Page Not Found
Page not found. Your pixels are in another canvas.
University of Chinese Academy of Sciences
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
About me
This is a page showing all the dealines of related conferences
This is a page showing all the dealines of related conferences
Conference Deadlines
This is a page not in th emain menu
Professional services
Research Team
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published in Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS), 2013
It is a work of protocol verifcation to detect vulnerabilities in web protocols
Recommended citation: Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun, Yang Liu, and Jin Song Dong. (2013). "AuthScan: Automatic Extraction of Web Authentication Protocols from Implementations." Proceedings of the 20th Annual Network and Distributed System Security Symposium http://impillar.github.io/files/ndss2013authscan.pdf
Published in ACM Computing Surveys (CSUR), 2015
It is a survey of collaborative security
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1). http://impillar.github.io/files/csur2015.pdf
Published in ACM Asia Conference on Computer and Communicatoins Security (AsiaCCS), 2016
It is a work of Android malware generation to audit Anti-malware tool
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1). http://impillar.github.io/files/asiaccs2016mystique.pdf
Published in The International Symposium on Software Testing and Analysis (ISSTA), 2016
It is a work of Android malware detection to detect Android malware
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1). http://impillar.github.io/files/issta2016smart.pdf
Published in 2016 Internationl Joint Conference on Neural Networks (IJCNN), 2016
It is a work of Android malware detection to detect malware with graph kernel
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1). http://impillar.github.io/files/ijcnn2016.pdf
Published in IEEE Transactions on Information Forensics and Security (TIFS), 2017
It is a work of Android malware generation to audit the performance of anti-malware tools
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1). http://impillar.github.io/files/tifs2017mystiques.pdf
Published in Proceedings of the 8th International Conference on Cyber-Physical System (ICCPS), 2017
It is a work of Android performance to optimize the usage of battery
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1). http://impillar.github.io/files/iccps2017vbash.pdf
Published in IEEE Transactions on Mobile Computing (TMC), 2017
It is a work of Android performance to optimize the usage of battery
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1). http://impillar.github.io/files/tmc2017bmods.pdf
Published in 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE), 2017
It is a work of Android app testing for identifying bugs in code
Recommended citation: http://impillar.github.io/files/fse2017stoat.pdf
Published in The 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017
It is a work of protocol verifcation to detect vulnerabilities in web protocols
Recommended citation: http://impillar.github.io/files/ase2017micode.pdf
Published in CoRR abs/1711.07451, 2017
It is construction of knowledge graph for automatic analysis
Recommended citation: https://arxiv.org/pdf/1711.07451
Published in The 40th International Conference on Software Engineering (ICSE), 2018
It is a work of protocol verifcation to detect vulnerabilities in web protocols
Recommended citation: http://impillar.github.io/files/icse2018crash.pdf
Published in The 40th International Conference on Software Engineering (ICSE), 2018
It is a work to translate Android GUI design into Android programming code
Recommended citation: http://impillar.github.io/files/icse2018ui2code.pdf
Published in Cybersecurity, 2018
It is a work to detect Android malware
Recommended citation: http://impillar.github.io/files/cybersecurity2018droidecho.pdf
Published in The 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2018
It is a work to understand asynchronous programming errors and detect them
Recommended citation: http://impillar.github.io/files/ase2018apechecker.pdf
Published in Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), 2018
It is a work to assess the security of mobile banking apps in large scale
Recommended citation: http://impillar.github.io/files/fse2018ausera.pdf
Published in IEEE Transactions on Information Forensics and Security, 2018
It is a work to study the spread of malware between markets, and thereby helps security practitioners to take measures against malware instantly.
Download here
Published in Computers & Security, 2019
It is a work to detect third party libraries in Android apps
Recommended citation: http://impillar.github.io/files/jcs2019panguard.pdf
Published in IEEE Transactions on Reliability, 2019
It is a work to evaluate the effort-aware security vulnerability prediction methods.
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1). http://impillar.github.io/files/trel2019effort.pdf
Published in The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2019
It is an empirical study on the security issues existing in Android apps.
Recommended citation: http://impillar.github.io/files/ase2019sig.pdf
Published in The 15th International Conference on Information Security and Cryptology, 2019
It is a work to generate adversarial examples for license recognition systems
Recommended citation: http://impillar.github.io/files/inscrypt2019rolma.pdf
Published in The 42nd International Conference on Software Engineering (ICSE), 2020
It is a work to assess the security weaknesses in Android Banking Apps
Recommended citation: http://impillar.github.io/files/icse2020ausera.pdf
Published in The 42nd International Conference on Software Engineering (ICSE), 2020
It is a work to empirically study the distribution of vulnerabilities within projects
Recommended citation: http://impillar.github.io/files/icse2020vul.pdf
Published in 36th IEEE International Conference on Software Maintenance and Evolution (ICSME), 2020
An effective approach to identify the leading authors of an Android app.
Recommended citation: http://impillar.github.io/files/icsme2020a3ident.pdf
Published in IEEE Transactions on Information Forensics and Security, 2020
It is a mobile solution to detect Android malware.
Download here
Published in IEEE Transactions on Software Engineering, 2020
It is a survey about the threats to deep learning systems.
Download here
Published in Proceedings of the 30th The Web Conference (WWW), 2021
It is a work of analyzing the violations of privacy policy using NLP in Android apps.
Recommended citation: http://impillar.github.io/files/www2021autocompliance.pdf
Published in Proceedings of the 30th The Web Conference (WWW), 2021
It is a work of analyzing the violations of SEAndroid policy rules caused by customization
Recommended citation: http://impillar.github.io/files/www2021sepal.pdf
Published in Proceedings of the 30th USENIX Security Symposium (USENIX), 2021
It is a work of reducing data for efficient black-box attacks
Recommended citation: http://impillar.github.io/files/usenix2021drmi.pdf
Published in The 32nd International Symposium on Software Reliability Engineering (ISSRE 2021), 2021
It is a technical paper to impede fuzzing for protection.
Download here
Published in The 21st International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2021), 2021
It is an empirical study to identify what are backdoor attacks susceptible of
Download here
Published in 29th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2022), 2022
It is a work to empirically study how code representations affect program semantics learning.
Download here
Published in ACM SIGMETRICS / IFIP PERFORMANCE 2022 (SIGMETRICS 2022), 2022
It is a work to study the evolution of contemporary Android malware.
Download here
Published in The 37th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2022
It is a work to fix compilation errors of programs.
Recommended citation: http://impillar.github.io/files/ase2022transrepair.pdf
Published in The ACM Conference on Computer and Communications Security (CCS), 2022
It is a work of analyzing the security of deep learning models in Android apps.
Recommended citation: http://impillar.github.io/files/ccs2022advdroid.pdf
Published in IEEE Transactions on Software Engineering (TSE), 2023
It proposes a new network-GraphSearchNet to build the connection between natural language and program code via enhanced GNNs.
Download here
Published in The 45th International Conference on Software Engineering (ICSE), 2023
It is a work to use contrastive learning to enhance the current pre-trained models
Recommended citation: http://impillar.github.io/files/icse2023contrabert.pdf
Published in Proceedings of the 32nd USENIX Security Symposium (USENIX), 2023
It is a work of inmplanting backdoors into pre-trained modes with alias errors
Download here
Published in Proceedings of the 32nd USENIX Security Symposium (USENIX), 2023
It is a work of inconsistencies and vulnerabilities discovery by differential testing
Download here
Published in The ACM Conference on Computer and Communications Security (CCS), 2023
It is a work of evaluating the qualify of local explanation methods.
Recommended citation:
Published in Xi'an, China, 2016
In the arms race of attackers and defenders, the defense is usually more challenging than the attack due to the unpredicted vulnerabilities and newly emerging attacks every day. Currently, most of existing malware detection solutions are individually proposed to address certain types of attacks or certain evasion techniques. Thus, it is desired to conduct a systematic investigation and evaluation of anti-malware solutions and tools based on different attacks and evasion techniques. In this paper, we first propose a meta model for Android malware to capture the common attack features and evasion features in the malware. Based on this model, we develop a framework, MYSTIQUE, to automatically generate malware covering four attack features and two evasion features, by adopting the software product line engineering approach. With the help of MYSTIQUE, we conduct experiments to 1) understand Android malware and the associated attack features as well as evasion techniques; 2) evaluate and compare the 57 off-the-shelf anti-malware tools, 9 academic solutions and 4 App market vetting processes in terms of accuracy in detecting attack features and capability in addressing evasion. Last but not least, we provide a benchmark of Android malware with proper labeling of contained attack and evasion features.
Published in Saarland University, Germany, 2016
Malware has posed a major threat to the Android ecosystem. Existing malware detection tools mainly rely on signature- or feature- based approaches, failing to provide detailed information beyond the mere detection. In this work, we propose a precise semantic model of Android malware based on Deterministic Symbolic Automaton (DSA) for the purpose of malware comprehension, detection and classification. It shows that DSA can capture the common malicious behaviors of a malware family, as well as the malware variants. Based on DSA, we develop an automatic analysis framework, named SMART, which learns DSA by detecting and summarizing semantic clones from malware families, and then extracts semantic features from the learned DSA to classify malware according to the attack patterns. We conduct the experiments in both malware benchmark and 223,170 real-world apps. The results show that SMART builds meaningful semantic models and outperforms both state-of-the-art approaches and anti-virus tools in malware detection. SMART identifies 4583 new malware in real-world apps that are missed by most anti-virus tools. The classification step further identifies new malware variants and unknown families.
Published in University of Beihang, Beijing, China, 2017
Due to the wide use of mobile devices, the security issues existing on mobile devices become more serious and harmful. It is a non-trival task to improve the security in Android such as malware detection, vulnerability detection. This talk will explain three key works dedicted to address security problems in Android: malware detection, performance assessment of anti-malware tools and Android security testing. This talk starts with the study of malware detection, in which we propose a sematic model to represent malicious behaviors in Android malware, and combine static analysia and machine learning to detect malware in an accurate and efficient manner. Then, we conducted another work to assess the performance of existing anti-malware tools by automatically generating a large number of Android malware. We identified many weaknesses of these anti-malware tools, and proposed several advices for improving their performance. Last, we propose a dynamic analysis based approach to explore bugs hidden deep in the code of Android apps.
Published in University of Luxembourg, Luxembourg, 2017
Mobile apps are ubiquitous, operate in complex environments and are developed under the time-to-market pressure. Ensuring their correctness and reliability thus becomes an important challenge. This paper introduces Stoat, a novel guided approach to perform stochastic model-based testing on Android apps. Stoat operates in two phases: (1) Given an app as input, it uses dynamic analysis enhanced by a weighted UI exploration strategy and static analysis to reverse engineer a stochastic model of the app’s GUI interactions; and (2) it adapts Gibbs sampling to iteratively mutate/refine the stochastic model and guides test generation from the mutated models toward achieving high code and model coverage and exhibiting diverse sequences. During testing, system-level events are randomly injected to further enhance the testing effectiveness.
Published in Tianjin University, 2018
Mobile apps are now ubiquitous, and they have penetrated into every life corner of end users. However, security issues within these apps may incur more serious damages than ever. Researchers and practitioners have been striving to improve the security of mobile apps, and reduce security risks. However, the obtained results are still far from satisfaction. This talk will introduce our recent work aiming to achieve this target. First, this talk starts with our research on Android malware, in which we studied the semantic representation of malware, detection technologies, and evaluation on contemporary anti-malware tools. Second, this talk will brief recent work on automated app testing, including our dynamic app testing technique, crash analysis and root cause identification. Third, this talk will introduce our work on app vulnerability analysis and detection. Last but not least, I would like to share ongoing work for potential collaboration.
Published in Southern University of Science and Technology, 2018
Mobile apps are now ubiquitous, and they have penetrated into every life corner of end users. However, security issues within these apps may incur more serious damages than ever. Researchers and practitioners have been striving to improve the security of mobile apps, and reduce security risks. However, the obtained results are still far from satisfaction. This talk will introduce our recent work aiming to achieve this target. First, this talk starts with our research on Android malware, in which we studied the semantic representation of malware, detection technologies, and evaluation on contemporary anti-malware tools. Second, this talk will brief recent work on automated app testing, including our dynamic app testing technique, crash analysis and root cause identification. Third, this talk will introduce our work on app vulnerability analysis and detection. Last but not least, I would like to share ongoing work for potential collaboration.
Published in Zhejiang Hotel, 2019
Cybersecurity become more and more important for both states and society. However, traditional approaches based on rules and patterns cannot meet the demanding security requirements. In this talk, we will introduce our recent works on intelligent system security on malware and vulnerabilities. In particular, we will present how Android malware of large scale is accurately and effectively detected, how software vulnerabilities are mined improved by learning knowledge from artifacts, and intelligence driven software testing. Additionally, we will brief the advances of the security of artificial intelligent systems.
Published in Beijing University of Post and Technology, Beijing, 2018
Published in School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 2019
Published in School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 2020
Published in School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 2020
Published in School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 2020