Follow
Pei Wang
Title
Cited by
Cited by
Year
LibD: Scalable and precise third-party library detection in Android markets
M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo
Proceedings of the 39th International Conference on Software Engineering …, 2017
2022017
Reassembleable disassembling
S Wang, P Wang, D Wu
24th USENIX Security Symposium, 627-642, 2015
1792015
CacheD: Identifying cache-based timing channels in production software
S Wang, P Wang, X Liu, D Zhang, D Wu
Proceedings of the 26th USENIX Security Symposium, 2017
1532017
eDoctor: Automatically diagnosing abnormal battery drain issues on smartphones.
X Ma, P Huang, X Jin, P Wang, S Park, D Shen, Y Zhou, LK Saul, ...
NSDI 13, 57-70, 2013
1412013
Towards memory safe enclave programming with rust-sgx
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
992019
Automatic grading of programming assignments: an approach based on formal semantics
X Liu, S Wang, P Wang, D Wu
2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019
732019
Uroboros: Instrumenting stripped binaries with static reassembling
S Wang, P Wang, D Wu
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
702016
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation
S Wang, Y Bao, X Liu, P Wang, D Zhang, D Wu
28th USENIX security symposium (USENIX security 19), 657-674, 2019
652019
Credal: Towards locating a memory corruption vulnerability with your core dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
572016
Semantics-aware machine learning for function recognition in binary code
S Wang, P Wang, D Wu
2017 IEEE International Conference on Software Maintenance and Evolution …, 2017
472017
Software protection on the go: A large-scale empirical study on mobile app obfuscation
P Wang, Q Bao, L Wang, S Wang, Z Chen, T Wei, D Wu
Proceedings of the 40th International Conference on Software Engineering, 26-36, 2018
372018
Translingual Obfuscation
P Wang, S Wang, M Jiang, Y Jiang, D Wu
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 128-144, 2016
332016
Generating precise dependencies for large software
P Wang, J Yang, L Tan, R Kroeger, JD Morgenthaler
2013 4th International Workshop on Managing Technical Debt (MTD), 47-50, 2013
332013
Large-scale third-party library detection in android markets
M Li, P Wang, W Wang, S Wang, D Wu, J Liu, R Xue, W Huo, W Zou
IEEE Transactions on Software Engineering 46 (9), 981-1003, 2018
222018
Composite software diversification
S Wang, P Wang, D Wu
2017 IEEE International Conference on Software Maintenance and Evolution …, 2017
222017
Lambda obfuscation
P Lan, P Wang, S Wang, D Wu
Security and Privacy in Communication Networks: 13th International …, 2018
182018
Binary code retrofitting and hardening using SGX
S Wang, W Wang, Q Bao, P Wang, XF Wang, D Wu
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
182017
If it’s not secure, it should not compile: Preventing DOM-based XSS in large-scale web development with API hardening
P Wang, J Bangert, C Kern
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
142021
Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave Development
P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing
The ACM/IEEE 42nd International Conference on Software Engineering: Software …, 2020
122020
Turing obfuscation
Y Wang, S Wang, P Wang, D Wu
Security and Privacy in Communication Networks: 13th International …, 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20