-oriented programming has shown to be an effective and powerful attack technique against the write or execute only (W ⊕ X)…”
Get full text
Conference Proceeding -
19
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid
Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2021)“…Widely-used Android static program analysis tools, e.g., Amandroid and FlowDroid, perform the whole-app inter-procedural analysis that is comprehensive but…”
Get full text
Conference Proceeding -
20
Towards ground truthing observations in gray-box anomaly detection
Published in 2011 5th International Conference on Network and System Security (01-09-2011)“…Anomaly detection has been attracting interests from researchers due to its advantage of being able to detect zero-day exploits. A gray-box anomaly detector…”
Get full text
Conference Proceeding