Research Papers

Google Scholar

Publications in top-tier venues:

     IEEE S&P [CryptoHunt],
     CCS [LOOP, VMHunt],
     USENIX Security [Uroboros, TaintPipe, BinSim, CacheD],
     NDSS [Kruiser],
     PLDI [Cruiser, KISS, LTAL],
     ICSE [Obfuscation study I, Obfuscation study II, LibD, PackerGrind, VaPD],
     FSE [CoP],
     ISSTA [AlgPlg],
     ASE [PiE, StraightTaint, IMF],
     TSE [LibD, CoP, VaPD],
     Software: Practice and Experience [Obfuscation field study],
     AAAI [DeepFuzz].

* Student I supervise or supervised.
† Student supervised at the time the research was done.

    2019

  1. DeepFuzz: Automatic Generation of Syntax Valid C Programs for Fuzz Testing, by Xiao Liu*, Xiaoting Li*, Rupesh Prajapati*, and Dinghao Wu. In Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence (AAAI-19), Honolulu, Hawaii, USA, January 27 - February 1, 2019. Accepted.

  2. A Lightweight Framework for Regex Verification, by Xiao Liu*, Yufei Jiang*, and Dinghao Wu. In Proceedings of the 19th IEEE international Symposium on High Assurance Systems Engineering (HASE 2019), Hangzhou, China, January 3-5, 2019. Accepted.

    2018

  3. Field Experience with Obfuscating Million-User iOS Apps in Large Enterprise Mobile Development, by Pei Wang*, Dinghao Wu, Zhaofeng Chen, and Tao Wei. Software: Practice and Experience, 2018.

  4. Large-scale Third-party Library Detection in Android Markets, by Menghao Li, Pei Wang*, Wei Wang, Shuai Wang*, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo, and Wei Zou. IEEE Transactions on Software Engineering (TSE), 2018. Accepted.

  5. VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification, by Dongpeng Xu*, Jiang Ming*, Yu Fu*, and Dinghao Wu. In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 15-19, 2018. Accepted.

  6. RedDroid: Android Application Redundancy Customization Based on Static Analysis, by Yufei Jiang*, Qinkun Bao*, Shuai Wang*, Xiao Liu*, and Dinghao Wu. In Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering (ISSRE 2018), Memphis, TN, October 15-18, 2018. Accepted.

  7. Software Protection on the Go: A Large-Scale Empirical Study on Mobile App Obfuscation, by Pei Wang*, Qinkun Bao*, Li Wang*, Shuai Wang*, Zhaofeng Chen, Tao Wei, and Dinghao Wu. In Proceedings of the 40th International Conference on Software Engineering (ICSE 2018), Gothenburg, Sweden, May 27 - June 3, 2018. (Acceptance rate: 105/502 = 20.9%)

  8. Protecting Million-User iOS Apps with Obfuscation: Motivations, Pitfalls, and Experience, by Pei Wang*, Dinghao Wu, Zhaofeng Chen, and Tao Wei. In Proceedings of the 40th International Conference on Software Engineering (ICSE 2018), Software Engineering in Practice (SEIP) Track, Gothenburg, Sweden, May 27 - June 3, 2018.

  9. From Natural Language to Programming Language, by Xiao Liu* and Dinghao Wu. Book chapter in Steve Goschnick (Ed.), Innovative Methods, User-Friendly Tools, Coding, and Design Approaches in People-Oriented Programming. 2018.

    2017

  10. In-Memory Fuzzing for Binary Code Similarity Analysis, by Shuai Wang* and Dinghao Wu. In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017), Urbana Champaign, Illinois, USA, October 30 - November 3, 2017. (Acceptance rate 65/314=20.7%)

  11. Binary Code Retrofitting and Hardening Using SGX, by Shuai Wang*, Wenhao Wang, Qinkun Bao*, Pei Wang*, XiaoFeng Wang, and Dinghao Wu. In Proceedings of the Second Workshop on Forming an Ecosystem Around Software Transformation (FEAST 2017), co-located with CCS 2017, Dallas, USA, November 3, 2017.

  12. Automated Synthesis of Access Control Lists, by Xiao Liu*, Brett Holden*, and Dinghao Wu. In Proceedings of the 3rd International Conference on Software Security and Assurance (ICSSA 2017), Altoona, Pennsylvania, USA, July 24-25, 2017. Best Paper Award.

  13. Lambda Obfuscation, by Pengwei Lan*, Pei Wang*, Shuai Wang*, and Dinghao Wu. In Proceedings of the 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017), Niagara Falls, Canada, October 22-25, 2017.

  14. Turing Obfuscation, by Yan Wang*, Shuai Wang*, Pei Wang*, and Dinghao Wu. In Proceedings of the 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017), Niagara Falls, Canada, October 22-25, 2017.

  15. SecControl: Bridging the Gap Between Security Tools and SDN Controllers, by Li Wang* and Dinghao Wu. In Workshop on Applications and Techniques in Cyber Security (ATCS), co-located with the 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017), Niagara Falls, Canada, October 22-25, 2017.

  16. Semantics-Aware Machine Learning for Function Recognition in Binary Code, by Shuai Wang*, Pei Wang*, and Dinghao Wu. In Proceedings of the 33rd IEEE International Conference on Software Maintenance and Evolution (ICSME 2017), Shanghai, China. September 17-24, 2017.

  17. Composite Software Diversification, by Shuai Wang*, Pei Wang*, and Dinghao Wu. In Proceedings of the 33rd IEEE International Conference on Software Maintenance and Evolution (ICSME 2017), Shanghai, China. September 17-24, 2017.

  18. BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking, by Jiang Ming*, Dongpeng Xu*, Yufei Jiang*, and Dinghao Wu. In Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 16-18, 2017. (Acceptance rate 85/522=16.3%)
  19. CacheD: Identifying Cache-Based Timing Channels in Production Software, by Shuai Wang*, Pei Wang*, Xiao Liu*, Danfeng Zhang, and Dinghao Wu. In Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 16-18, 2017. (Acceptance rate 85/522=16.3%)
  20. A Lightweight Framework for Regex Verification, by Xiao Liu and Dinghao Wu (advisor). Bronze Medal, the ACM Graduate Student Research Competition at PLDI'17, Barcelona, Spain. June 2017.

  21. Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping, by Dongpeng Xu*, Jiang Ming*, and Dinghao Wu. In Proceedings of the 38th IEEE Symposium on Security and Privacy, San Jose, CA, May 22-24, 2017. (Acceptance rate 60/450=13.3%)
  22. LibD: Scalable and Precise Third-party Library Detection in Android Markets, by Menghao Li, Wei Wang, Pei Wang*, Shuai Wang*, Dinghao Wu, Jian Liu, Rui Xue, and Wei Huo. In Proceedings of the 39th ACM/IEEE International Conference on Software Engineering (ICSE 2017), Buenos Aires, Argentina, May 20-28, 2017. (Acceptance rate: 16.4%)
  23. Adaptive Unpacking of Android Apps, by Lei Xue, Xiapu Luo, Le Yu, Shuai Wang, and Dinghao Wu. In Proceedings of the 39th ACM/IEEE International Conference on Software Engineering (ICSE 2017), Buenos Aires, Argentina, May 20-28, 2017. (Acceptance rate: 16.4%)
  24. Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection, by Lannan Luo†, Jiang Ming*, Dinghao Wu, Peng Liu, and Sencun Zhu. IEEE Transactions on Software Engineering, 43(12), December 2017. A preliminary version appeared in Proceedings of the 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2014).
  25. MalwareHunt: Semantics-Based Malware Diffing Speedup by Normalized Basic Block Memoization, by Jiang Ming*, Dongpeng Xu*, and Dinghao Wu. Journal of Computer Virology and Hacking Techniques, 13(3), August 2017. (First online May 17, 2016). A preliminary version appeared in Proceedings of the 30th IFIP SEC 2015 International Information Security and Privacy Conference (IFIP SEC 2015).
  26. Impeding Behavior-based Malware Analysis via Replacement Attacks to Malware Specications, by Jiang Ming*, Zhi Xin, Pengwei Lan*, Dinghao Wu, Peng Liu, and Bing Mao. Journal of Computer Virology and Hacking Techniques, 13(3), August 2017. (First online May 31, 2016). A preliminary version appeared in Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS 2015).
  27. Natural Shell: An Assistant for End-user Scripting, by Xiao Liu*, Yufei Jiang*, Lawrence Wu*, and Dinghao Wu. International Journal of People-Oriented Programming (IJPOP), 2017.
  28. 2016

  29. StraightTaint: Decoupled Offline Symbolic Taint Analysis, by Jiang Ming*, Dinghao Wu, Jun Wang, Gaoyao Xiao, and Peng Liu. In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (ASE 2016), Singapore, September 3-7, 2016. (Acceptance rate: 19.1%)
  30. Software Plagiarism Detection: A Survey, by Zhenzhou Tian, Ting Liu, Qinghua Zheng, Feifei Tong, Dinghao Wu, Sencun Zhu, and Kai Chen. Journal of Cyber Security, 1(3):52-76, 2016.

  31. BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling, by Jiang Ming* and Dinghao Wu. In Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, Engineering Track, (SCAM 2016), Raleigh, NC, USA, October 2-3, 2016.

  32. Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method, by Dongpeng Xu*, Jiang Ming*, and Dinghao Wu. In Proceedings of the 19th Information Security Conference (ISC '16), Honolulu, Hawaii, USA, September 7-9, 2016.
  33. Moving Target Defense Against Network Reconnaissance with Software Defined Networking, by Li Wang* and Dinghao Wu. In Proceedings of the 19th Information Security Conference (ISC '16), Honolulu, Hawaii, USA, September 7-9, 2016.
  34. iCruiser: Protecting Kernel Link-Based Data Structures with Secure Canary, by Li Wang*, Dinghao Wu, and Peng Liu. In Proceedings of the 7th IEEE International Workshop on Trustworthy Computing (TC 2016), in conjunction with QRS 2016, Vienna, Austria, August 1-3, 2016.
  35. Deviation-Based Obfuscation-Resilient Program Equivalence Checking with Application to Software Plagiarism Detection, by Jiang Ming*, Fangfang Zhang, Dinghao Wu, Peng Liu, and Sencun Zhu. IEEE Transactions on Reliability, 65(4), December 2016. A preliminary version appeared in Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering (ISSRE 2014).
  36. Repackage-proofing Android Apps, by Lannan Luo†, Yu Fu*, Dinghao Wu, Sencun Zhu, and Peng Liu. In Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), Toulouse, France, June 28 - July 1, 2016. (Acceptance rate: 58/259 = 22.4%)
  37. JRed: Program Customization and Bloatware Mitigation based on Static Analysis, by Yufei Jiang*, Dinghao Wu, and Peng Liu. In Proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC 2016), Atlanta, Georgia, USA, June 10-14, 2016. (Acceptance rate: 18%)
  38. An Analysis of BIM Web Service Requirements and Design to Support Energy Efficient Building Lifecycle, by Yufei Jiang*, Xiao Liu*, Fangxiao Liu, Dinghao Wu, and Chimay J. Anumba. Buildings, Special Issue BIM in Building Lifecycle, 6(2):20:1-20:24, 2016.
  39. Translingual Obfuscation, by Pei Wang*, Shuai Wang*, Jiang Ming*, Yufei Jiang*, and Dinghao Wu. In Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro S&P 2016), Saarbrucken, Germany, March 21-24, 2016. (Acceptance rate: 29/168 = 17.3%) An extended version is available at arXiv.
  40. Uroboros: Instrumenting Stripped Binaries with Static Reassembling, by Shuai Wang*, Pei Wang*, and Dinghao Wu. In Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016), Osaka, Japan, March 14-16, 2016.
  41. Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics, by Gaoyao Xiao, Jun Wang, Peng Liu, Jiang Ming*, and Dinghao Wu. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016), New Orleans, LA, March 9-11, 2016.
  42. Feature-based Software Customization: Preliminary Analysis, Formalization, and Methods, by Yufei Jiang*, Can Zhang*, Dinghao Wu, and Peng Liu. In Proceedings of the 17th IEEE High Assurance Systems Engineering Symposium (HASE 2016), Orlando, Florida, USA, January 7-9, 2016.
  43. 2015

  44. Automatic Building Information Model Query Generation, by Yufei Jiang*, Nan Yu*, Jiang Ming*, Sanghoon Lee, Jason DeGraw, John Yen, John I. Messner, and Dinghao Wu. Journal of Information Technology in Construction (ITCon), 20:518-535, 2015.

  45. LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code, by Jiang Ming*, Dongpeng Xu*, Li Wang*, and Dinghao Wu. In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, Colorado, USA, October 12-16, 2015. (Acceptance rate: 128/646 = 19.8%) Open source software release.
  46. Reassembleable Disassembling, by Shuai Wang*, Pei Wang*, and Dinghao Wu. In Proceedings of the 24th USENIX Security Symposium, Washington, D.C., August 12-14, 2015. (Acceptance rate: 67/426 = 15.7%)
    Open source software release.
  47. TaintPipe: Pipelined Symbolic Taint Analysis, by Jiang Ming*, Dinghao Wu, Gaoyao Xiao, Jun Wang, and Peng Liu. In Proceedings of the 24th USENIX Security Symposium, Washington, D.C., August 12-14, 2015. (Acceptance rate: 67/426 = 15.7%)
  48. A Preliminary Analysis and Case Study of Feature-based Software Customization (Extended Abstract), by Yufei Jiang*, Can Zhang*, Dinghao Wu, and Peng Liu. In Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS 2015), Vancouver, Canada, August 3-5, 2015.
  49. Replacement Attacks: Automatically Impeding Behavior-based Malware Specifications, by Jiang Ming*, Zhi Xin, Pengwei Lan*, Dinghao Wu, Peng Liu, and Bing Mao. In Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS 2015), New York, June 2-5, 2015.
  50. Risk Assessment of Buffer "Heartbleed" Over-read Vulnerabilities, by Jun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, and Peng Liu. In Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2015), Rio de Janeiro, Brazil, June 22-25, 2015. (Acceptance rate: 50/227 = 22.0%)
  51. Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference, by Jiang Ming*, Dongpeng Xu*, and Dinghao Wu. In Proceedings of the 30th IFIP SEC 2015 International Information Security and Privacy Conference (IFIP SEC 2015), Hamburg, Germany, May 26-28, 2015.
  52. Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection, by Yoon-Chan Jhi, Xiaoqi Jia, Xinran Wang, Sencun Zhu, Peng Liu, and Dinghao Wu. IEEE Transactions on Software Engineering. 41(9):925-943, 2015. A preliminary version appeared in Proceedings of the 33rd ACM/IEEE International Conference on Software Engineering (ICSE 2011), Software Engineering in Practice Track.
  53. Towards Discovering and Understanding the Unexpected Hazards in Tailoring Antivirus Software for Android, by Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, and Dinghao Wu. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), Singapore, April 14-17, 2015. (Acceptance rate: 48/269 = 17.8%)
  54. 2014

  55. Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection, by Lannan Luo†, Jiang Ming*, Dinghao Wu, Peng Liu, and Sencun Zhu. In Proceedings of the 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2014), Hong Kong, China, November 16-22, 2014. (Distinguished Paper Award Nomination) (Acceptance rate: 61/273 = 22.3%)

  56. Program Logic Based Software Plagiarism Detection, by Fangfang Zhang, Dinghao Wu, Peng Liu, and Sencun Zhu. In Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering (ISSRE 2014), Naples, Italy, November 3-6, 2014. (Acceptance rate: 31/124 = 25.0%)

  57. Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms, by Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu, and Dinghao Wu. In Proceedings of the International Workshop on System Level Security of Smartphones (SLSS 2014), Beijing, China, September 23, 2014.

  58. PiE: Programming in Eliza, by Xiao Liu* and Dinghao Wu. In Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014), pages 695-700. New Ideas Papers. Vasteras, Sweden, September 15-19, 2014. (Acceptance rate: 82/337 = 24.3%)

  59. ViewDroid: Towards Obfuscation-Resilient Mobile Application Repackaging Detection, by Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, and Peng Liu. In Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), Oxford, United Kingdom, July 23-25, 2014. (Acceptance rate: 14/96 = 14.6%)

  60. A Framework for Integrating Change Management with Building Information Modeling, by Fangxiao Liu, Abdou Karim Jallow, Chimay J. Anumba, and Dinghao Wu. In Proceedings of the 15th International Conference on Computing in Civil and Building Engineering (ICCCBE 2014), Orlando, FL, June 23-25, 2014.

  61. Teaching Information Security with Virtual Laboratories, by Dinghao Wu, John Fulmer, and Shannon Johnson. In Innovative Practices in Teaching Information Sciences and Technology: Experience Reports and Reflections, John M. Carroll (Ed.), pages 179-192. Springer, 2014.

  62. Software Cruising: A New Technology for Building Concurrent Software Monitor, by Dinghao Wu, Peng Liu, Qiang Zeng, and Donghai Tian. In Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, and Cliff Wang (Eds.), Secure Cloud Computing, Advances in Information Security Series, pages 303-324. Springer, 2014.

    2013

  63. Building Knowledge Modeling: Integrating Knowledge in BIM, by Fangxiao Liu, Abdou K. Jallow, Chimay J. Anumba, and Dinghao Wu. In Proceedings of the 30th International Conference on Applications of IT in the AEC Industry (CIB W78 2013), Beijing, China, October 9-12, 2013.

  64. Integrating BIMserver and OpenStudio for Energy Efficient Building, by Nan Yu*, Yufei Jiang*, Lannan Luo†, Sanghoon Lee, Abdou Jallow, Dinghao Wu, John Messner, Robert Leicht, and John Yen. In Proceedings of the 2013 ASCE International Workshop on Computing in Civil Engineering (ASCE 2013), pages 516-523, Los Angeles, CA, USA, June 23-25, 2013.

  65. Reactive Transport Modeling of Induced Selective Plugging by Leuconostoc Mesenteroides in Carbonate Formations, by Javier Vilcaez, Li Li, Dinghao Wu, and Susan Hubbard. Geomicrobiology Journal. Taylor & Francis, 30(9), 813-828, 2013.

  66. Semantic Aware Attribution Analysis of Remote Exploits, by Deguang Kong, Donghai Tian, Peng Liu, and Dinghao Wu. Wiley Journal of Security and Communication Networks, 6(7):818-832, July 2013.

  67. A Framework for Evaluating Mobile App Repackaging Detection Algorithms, by Heqing Huang, Sencun Zhu, Peng Liu, and Dinghao Wu. In Proceedings of the 6th International Conference on Trust & Trustworthy Computing (TRUST 2013), London, UK, June 17-19, 2013. (Acceptance rate: 20.5%)

    2012

  68. A First Step Towards Algorithm Plagiarism Detection, by Fangfang Zhang, Yoon-Chan Jhi, Dinghao Wu, Peng Liu, and Sencun Zhu. In Proceedings of the 2012 ACM International Symposium on Software Testing and Analysis (ISSTA 2012), Minneapolis, MN, July 15-20, 2012. (Acceptance rate: 31/108 = 28.7%)

  69. BIM Server Requirements to Support the Energy Efficient Building Lifecycle, by Yufei Jiang*, Jiang Ming*, Dinghao Wu, John Yen, Prasenjit Mitra, John I. Messner, and Robert Leicht. In Proceedings of the 2012 ASCE International Conference on Computing in Civil Engineering (ASCE 2012), Special Session on BIM Computer Science Fundamentals, Clearwater Beach, FL, June 17-20, 2012.

  70. Towards Trusted Services: Result Verification Schemes for MapReduce, by Chu Huang†, Sencun Zhu, and Dinghao Wu. In Proceedings of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012), Ottawa, Canada, May 13-16, 2012. (Acceptance rate: 83/302 = 27.5%)

  71. Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring, by Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, and Changzhen Hu. In Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012), San Diego, California, February 5-8, 2012. (Acceptance rate: 46/258 = 17.8%)

    2011

  72. Identifying Leaders in an Online Cancer Survivor Community, by Kang Zhao, Baojun Qiu, Cornelia Caragea, Dinghao Wu, Prasenjit Mitra, John Yen, Greta E. Greer, and Kenneth Portier. In Proceedings of the 21st Annual Workshop on Information Technologies and Systems (WITS 2011), Shanghai, China, December 3-4, 2011.

  73. Get Online Support, Feel Better—Sentiment Analysis and Dynamics in an Online Cancer Survivor Community, by Baojun Qiu, Kang Zhao, Prasenjit Mitra, Dinghao Wu, Cornelia Caragea, John Yen, Greta E. Greer, and Kenneth Portier. In Proceedings of the Third IEEE International Conference on Social Computing (SocialCom 2011), Boston, USA, October 9-11, 2011. (Acceptance rate: 9.8%)

  74. SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits, by Deguang Kong, Donghai Tian, Peng Liu, and Dinghao Wu. In Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2011), London, UK, September 7-9, 2011. (Acceptance rate: 23/92= 24.2%)

  75. Cruiser: Concurrent Buffer Overflow Monitoring Using Lock-free Data Structures, by Qiang Zeng, Dinghao Wu, and Peng Liu. In Proceedings of the 2011 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2011), pages 367-377, San Jose, CA, USA, June 4-8, 2011. (Acceptance rate: 55/236 = 23.0%)

  76. Value-Based Program Characterization and Its Application to Software Plagiarism Detection, by Yoon-Chan Jhi, Xinran Wang, Xiaoqi Jia, Sencun Zhu, Peng Liu, and Dinghao Wu. In Proceedings of the 33rd ACM/IEEE International Conference on Software Engineering (ICSE 2011), Software Engineering in Practice Track, pages 756-765, Honolulu, Hawaii, USA, May 21-28, 2011. (Acceptance rate: 18/100 = 18.0%)

  77. Classifying Text Messages for the Haiti Earthquake, by Cornelia Caragea, Nathan McNeese, Anuj Jaiswal, Greg Traylor, Hyun-Woo Kim, Prasenjit Mitra, Dinghao Wu, Andrea Tapia, C. Lee Giles, Jim Jansen, and John Yen. In Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011), Lisbon, Portugal, May 8-11, 2011.

    Publications before joined PSU
    (2005-2009 in industry, see the patent section)

  78. KISS: Keep It Simple and Sequential, by Shaz Qadeer and Dinghao Wu. In Proceedings of the 2004 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2004), pages 14-24, Washington DC, June 9-11, 2004.

    The KISS project was started in Summer 2003 and reviewed by Bill Gates in Summer 2004. This is the first work on analyzing concurrent software with sequential analysis, and has been followed by many other researchers. There are 188 citations as of March 2015 by Google Scholar.

  79. Construction of a Semantic Model for a Typed Assembly Language, by Gang Tan, Andrew W. Appel, Kedar N. Swadi, and Dinghao Wu. In Proceedings of the 5th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI '04). Springer-Verlag Lecture Notes in Computer Science (LNCS 2937), pages 30-43, Venice, Italy, January 2004.

  80. Foundational Proof Checkers with Small Witnesses, by Dinghao Wu, Andrew W. Appel, and Aaron Stump. In Proceedings of the Fifth ACM-SIGPLAN International Conference on Principles and Practice of Declarative Programming (PPDP 2003), pages 264-274, Uppsala, Sweden, August 27-29, 2003.

  81. A Provably Sound TAL for Back-end Optimization, by Juan Chen, Dinghao Wu, Andrew W. Appel, and Hai Fang. In Proceedings of the 2003 ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI 2003), pages 208-219, San Diego, California, June 8-11, 2003.

  82. (in Chinese) On Theoretical Basis of a State-Space Based Approach to the Design of Hybrid Systems, by Dinghao Wu and Jian Lu. Journal of Nanjing University (Natural Sciences), 35(5):564-572, 1999.

  83. (in Chinese) Researches on Software Interoperability, by Junhua Ding, Huan Dong, Dinghao Wu, and Jian Lu. Computer Research and Development, 35(7):577-583, 1998.

  84. (in Chinese) A State-Space Based Approach to the Design of Hybrid Systems, by Dinghao Wu and Jian Lu. In Proceedings of the 7th National Conference of Young Computer Scientists (NCYCS '98), pages 48-53, Shanghai, China, October 1998. China Computer Federation (CCF), Shanghai Sci-Tech Press.

  85. Two-Dimensional Dealiasing of Doppler Velocities, by Guoqing Liu, Wenzhong Ge, Xueru Zhang, Dinghao Wu, and Ji Zhou. In Proceedings of the 27th International Conference on Radar Meteorology. American Meteorological Society. Vail, Colorado, October 9-13, 1995.

    Technical Reports

  86. Tailored Application-specific System Call Tables, by Qiang Zeng, Zhi Xin, Dinghao Wu, Peng Liu, and Bing Mao. Technical Report. 2014.

  87. Detecting Data Race and Atomicity Violation via Typestate-Guided Static Analysis, by Yue Yang, Anna Gringauze, Dinghao Wu, and Henning Rohde, Technical Report MSR-TR-2008-108, Microsoft Research, August 2008.

    Theses

  88. Interfacing Compilers, Proof Checkers, and Proofs for Foundational Proof-Carrying Code, by Dinghao Wu. Ph.D. thesis, Department of Computer Science, Princeton University, 2005.

  89. A State-Space Based Approach to the Specification and Verification of Hybrid Systems and Its Axiomatic Basis, by Dinghao Wu. Master's Thesis. Department of Computer Science, Nanjing University. May 1999.

  90. (in Chinese) Numerical Simulation of Free Turbulent Jets, by Dinghao Wu. Bachelor's Thesis. Department of Chemical Engineering, Nanjing University of Chemical Technology. June 1996.

    Patents

  91. Data Race Detection Using Sequential Program Analysis. (Shaz Qadeer and Dinghao Wu), US Patent US7316005. Issued on January 01, 2008.

  92. Detecting Data Race and Atomicity Violation via Typestate-Guided Static Analysis. (Yue Yang, Anna Gringauze, Dinghao Wu, and Henning Rohde), US Patent 8,510,722. Issued on August 13, 2013.