Search Results - "Meng, Guozhu"
-
1
Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets
Published in IEEE transactions on information forensics and security (01-07-2019)“…The Android ecosystem has recently dominated mobile devices. Android app markets, including official Google Play and other third party markets, are becoming…”
Get full text
Journal Article -
2
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique
Published in IEEE transactions on information forensics and security (01-07-2017)“…Although a previous paper shows that existing anti-malware tools (AMTs) may have high detection rate, the report is based on existing malware and thus it does…”
Get full text
Journal Article -
3
Revealing the exploitability of heap overflow through PoC analysis
Published in Cybersecurity (Singapore) (01-12-2024)“…The exploitable heap layouts are used to determine the exploitability of heap vulnerabilities in general-purpose applications. Prior studies have focused on…”
Get full text
Journal Article -
4
SkillSim: voice apps similarity detection
Published in Cybersecurity (Singapore) (01-12-2023)“…Virtual personal assistants (VPAs), such as Amazon Alexa and Google Assistant, are software agents designed to perform tasks or provide services to individuals…”
Get full text
Journal Article -
5
Are our clone detectors good enough? An empirical study of code effects by obfuscation
Published in Cybersecurity (Singapore) (01-12-2023)“…Clone detection has received much attention in many fields such as malicious code detection, vulnerability hunting, and code copyright infringement detection…”
Get full text
Journal Article -
6
The inconsistency of documentation: a study of online C standard library documents
Published in Cybersecurity (Singapore) (02-07-2022)“…The C standard libraries are basic function libraries standardized by the C language. Programmers usually refer to their API documentation provided by…”
Get full text
Journal Article -
7
DroidEcho: an in-depth dissection of malicious behaviors in Android applications
Published in Cybersecurity (Singapore) (05-06-2018)“…A precise representation for attacks can benefit the detection of malware in both accuracy and efficiency. However, it is still far from expectation to…”
Get full text
Journal Article -
8
Towards Security Threats of Deep Learning Systems: A Survey
Published in IEEE transactions on software engineering (01-05-2022)“…Deep learning has gained tremendous success and great popularity in the past few years. However, deep learning systems are suffering several inherent…”
Get full text
Journal Article -
9
From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementation
Published in 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE) (27-05-2018)“…A GUI skeleton is the starting point for implementing a UI design image. To obtain a GUI skeleton from a UI design image, developers have to visually…”
Get full text
Conference Proceeding -
10
GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search
Published in IEEE transactions on software engineering (01-04-2023)“…Code search aims to retrieve accurate code snippets based on a natural language query to improve software productivity and quality. With the massive amount of…”
Get full text
Journal Article -
11
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
Published in IEEE transactions on information forensics and security (2021)“…Currently, Android malware detection is mostly performed on server side against the increasing number of malware. Powerful computing resource provides more…”
Get full text
Journal Article -
12
Contextual Weisfeiler-Lehman graph kernel for malware detection
Published in 2016 International Joint Conference on Neural Networks (IJCNN) (01-07-2016)“…In this paper, we propose a novel graph kernel specifically to address a challenging problem in the field of cyber-security, namely, malware detection…”
Get full text
Conference Proceeding -
13
Large-Scale Empirical Studies on Effort-Aware Security Vulnerability Prediction Methods
Published in IEEE transactions on reliability (01-03-2020)“…Security vulnerability prediction (SVP) can identify potential vulnerable modules in advance and then help developers to allocate most of the test resources to…”
Get full text
Journal Article -
14
An Empirical Assessment of Security Risks of Global Android Banking Apps
Published in 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (01-10-2020)“…Mobile banking apps, belonging to the most security-critical app category, render massive and dynamic transactions susceptible to security risks. Given huge…”
Get full text
Conference Proceeding -
15
Mining implicit design templates for actionable code reuse
Published in 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE) (01-10-2017)“…In this paper, we propose an approach to detecting project-specific recurring designs in code base and abstracting them into design templates as reuse…”
Get full text
Conference Proceeding -
16
ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning
Published in 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) (01-05-2023)“…Large-scale pre-trained models such as CodeBERT, GraphCodeBERT have earned widespread attention from both academia and industry. Attributed to the superior…”
Get full text
Conference Proceeding -
17
Large-scale analysis of framework-specific exceptions in Android apps
Published in 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE) (27-05-2018)“…Mobile apps have become ubiquitous. For app developers, it is a key priority to ensure their apps' correctness and reliability. However, many apps still suffer…”
Get full text
Conference Proceeding -
18
Battery state-of-health estimation for mobile devices
Published in 2017 ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS) (18-04-2017)“…Insufficient support of electric current sensing on commodity mobile devices leads to inaccurate estimation of their battery's state-of-health (SoH), which, in…”
Get full text
Conference Proceeding -
19
Efficiently Manifesting Asynchronous Programming Errors in Android Apps
Published in 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE) (01-09-2018)“…Android, the #1 mobile app framework, enforces the single-GUI-thread model, in which a single UI thread manages GUI rendering and event dispatching. Due to…”
Get full text
Conference Proceeding -
20
Characterizing Android App Signing Issues
Published in 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01-11-2019)“…In the app releasing process, Android requires all apps to be digitally signed with a certificate before distribution. Android uses this certificate to…”
Get full text
Conference Proceeding