Follow
Dinghao Wu
Title
Cited by
Cited by
Year
KISS: keep it simple and sequential
S Qadeer, D Wu
ACM SIGPLAN Notices 39 (6), 14-24, 2004
2842004
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
2612014
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection
F Zhang, H Huang, S Zhu, D Wu, P Liu
Proceedings of the 7th ACM Conference on Security and Privacy in Wireless …, 2014
2492014
Classifying text messages for the haiti earthquake.
C Caragea, NJ McNeese, AR Jaiswal, G Traylor, HW Kim, P Mitra, D Wu, ...
ISCRAM, 2011
2382011
LibD: scalable and precise third-party library detection in android markets
M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
1792017
Reassembleable Disassembling.
S Wang, P Wang, D Wu
USENIX Security Symposium, 627-642, 2015
1692015
Get online support, feel better--sentiment analysis and dynamics in an online cancer survivor community
B Qiu, K Zhao, P Mitra, D Wu, C Caragea, J Yen, GE Greer, K Portier
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
1472011
Cached: Identifying cache-based timing channels in production software
S Wang, P Wang, X Liu, D Zhang, D Wu
Proceedings of the 26th USENIX Security Symposium, 2017
1382017
{BinSim}: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
J Ming, D Xu, Y Jiang, D Wu
26th USENIX Security Symposium (USENIX Security 17), 253-270, 2017
1262017
Value-based program characterization and its application to software plagiarism detection
YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu
Proceedings of the 33rd International Conference on Software Engineering …, 2011
1222011
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
1212017
A framework for evaluating mobile app repackaging detection algorithms
H Huang, S Zhu, P Liu, D Wu
Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013
1192013
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su
NDSS, 2020
1052020
TaintPipe: Pipelined Symbolic Taint Analysis.
J Ming, D Wu, G Xiao, J Wang, P Liu
USENIX Security Symposium, 65-80, 2015
1012015
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
J Ming, D Xu, L Wang, D Wu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
992015
Adaptive unpacking of Android apps
L Xue, X Luo, L Yu, S Wang, D Wu
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
942017
Deepfuzz: Automatic generation of syntax valid c programs for fuzz testing
X Liu, X Li, R Prajapati, D Wu
Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 1044-1051, 2019
902019
Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping
D Xu, J Ming, D Wu
2017 IEEE Symposium on Security and Privacy (SP), 921-937, 2017
902017
Jred: Program customization and bloatware mitigation based on static analysis
Y Jiang, D Wu, P Liu
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
852016
A first step towards algorithm plagiarism detection
F Zhang, YC Jhi, D Wu, P Liu, S Zhu
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
822012
The system can't perform the operation now. Try again later.
Articles 1–20