+
+
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches
+
Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Zhenkai Liang, and Hai Jin.
+
In Proceedings of the 31th ACM Conference on Computer and Communications Security, 2024.
+
+
+
MaskDroid: Robust Android Malware Detection with Masked Graph Representations
+
Jingnan Zheng*, Jiahao Liu*, An Zhang, Jun Zeng, Ziqi Yang, Zhenkai Liang, and Tat-Seng Chua.
+
In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024.
+
CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning
-
Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, Zhenkai Liang
+
Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, and Zhenkai Liang.
In 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024).
@@ -79,6 +101,11 @@
KernJC: Automated Vulnerable Environment Generation for
Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang.
In 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024).
+
+
UIHASH: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation
+
Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, and Zhenkai Liang.
+
In Proceedings of the 33rd USENIX Security Symposium, 2024.
+
Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation
Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland Yap, Zhenkai Liang, Manuel Rigger.
@@ -96,7 +123,7 @@
PalanTΓr: Optimizing Attack Provenance with Hardware-en
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation
-
Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, and Abhik Roychoudhury
+
Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, and Abhik Roychoudhury.
In Proceedings of the 31st USENIX Security Symposium, 2022.
diff --git a/news.html b/news.html
index 352b7b2..ff6419d 100644
--- a/news.html
+++ b/news.html
@@ -27,6 +27,14 @@
InfoSec Research Group
News
+
+
Sep 2024
+
π Our recent work on high-assurance system observability protection is accepted in CCS'24!
+
+
+
Jul 2024
+
π Our recent work on mobile malware detection is accepted in ASE'24!
+
Jul 2024
π Our recent work on cryptographic misuse detection is accepted in RAID'24!
@@ -39,6 +47,10 @@
News
Jun 2024
π Our VulZoo vulnerability intelligence dataset is released!
+
+
May 2024
+
π Our recent work on Android UI similarity is accepted in USENIX Security'24!
+
Apr 2024
π Our group website is ready!
diff --git a/publications.html b/publications.html
index 7882632..902a99e 100644
--- a/publications.html
+++ b/publications.html
@@ -27,6 +27,16 @@
InfoSec Research Group
Publication List
+
+
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches
+
Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Zhenkai Liang, and Hai Jin.
+
In Proceedings of the 31th ACM Conference on Computer and Communications Security, 2024.
+
+
+
MaskDroid: Robust Android Malware Detection with Masked Graph Representations
+
Jingnan Zheng*, Jiahao Liu*, An Zhang, Jun Zeng, Ziqi Yang, Zhenkai Liang, and Tat-Seng Chua.
+
In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024.
+
VulZoo: A Comprehensive Vulnerability Intelligence Dataset
Bonan Ruan, Jiahao Liu, Weibo Zhao, Zhenkai Liang.
@@ -42,6 +52,11 @@
KernJC: Automated Vulnerable Environment Generation for
Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang.
In the 27th International Symposium on Research in Attacks, Intrusions and Defenses, 2024.
+
+
UIHASH: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation
+
Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, and Zhenkai Liang.
+
In Proceedings of the 33rd USENIX Security Symposium, 2024.
+
Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation
Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland Yap, Zhenkai Liang, Manuel Rigger.