@inproceedings{yin2007panorama, title={Panorama: capturing system-wide information flow for malware detection and analysis}, author={Yin, Heng and Song, Dawn and Egele, Manuel and Kruegel, Christopher and Kirda, Engin}, booktitle={Proceedings of the 14th ACM conference on Computer and communications security}, pages={116--127}, year={2007} } @inproceedings{kang2007renovo, title={Renovo: A hidden code extractor for packed executables}, author={Kang, Min Gyung and Poosankam, Pongsin and Yin, Heng}, booktitle={Proceedings of the 2007 ACM workshop on Recurring malcode}, pages={46--53}, year={2007} } @inproceedings{caballero2007polyglot, title={Polyglot: Automatic extraction of protocol message format using dynamic binary analysis}, author={Caballero, Juan and Yin, Heng and Liang, Zhenkai and Song, Dawn}, booktitle={Proceedings of the 14th ACM conference on Computer and communications security}, pages={317--329}, year={2007} } @inproceedings{song2008bitblaze, title={BitBlaze: A new approach to computer security via binary analysis}, author={Song, Dawn and Brumley, David and Yin, Heng and Caballero, Juan and Jager, Ivan and Kang, Min Gyung and Liang, Zhenkai and Newsome, James and Poosankam, Pongsin and Saxena, Prateek}, booktitle={Information Systems Security: 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings 4}, pages={1--25}, year={2008}, organization={Springer Berlin Heidelberg} } @inproceedings{yin2008hookfinder, title={HookFinder: Identifying and understanding malware hooking behaviors}, author={Yin, Heng and Liang, Zhenkai and Song, Dawn}, booktitle={NDSS}, year={2008} } @article{brumley2008automatically, title={Automatically identifying trigger-based behavior in malware}, author={Brumley, David and Hartwig, Cody and Liang, Zhenkai and Newsome, James and Song, Dawn and Yin, Heng}, journal={Botnet Detection: Countering the Largest Security Threat}, pages={65--88}, year={2008}, publisher={Springer US} } @techreport{brumley2007bitscope, title={BitScope: Automatically dissecting malicious binaries}, author={Brumley, David and Hartwig, Cody and Kang, Min Gyung and Liang, Zhenkai and Newsome, James and Poosankam, Pongsin and Song, Dawn and Yin, Heng}, year={2007}, institution={Technical Report CS-07-133, School of Computer Science, Carnegie Mellon~…} } @inproceedings{xie2006effective, title={An effective defense against email spam laundering}, author={Xie, Mengjun and Yin, Heng and Wang, Haining}, booktitle={Proceedings of the 13th ACM conference on Computer and communications security}, pages={179--190}, year={2006} } @inproceedings{kang2009emulating, title={Emulating emulation-resistant malware}, author={Kang, Min Gyung and Yin, Heng and Hanna, Steve and McCamant, Stephen and Song, Dawn}, booktitle={Proceedings of the 1st ACM workshop on Virtual machine security}, pages={11--22}, year={2009} } @article{yin2007building, title={Building an application-aware IPsec policy system}, author={Yin, Heng and Wang, Haining}, journal={Networking, IEEE/ACM Transactions on}, volume={15}, number={6}, pages={1502--1513}, year={2007}, publisher={IEEE} } @article{yin2010temu, title={Temu: Binary code analysis via whole-system layered annotative execution}, author={Yin, Heng and Song, Dawn}, journal={EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2010-3}, year={2010} } @inproceedings{yin2007securing, title={Securing BGP through keychain-based signatures}, author={Yin, Heng and Sheng, Bo and Wang, Haining and Pan, Jianping}, booktitle={2007 Fifteenth IEEE International Workshop on Quality of Service}, pages={154--163}, year={2007}, organization={IEEE} } @article{xie2008thwarting, title={Thwarting e-mail spam laundering}, author={Xie, Mengjun and Yin, Heng and Wang, Haining}, journal={ACM Transactions on Information and System Security (TISSEC)}, volume={12}, number={2}, pages={1--32}, year={2008}, publisher={ACM New York, NY, USA} } @inproceedings{yin2010hookscout, title={Hookscout: Proactive binary-centric hook detection}, author={Yin, Heng and Poosankam, Pongsin and Hanna, Steve and Song, Dawn}, booktitle={International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment}, pages={1--20}, year={2010}, organization={Springer Berlin Heidelberg Berlin, Heidelberg} } @inproceedings{luo2011attacks, title={Attacks on WebView in the Android system}, author={Luo, Tongbo and Hao, Hao and Du, Wenliang and Wang, Yifei and Yin, Heng}, booktitle={Proceedings of the 27th Annual Computer Security Applications Conference}, pages={343--352}, year={2011} } @article{yin2006whole, title={Whole-system fine-grained taint analysis for automatic malware detection and analysis}, author={Yin, Heng and Song, Dawn}, journal={Technical paper. College of William and Mary \& Carnegie Mellon University}, year={2006} } @article{yin2010keychain, title={Keychain-based signatures for securing BGP}, author={Yin, Heng and Sheng, Bo and Wang, Haining and Pan, Jianping}, journal={IEEE Journal on Selected Areas in Communications}, volume={28}, number={8}, pages={1308--1318}, year={2010}, publisher={IEEE} } @phdthesis{yin2009malware, title={Malware detection and analysis via layered annotative execution}, author={Yin, Heng}, year={2009}, school={The College of William and Mary} } @article{yinbuilding, title={Building A Generic Dynamic Binary Analysis Platform}, author={Yin, Heng} } @inproceedings{zhang2012identifying, title={Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis}, author={Zhang, Mingwei and Prakash, Aravind and Li, Xiaolei and Liang, Zhenkai and Yin, Heng}, booktitle={Network \& Distributed System Security Symposium}, year={2012}, organization={ISOC} } @inproceedings{yan2012v2e, title={V2E: Combining hardware virtualization and software emulation for transparent and extensible malware analysis}, author={Yan, Lok-Kwong and Jayachandra, Manjukumar and Zhang, Mu and Yin, Heng}, booktitle={Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments}, volume={47}, number={7}, pages={227--238}, year={2012}, organization={ACM} } @article{yan2010transparent, title={Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation}, author={Yan, Lok Kwong and Jayachandra, Manjukumar and Zhang, Mu and Yin, Heng}, journal={Internet Society}, pages={05--1}, year={2010} } @inproceedings{yan2012droidscope, title={DroidScope: Seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis}, author={Yan, Lok Kwong and Yin, Heng}, booktitle={Proceedings of the 21st USENIX Security Symposium}, year={2012} } @inproceedings{gu2012sommelier, title={Os-sommelier: Memory-only operating system fingerprinting in the cloud}, author={Gu, Yufei and Fu, Yangchun and Prakash, Aravind and Lin, Zhiqiang and Yin, Heng}, booktitle={Proceedings of the Third ACM Symposium on Cloud Computing}, pages={1--13}, year={2012} } @article{yin2013privacy, title={Privacy-breaching behavior analysis}, author={Yin, Heng and Song, Dawn and Yin, Heng and Song, Dawn}, journal={Automatic Malware Analysis: An Emulator Based Approach}, pages={27--42}, year={2013}, publisher={Springer New York} } @misc{yin2012automatic, title={Automatic malware analysis: an emulator based approach}, author={Yin, Heng and Song, Dawn}, year={2012}, publisher={Springer Science \& Business Media} } @article{yin2013hooking, title={Hooking behavior analysis}, author={Yin, Heng and Song, Dawn and Yin, Heng and Song, Dawn}, journal={Automatic Malware Analysis: An Emulator Based Approach}, pages={43--58}, year={2013}, publisher={Springer New York} } @article{yin2013analysis, title={Analysis of trigger conditions and hidden behaviors}, author={Yin, Heng and Song, Dawn and Yin, Heng and Song, Dawn}, journal={Automatic Malware Analysis: An Emulator Based Approach}, pages={59--67}, year={2013}, publisher={Springer New York} } @article{zhang2012transforming, title={Transforming and Taming Privacy-Breaching Android Applications}, author={Zhang, Mu and Yin, Heng and App, A}, journal={no. February}, pages={7--8}, year={2012} } @article{yin2013hidden, title={Hidden code extraction}, author={Yin, Heng and Song, Dawn and Yin, Heng and Song, Dawn}, journal={Automatic Malware Analysis: An Emulator Based Approach}, pages={17--26}, year={2013}, publisher={Springer New York} } @article{yin2013dynamic, title={Dynamic Binary Analysis Platform}, author={Yin, Heng and Song, Dawn and Yin, Heng and Song, Dawn}, journal={Automatic Malware Analysis: An Emulator Based Approach}, pages={5--16}, year={2013}, publisher={Springer New York} } @inproceedings{prakash2013enforcing, title={Enforcing system-wide control flow integrity for exploit detection and diagnosis}, author={Prakash, Aravind and Yin, Heng and Liang, Zhenkai}, booktitle={Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security}, pages={311--322}, year={2013} } @inproceedings{prakash2013manipulating, title={Manipulating semantic values in kernel data structures: Attack assessments and implications}, author={Prakash, Aravind and Venkataramani, Eknath and Yin, Heng and Lin, Zhiqiang}, booktitle={2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)}, pages={1--12}, year={2013}, organization={IEEE} } @inproceedings{aafer2013droidapiminer, title={DroidAPIMiner: Mining API-level features for robust malware detection in Android}, author={Aafer, Yousra and Du, Wenliang and Yin, Heng}, booktitle={International conference on security and privacy in communication systems}, pages={86--103}, year={2013}, organization={Springer, Cham} } @inproceedings{li2013software, title={A software environment for confining malicious android applications via resource virtualization}, author={Li, Xiaolei and Bai, Guangdong and Liang, Zhenkai and Yin, Heng}, booktitle={2013 18th International Conference on Engineering of Complex Computer Systems}, pages={208--211}, year={2013}, organization={IEEE} } @misc{song2013bitblaze, title={BitBlaze: Binary analysis for computer security}, author={Song, Dawn and Brumley, D and Yin, H and Caballero, J and Jager, I and Kang, MG and Liang, Z and Newsome, J and Poosankam, P and Saxena, P}, year={2013} } @inproceedings{zhang2014appsealer, title={AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.}, author={Zhang, Mu and Yin, Heng}, booktitle={Network and Distributed System Security Symposium (NDSS)}, year={2014} } @inproceedings{henderson2014make, title={Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform}, author={Henderson, Andrew and Prakash, Aravind and Yan, Lok Kwong and Hu, Xunchao and Wang, Xujiewen and Zhou, Rundong and Yin, Heng}, booktitle={Proceedings of the 2014 international symposium on software testing and analysis}, pages={248--258}, year={2014} } @inproceedings{zhang2014efficient, title={Efficient, context-aware privacy leakage confinement for android applications without firmware modding}, author={Zhang, Mu and Yin, Heng}, booktitle={Proceedings of the 9th ACM symposium on Information, computer and communications security}, pages={259--270}, year={2014} } @article{yinmalsolver, title={MalSolver: In-depth Malware Analysis through Layered Symbolic Execution}, author={Yin, Heng and Hartwig, Cody and Kang, Min Gyung and Song, Dawn} } @article{gu2014multi, title={Multi-aspect, robust, and memory exclusive guest os fingerprinting}, author={Gu, Yufei and Fu, Yangchun and Prakash, Aravind and Lin, Zhiqiang and Yin, Heng}, journal={IEEE Transactions on Cloud Computing}, volume={2}, number={4}, pages={380--394}, year={2014}, publisher={IEEE} } @inproceedings{jin2014code, title={Code injection attacks on HTML5-based mobile apps: Characterization, detection and mitigation}, author={Jin, Xing and Hu, Xuchao and Ying, Kailiang and Du, Wenliang and Yin, Heng and Peri, Gautam Nagesh}, booktitle={Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security}, pages={66--77}, year={2014}, organization={ACM} } @inproceedings{zhang2014semantics, title={Semantics-aware Android malware classification using weighted contextual API dependency graphs}, author={Zhang, Mu and Duan, Yue and Yin, Heng and Zhao, Zhiruo}, booktitle={Proceedings of the 2014 ACM SIGSAC conference on computer and communications security}, pages={1105--1116}, year={2014}, organization={ACM} } @article{prakash2015trustworthiness, title={On the Trustworthiness of Memory Analysis—An Empirical Study from the Perspective of Binary Execution}, author={Prakash, Aravind and Venkataramani, Eknath and Yin, He and Lin, Zhiyun}, journal={IEEE Transactions on Dependable and Secure Computing}, volume={12}, number={5}, year={2015}, publisher={IEEE} } @inproceedings{feng2014mace, title={Mace: High-coverage and robust memory analysis for commodity operating systems}, author={Feng, Qian and Prakash, Aravind and Yin, Heng and Lin, Zhiqiang}, booktitle={Proceedings of the 30th annual computer security applications conference}, pages={196--205}, year={2014} } @inproceedings{prakash2015vfguard, title={vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.}, author={Prakash, Aravind and Hu, Xunchao and Yin, Heng}, booktitle={Network and Distributed System Security Symposium (NDSS)}, year={2015} } @misc{duan2015poster, title={Poster: Privacy-Preserving Offloading of Mobile App to the Public Cloud}, author={Duan, Yue and Zhang, Mu and Yin, Heng and Tang, Yuzhe}, year={2015}, publisher={Syracuse University} } @inproceedings{zhang2015towards, title={Towards automatic generation of security-centric descriptions for android apps}, author={Zhang, Mu and Duan, Yue and Feng, Qian and Yin, Heng}, booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, pages={518--529}, year={2015} } @inproceedings{prakash2015defeating, title={Defeating ROP through denial of stack pivot}, author={Prakash, Aravind and Yin, Heng}, booktitle={Proceedings of the 31st Annual Computer Security Applications Conference}, pages={111--120}, year={2015}, organization={ACM} } @inproceedings{wang2015binary, title={Binary code continent: Finer-grained control flow integrity for stripped binaries}, author={Wang, Minghua and Yin, Heng and Bhaskar, Abhishek Vasisht and Su, Purui and Feng, Dengguo}, booktitle={Proceedings of the 31st annual computer security applications conference}, pages={331--340}, year={2015} } @inproceedings{duan2015privacy, title={$\{$Privacy-Preserving$\}$ Offloading of Mobile App to the Public Cloud}, author={Duan, Yue and Zhang, Mu and Yin, Heng and Tang, Yuzhe}, booktitle={7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 15)}, year={2015} } @inproceedings{carmony2016extract, title={Extract Me If You Can: Abusing PDF Parsers in Malware Detectors}, author={Carmony, Curtis and Hu, Xunchao and Yin, Heng and Bhaskar, Abhishek Vasisht and Zhang, Mu}, booktitle={Network and Distributed System Security Symposium (NDSS)}, year={2016} } @misc{heng2016semantics, title={Semantics-aware android malware classification}, author={Heng, YIN and Zhang, Mu and Duan, Yu and Zhao, Zhiruo}, year={2016}, month=feb # "~25", note={US Patent App. 14/833,491} } @inproceedings{feng2016origen, title={Origen: Automatic extraction of offset-revealing instructions for cross-version memory analysis}, author={Feng, Qian and Prakash, Aravind and Wang, Minghua and Carmony, Curtis and Yin, Heng}, booktitle={Proceedings of the 11th ACM on Asia conference on computer and communications security}, pages={11--22}, year={2016} } @book{song2013automatic, title={Automatic Malware Analysis}, author={Song, Dawn and Zdonik, Stan and Yin, Heng}, year={2013}, publisher={New York [etc.]} } @inproceedings{hu2016semantics, title={Semantics-preserving dissection of javascript exploits via dynamic js-binary analysis}, author={Hu, Xunchao and Prakash, Aravind and Wang, Jinghan and Zhou, Rundong and Cheng, Yao and Yin, Heng}, booktitle={Research in Attacks, Intrusions, and Defenses: 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings 19}, pages={254--276}, year={2016}, organization={Springer International Publishing} } @article{wang二进制代码块, title={二进制代码块: 面向二进制程序的细粒度控制流完整性校验方法}, author={Wang, Minghua and Yin, Heng and Bhaskar, Abhishek Vasisht and Su, Purui and Feng, Dengguo}, publisher={万方数据资源系统} } @inproceedings{feng2016scalable, title={Scalable graph-based bug search for firmware images}, author={Feng, Qian and Zhou, Rundong and Xu, Chengcheng and Cheng, Yao and Testa, Brian and Yin, Heng}, booktitle={Proceedings of the 2016 ACM SIGSAC conference on computer and communications security}, pages={480--491}, year={2016} } @article{henderson2017decaf, title={DECAF: A platform-neutral whole-system dynamic binary analysis platform}, author={Henderson, Andrew and Yan, Lok Kwong and Hu, Xunchao and Prakash, Aravind and Yin, Heng and McCamant, Stephen}, journal={IEEE Transactions on Software Engineering}, volume={43}, number={2}, pages={164--184}, year={2017}, publisher={IEEE} } @article{zhang2016efficient, title={Efficient and context-aware privacy leakage confinement}, author={Zhang, Mu and Yin, Heng and Zhang, Mu and Yin, Heng}, journal={Android Application Security: A Semantics and Context-Aware Approach}, pages={63--76}, year={2016}, publisher={Springer International Publishing} } @article{zhang2016automatic, title={Automatic generation of security-centric descriptions for android apps}, author={Zhang, Mu and Yin, Heng and Zhang, Mu and Yin, Heng}, journal={Android Application Security: A Semantics and Context-Aware Approach}, pages={77--98}, year={2016}, publisher={Springer International Publishing} } @article{zhang2016automatic, title={Automatic generation of vulnerability-specific patches for preventing component hijacking attacks}, author={Zhang, Mu and Yin, Heng and Zhang, Mu and Yin, Heng}, journal={Android Application Security: A Semantics and Context-Aware Approach}, pages={45--61}, year={2016}, publisher={Springer International Publishing} } @article{zhang2016limitation, title={Limitation and Future Work}, author={Zhang, Mu and Yin, Heng and Zhang, Mu and Yin, Heng}, journal={Android Application Security: A Semantics and Context-Aware Approach}, pages={99--103}, year={2016}, publisher={Springer International Publishing} } @inproceedings{hu2017jsforce, title={JSForce: A Forced Execution Engine for Malicious JavaScript Detection}, author={Hu, Xunchao and Cheng, Yao and Duan, Yue and Henderson, Andrew and Yin, Heng}, booktitle={13th EAI International Conference on Security and Privacy in Communication Networks}, year={2017} } @article{yan2017sok, title={Sok: On the soundness and precision of dynamic taint analysis}, author={Yan, Lok Kwong and Yin, Heng}, journal={Formal. Taint}, volume={2017}, pages={1--15}, year={2017} } @inproceedings{pan2017dark, title={Dark Hazard: Learning-based, Large-scale Discovery of Hidden Sensitive Operations in Android Apps}, author={Pan, Xiaorui and Wang, Xueqiang and Duan, Yue and Wang, XiaoFeng and Yin, Heng}, booktitle={Network and Distributed System Security Symposium (NDSS)}, year={2017} } @inproceedings{feng2017extracting, title={Extracting conditional formulas for cross-platform bug search}, author={Feng, Qian and Wang, Minghua and Zhang, Mu and Zhou, Rundong and Henderson, Andrew and Yin, Heng}, booktitle={Proceedings of the 2017 ACM on Asia conference on computer and communications security}, pages={346--359}, year={2017} } @article{hudecaf, title={DECAF-FSEFI: A Fine-grained, Accountable, Flexible, and Efficient Soft Error Fault Injection Framework for Profiling Application Vulnerability}, author={Hu, Xunchao and Guan, Qiang and Yin, Heng and DeBardeleben, Nathan} } @inproceedings{xu2017neural, title={Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection}, author={Xu, Xiaojun and Liu, Chang and Feng, Qian and Yin, Heng and Song, Le and Song, Dawn}, booktitle={ACM Conference on Computer and Communications Security (CCS)}, year={2017} } @inproceedings{henderson2017vdf, title={VDF: Targeted evolutionary fuzz testing of virtual devices}, author={Henderson, Andrew and Yin, Heng and Jin, Guang and Han, Hao and Deng, Hongmei}, booktitle={International Symposium on Research in Attacks, Intrusions, and Defenses}, pages={3--25}, year={2017}, organization={Springer, Cham} } @inproceedings{korczynski2017capturing, title={Capturing Malware Propagations with Code Injections and Code-Reuse Attacks}, author={Korczynski, David and Yin, Heng}, booktitle={ACM Conference on Computer and Communications Security (CCS)}, year={2017} } @inproceedings{zhu2018measuring, title={Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis}, author={Zhu, Shitong and Hu, Xunchao and Qian, Zhiyun and Shafiq, Zubair and Yin, Heng}, booktitle={Network and Distributed System Security Symposium}, year={2018} } @article{he2017framework, title={A framework for developing cyber-physical systems}, author={He, Xudong and Dong, Zhijiang and Yin, Heng and Fu, Yujian}, journal={International Journal of Software Engineering and Knowledge Engineering}, volume={27}, number={09n10}, pages={1361--1386}, year={2017}, publisher={World Scientific Publishing Company} } @inproceedings{duan2018things, title={Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation}, author={Duan, Yue and Zhang, Mu and Bhaskar, Abhishek Vasisht and Yin, Heng and Pan, Xiaorui and Li, Tongxin and Wang, Xueqiang and Wang, XiaoFeng}, booktitle={Network and Distributed System Security Symposium}, year={2018} } @inproceedings{darki2018rare, title={RARE: A systematic augmented router emulation for malware analysis}, author={Darki, Ahmad and Chuang, Chun-Yu and Faloutsos, Michalis and Qian, Zhiyun and Yin, Heng}, booktitle={International Conference on Passive and Active Network Measurement}, pages={60--72}, year={2018}, organization={Springer, Cham} } @inproceedings{song2018deepmem, title={DeepMem: Learning graph neural network models for fast and robust memory forensic analysis}, author={Song, Wei and Yin, Heng and Liu, Chang and Song, Dawn}, booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security}, pages={606--618}, year={2018} } @inproceedings{zhao2019send, title={Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing}, author={Zhao, Lei and Duan, Yue and Yin, Heng and Xuan, Jifeng}, booktitle={Network and Distributed System Security Symposium}, year={2019} } @techreport{brumley2007towards, title={Towards automatically identifying trigger-based behavior in malware using symbolic execution and binary analysis}, author={Brumley, David and Hartwig, Cody and Liang, Zhenkai and Newsome, James and Song, Dawn and Yin, Heng}, year={2007}, institution={Technical Report CMU-CS-07-105, Carnegie Mellon University} } @inproceedings{zheng2019firm, title={FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation}, author={Zheng, Yaowen and Davanian, Ali and Yin, Heng and Song, Chengyu and Zhu, Hongsong and Sun, Limin}, booktitle={28th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 19)}, pages={1099--1114}, year={2019} } @inproceedings{wang2019sensitive, title={Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing}, author={Wang, Jinghan and Duan, Yue and Song, Wei and Yin, Heng and Song, Chengyu}, booktitle={22nd International Symposium on Research in Attacks, Intrusions and Defenses ($\{$RAID$\}$ 2019)}, year={2019} } @inproceedings{duan2019automatic, title={Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications}, author={Duan, Yue and Gao, Lian and Hu, Jie and Yin, Heng}, booktitle={22nd International Symposium on Research in Attacks, Intrusions and Defenses ($\{$RAID$\}$ 2019)}, year={2019} } @inproceedings{davanian2019decaf++, title={DECAF++: Elastic Whole-System Dynamic Taint Analysis}, author={Davanian, Ali and Qi, Zhenxiao and Qu, Yu and Yin, Heng}, booktitle={22nd International Symposium on Research in Attacks, Intrusions and Defenses ($\{$RAID$\}$ 2019)}, year={2019} } @inproceedings{hu2019chaffyscript, title={ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation}, author={Hu, Xunchao and Testa, Brian and Yin, Heng}, booktitle={Security and Privacy in Communication Networks: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I 15}, pages={191--213}, year={2019}, organization={Springer International Publishing} } @article{huposter, title={Poster: Automatic Dissection of JavaScript Exploits through Dynamic JS-Binary Analysis}, author={Hu, Xunchao and Prakash, Aravind and Wang, Jinghan and Zhou, Rundong and Yin, Heng} } @inproceedings{zhang2020klotski, title={Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks}, author={Zhang, Pan and Song, Chengyu and Yin, Heng and Zou, Deqing and Shi, Elaine and Jin, Hai}, booktitle={ASPLOS}, year={2020} } @inproceedings{duan2020deepbindiff, title={DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing}, author={Duan, Yue and Li, Xuezixiang and Wang, Jinghan and Yin, Heng}, booktitle={Network and Distributed System Security Symposium (NDSS)}, year={2020} } @inproceedings{dai2020parallel, title={Parallel space traveling: A security analysis of app-level virtualization in android}, author={Dai, Deshun and Li, Ruixuan and Tang, Junwei and Davanian, Ali and Yin, Heng}, booktitle={Proceedings of the 25th ACM Symposium on Access Control Models and Technologies}, pages={25--32}, year={2020} } @inproceedings{guan2020chaser, title={Chaser: An enhanced fault injection tool for tracing soft errors in mpi applications}, author={Guan, Qiang and Hu, Xunchao and Grove, Terence and Fang, Bo and Jiang, Hailong and Yin, Heng and DeBadeleben, Nathan}, booktitle={2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)}, pages={355--363}, year={2020}, organization={IEEE} } @inproceedings{zhao2020patchscope, title={PatchScope: Memory object centric patch diffing}, author={Zhao, Lei and Zhu, Yuncong and Ming, Jiang and Zhang, Yichen and Zhang, Haotian and Yin, Heng}, booktitle={Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security}, pages={149--165}, year={2020} } @article{chi2022seqtrans, title={SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning}, author={Chi, Jianlei and Qu, Yu and Liu, Ting and Zheng, Qinghua and Yin, Heng}, journal={IEEE Transactions on Software Engineering}, year={2022} } @article{zhao2020probabilistic, title={Probabilistic Path Prioritization for Hybrid Fuzzing}, author={Zhao, Lei and Cao, Pengcheng and Duan, Yue and Yin, Heng and Xuan, Jifeng}, journal={IEEE Transactions on Dependable and Secure Computing}, number={01}, pages={1--1}, year={2020}, publisher={IEEE Computer Society} } @inproceedings{jiang2020aomdroid, title={Aomdroid: detecting obfuscation variants of android malware using transfer learning}, author={Jiang, Yu and Li, Ruixuan and Tang, Junwei and Davanian, Ali and Yin, Heng}, booktitle={Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II 16}, pages={242--253}, year={2020}, organization={Springer International Publishing} } @inproceedings{qi2021spectaint, title={SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets}, author={Qi, Zhenxiao and Feng, Qian and Cheng, Yueqiang and Yan, Mengjia and Li, Peng and Yin, Heng and Wei, Tao}, booktitle={Network and Distributed System Security Symposium (NDSS)}, year={2021} } @article{yang2021codee, title={Codee: A tensor embedding scheme for binary code search}, author={Yang, Jia and Fu, Cai and Liu, Xiao-Yang and Yin, Heng and Zhou, Pan}, journal={IEEE Transactions on Software Engineering}, volume={48}, number={7}, pages={2224--2244}, year={2021}, publisher={IEEE} } @inproceedings{wang2021reinforcement, title={Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing}, author={Wang, Jinghan and Song, Chengyu and Yin, Heng}, booktitle={Network and Distributed System Security Symposium (NDSS)}, year={2021}, organization={https://www.cs.ucr.edu/\~{}heng/pubs/afl-hier.pdf} } @inproceedings{li2021palmtree, title={PalmTree: Learning an Assembly Language Model for Instruction Embedding}, author={Li, Xuezixiang and Yu, Qu and Yin, Heng}, booktitle={ACM CCS}, year={2021} } @inproceedings{aafer2021android, title={Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing}, author={Aafer, Yousra and You, Wei and Sun, Yi and Shi, Yu and Zhang, Xiangyu and Yin, Heng}, booktitle={30th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 21)}, year={2021} } @article{qu2021evaluating, title={Evaluating network embedding techniques’ performances in software bug prediction}, author={Qu, Yu and Yin, Heng}, journal={Empirical Software Engineering}, volume={26}, number={4}, pages={60}, year={2021}, publisher={Springer US New York} } @article{qu2021leveraging, title={Leveraging developer information for efficient effort-aware bug prediction}, author={Qu, Yu and Chi, Jianlei and Yin, Heng}, journal={Information and Software Technology}, volume={137}, pages={106605}, year={2021}, publisher={Elsevier} } @misc{heng2021high, title={High throughput embedding generation system for executable code and applications}, author={Heng, YIN and Hu, Xunchao and Sheng, YU and Zheng, Yu}, year={2021}, month=feb # "~25", note={US Patent App. 15/930,321} } @inproceedings{yu2022deepdi, title={DEEPDI: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly}, author={Yu, Sheng and Qu, Yu and Hu, Xunchao and Yin, Heng}, booktitle={USENIX Security Symposium}, year={2022} } @inproceedings{qi2022logicmem, title={LogicMem: Automatic Profile Generation for Binary-Only Memory Forensics via Logic Inference}, author={Qi, Zhenxiao and Qu, Yu and Yin, Heng}, booktitle={Network and Distributed System Security Symposium}, year={2022} } @inproceedings{chen2022jigsaw, title={Jigsaw: Efficient and scalable path constraints fuzzing}, author={Chen, Ju and Wang, Jinghan and Song, Chengyu and Yin, Heng}, booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, pages={18--35}, year={2022}, organization={IEEE} } @inproceedings{egele2007dynamic, title={Dynamic spyware analysis}, author={Egele, Manuel and Kruegel, Christopher and Kirda, Engin and Yin, Heng and Song, Dawn}, booktitle={USENIX Annual Technical Conference}, year={2007} } @inproceedings{song2022mab, title={Mab-malware: A reinforcement learning framework for blackbox generation of adversarial malware}, author={Song, Wei and Li, Xuezixiang and Afroz, Sadia and Garg, Deepali and Kuznetsov, Dmitry and Yin, Heng}, booktitle={Proceedings of the 2022 ACM on Asia conference on computer and communications security}, pages={990--1003}, year={2022} } @inproceedings{chen2022symsan, title={SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis}, author={Chen, Ju and Han, Wookhyun and Yin, Mingjun and Zeng, Haochen and Song, Chengyu and Lee, Byoungyong and Yin, Heng and Shin, Insik}, booktitle={USENIX Security Symposium}, pages={2531--2548}, year={2022} } @inproceedings{barr2020combinatorial, title={Combinatorial code classification \& vulnerability rating}, author={Barr, Joseph R and Shaw, Peter and Abu-Khzam, Faisal N and Yu, Sheng and Yin, Heng and Thatcher, Tyler}, booktitle={2020 second international conference on transdisciplinary AI (TransAI)}, pages={80--83}, year={2020}, organization={IEEE} } @inproceedings{coppa2022symfusion, title={SymFusion: Hybrid Instrumentation for Concolic Execution}, author={Coppa, Emilio and Yin, Heng and Demetrescu, Camil}, year={2022} } @inproceedings{zhao2022alphuzz, title={Alphuzz: Monte carlo search on seed-mutation tree for coverage-guided fuzzing}, author={Zhao, Yiru and Wang, Xiaoke and Zhao, Lei and Cheng, Yueqiang and Yin, Heng}, booktitle={Proceedings of the 38th Annual Computer Security Applications Conference}, pages={534--547}, year={2022} } @article{zhao2021evolutionary, title={Evolutionary Mutation-based Fuzzing as Monte Carlo Tree Search}, author={Zhao, Yiru and Wang, Xiaoke and Zhao, Lei and Cheng, Yueqiang and Yin, Heng}, journal={arXiv preprint arXiv:2101.00612}, year={2021} } @inproceedings{yan2012v2e, title={V2E}, author={Yan, Lok-Kwong and Jayachandra, Manjukumar and Zhang, Mu and Yin, Heng}, booktitle={Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments}, year={2012}, organization={ACM} } @article{hu2023augmenting, title={Augmenting greybox fuzzing with generative ai}, author={Hu, Jie and Zhang, Qian and Yin, Heng}, journal={arXiv preprint arXiv:2306.06782}, year={2023} } @inproceedings{chen2023r, title={R-Fuzz at SBFT’2023}, author={Chen, Ju and Song, Chengyu and Yin, Heng}, booktitle={2023 IEEE/ACM International Workshop on Search-Based and Fuzz Testing (SBFT)}, pages={82--83}, year={2023}, organization={IEEE Computer Society} } @inproceedings{gao2024sigmadiff, title={SIGMADIFF: Semantics-Aware Deep Graph Matching for Pseudocode Diffing}, author={Gao, Lian and Qu, Yu and Yu, Sheng and Duan, Yue and Yin, Heng}, booktitle={Network and Distributed System Security Symposium}, year={2024} } @inproceedings{hu2024marco, title={Marco: A Stochastic Asynchronous Concolic Explorer}, author={Hu, Jie and Duan, Yue and Yin, Heng}, booktitle={2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE)}, pages={693--704}, year={2024}, organization={IEEE Computer Society} } @inproceedings{zhang2014semantics, title={Semantics-aware Android malware classification using weighted contextual API dependency graphs.(2014)}, author={ZHANG, Mu and DUAN, Yue and YIN, Heng and ZHAO, Zhiruo}, booktitle={Proceedings of the 21st ACM Conference on Computer and Communications Security, Scottsdale, USA}, pages={3--7}, year={2014} } @inproceedings{yu2024correctness, title={On the Correctness of Metadata-based SBOM Generation: A Differential Analysis Approach}, author={Yu, Sheng and Song, Wei and Hu, Xunchao and Yin, Heng}, booktitle={The 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks}, year={2024} } @inproceedings{qi2024symfit, title={SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic Execution}, author={Qi, Zhenxiao and Hu, Jie and Xiao, Zhaoqi and Yin, Heng}, booktitle={USENIX Security Symposium}, year={2024} } @inproceedings{qiu2024calico, title={Calico: Automated Knowledge Calibration and Diagnosis for Elevating AI Mastery in Code Tasks}, author={Qiu, Yuxin and Hu, Jie and Zhang, Qian and Yin, Heng}, booktitle={Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis}, pages={1785--1797}, year={2024} } @inproceedings{wangsensitive, title={Be sensitive and collaborative: Analyzing impact of coverage metrics in Greybox fuzzing.(2019)}, author={WANG, Jinghan and DUAN, Yue and SONG, Wei and YIN, Heng and SONG, Chengyu}, booktitle={Proceedings of the 22nd International Symposium on Research on Attacks, Intrusions and Defenses, Beijing, China, Sep}, pages={23--25} } @inproceedings{duanautomatic, title={Automatic generation of non-intrusive updates for third-party libraries in android applications.(2019)}, author={DUAN, Yue and GAO, Lian and HU, Jie and YIN, Heng}, booktitle={Proceedings of the 22nd International Symposium on Research on Attacks, Intrusions and Defenses, Beijing, China, Sep}, pages={23--25} }