From b8d2f008f88edb80279d6b69a3e4553e58921b93 Mon Sep 17 00:00:00 2001 From: ruanbonan <414372820@qq.com> Date: Sun, 22 Sep 2024 13:19:31 +0800 Subject: [PATCH] update news and pubs --- index.html | 31 +++++++++++++++++++++++++++++-- news.html | 12 ++++++++++++ publications.html | 15 +++++++++++++++ 3 files changed, 56 insertions(+), 2 deletions(-) diff --git a/index.html b/index.html index d210628..caed2dc 100644 --- a/index.html +++ b/index.html @@ -39,6 +39,14 @@

Welcome to CURIOSITY!

Latest News

+
+ Sep 2024 +

πŸŽ‰ Our recent work on high-assurance system observability protection is accepted in CCS'24!

+
+
+ July 2024 +

πŸŽ‰ Our recent work on mobile malware detection is accepted in ASE'24!

+
Jul 2024

πŸŽ‰ Our recent work on cryptographic misuse detection is accepted in RAID'24!

@@ -51,6 +59,10 @@

Latest News

Jun 2024

πŸŽ‰ Our VulZoo vulnerability intelligence dataset is released!

+
+ May 2024 +

πŸŽ‰ Our recent work on Android UI similarity is accepted in USENIX Security'24!

+
Apr 2024

πŸŽ‰ Our group website is ready!

@@ -69,9 +81,19 @@

Latest News

Selected Publications

Refer to this link for the full list of publications.

+
+

The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches

+

Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Zhenkai Liang, and Hai Jin.

+

In Proceedings of the 31th ACM Conference on Computer and Communications Security, 2024.

+
+
+

MaskDroid: Robust Android Malware Detection with Masked Graph Representations

+

Jingnan Zheng*, Jiahao Liu*, An Zhang, Jun Zeng, Ziqi Yang, Zhenkai Liang, and Tat-Seng Chua.

+

In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024.

+

CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning

-

Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, Zhenkai Liang

+

Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, and Zhenkai Liang.

In 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024).

@@ -79,6 +101,11 @@

KernJC: Automated Vulnerable Environment Generation for

Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang.

In 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024).

+
+

UIHASH: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation

+

Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, and Zhenkai Liang.

+

In Proceedings of the 33rd USENIX Security Symposium, 2024.

+

Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation

Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland Yap, Zhenkai Liang, Manuel Rigger.

@@ -96,7 +123,7 @@

PalanTΓ­r: Optimizing Attack Provenance with Hardware-en

FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation

-

Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, and Abhik Roychoudhury

+

Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, and Abhik Roychoudhury.

In Proceedings of the 31st USENIX Security Symposium, 2022.

diff --git a/news.html b/news.html index 352b7b2..ff6419d 100644 --- a/news.html +++ b/news.html @@ -27,6 +27,14 @@

InfoSec Research Group

News

+
+ Sep 2024 +

πŸŽ‰ Our recent work on high-assurance system observability protection is accepted in CCS'24!

+
+
+ Jul 2024 +

πŸŽ‰ Our recent work on mobile malware detection is accepted in ASE'24!

+
Jul 2024

πŸŽ‰ Our recent work on cryptographic misuse detection is accepted in RAID'24!

@@ -39,6 +47,10 @@

News

Jun 2024

πŸŽ‰ Our VulZoo vulnerability intelligence dataset is released!

+
+ May 2024 +

πŸŽ‰ Our recent work on Android UI similarity is accepted in USENIX Security'24!

+
Apr 2024

πŸŽ‰ Our group website is ready!

diff --git a/publications.html b/publications.html index 7882632..902a99e 100644 --- a/publications.html +++ b/publications.html @@ -27,6 +27,16 @@

InfoSec Research Group

Publication List

+
+

The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches

+

Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Zhenkai Liang, and Hai Jin.

+

In Proceedings of the 31th ACM Conference on Computer and Communications Security, 2024.

+
+
+

MaskDroid: Robust Android Malware Detection with Masked Graph Representations

+

Jingnan Zheng*, Jiahao Liu*, An Zhang, Jun Zeng, Ziqi Yang, Zhenkai Liang, and Tat-Seng Chua.

+

In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024.

+

VulZoo: A Comprehensive Vulnerability Intelligence Dataset

Bonan Ruan, Jiahao Liu, Weibo Zhao, Zhenkai Liang.

@@ -42,6 +52,11 @@

KernJC: Automated Vulnerable Environment Generation for

Bonan Ruan, Jiahao Liu, Chuqi Zhang, Zhenkai Liang.

In the 27th International Symposium on Research in Attacks, Intrusions and Defenses, 2024.

+
+

UIHASH: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation

+

Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, and Zhenkai Liang.

+

In Proceedings of the 33rd USENIX Security Symposium, 2024.

+

Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation

Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland Yap, Zhenkai Liang, Manuel Rigger.