Follow
Dinghao Wu
Title
Cited by
Cited by
Year
KISS: keep it simple and sequential
S Qadeer, D Wu
ACM SIGPLAN Notices 39 (6), 14-24, 2004
2802004
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
2582014
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection
F Zhang, H Huang, S Zhu, D Wu, P Liu
Proceedings of the 7th ACM Conference on Security and Privacy in Wireless …, 2014
2472014
Classifying text messages for the haiti earthquake.
C Caragea, NJ McNeese, AR Jaiswal, G Traylor, HW Kim, P Mitra, D Wu, ...
ISCRAM, 2011
2452011
LibD: scalable and precise third-party library detection in android markets
M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
1762017
Reassembleable Disassembling.
S Wang, P Wang, D Wu
USENIX Security Symposium, 627-642, 2015
1692015
Get online support, feel better--sentiment analysis and dynamics in an online cancer survivor community
B Qiu, K Zhao, P Mitra, D Wu, C Caragea, J Yen, GE Greer, K Portier
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
1472011
Cached: Identifying cache-based timing channels in production software
S Wang, P Wang, X Liu, D Zhang, D Wu
Proceedings of the 26th USENIX Security Symposium, 2017
1392017
{BinSim}: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
J Ming, D Xu, Y Jiang, D Wu
26th USENIX Security Symposium (USENIX Security 17), 253-270, 2017
1252017
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
1212017
Value-based program characterization and its application to software plagiarism detection
YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu
Proceedings of the 33rd International Conference on Software Engineering …, 2011
1202011
A framework for evaluating mobile app repackaging detection algorithms
H Huang, S Zhu, P Liu, D Wu
Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013
1182013
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su
NDSS, 2020
1082020
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
J Ming, D Xu, L Wang, D Wu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1032015
TaintPipe: Pipelined Symbolic Taint Analysis.
J Ming, D Wu, G Xiao, J Wang, P Liu
USENIX Security Symposium, 65-80, 2015
1012015
Deepfuzz: Automatic generation of syntax valid c programs for fuzz testing
X Liu, X Li, R Prajapati, D Wu
Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 1044-1051, 2019
942019
Adaptive unpacking of Android apps
L Xue, X Luo, L Yu, S Wang, D Wu
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
912017
Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping
D Xu, J Ming, D Wu
2017 IEEE Symposium on Security and Privacy (SP), 921-937, 2017
882017
Jred: Program customization and bloatware mitigation based on static analysis
Y Jiang, D Wu, P Liu
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
852016
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback
R Zhong, Y Chen, H Hu, H Zhang, W Lee, D Wu
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
792020
The system can't perform the operation now. Try again later.
Articles 1–20