Research Papers

Google Scholar

Publications in top-tier venues:

     IEEE S&P [CryptoHunt, D2C2, PolyGlot],
     CCS [LOOP, VMHunt, Squirrel],
     USENIX Security [Uroboros, TaintPipe, BinSim, CacheD, CacheS, µFUZZ],
     NDSS [Kruiser, TortoiseFuzz],
     IEEE Euro S&P [Babel, ROP],
     IEEE Trans. on Inf. Forensics & Sec. [Xmark, Darknet],
     PLDI [Cruiser, KISS, LTAL],
     OOPSLA [Differential Set],
     ICSE [Abacus, AutoGrader, Obfuscation study I, Obfuscation study II, LibD, PackerGrind, VaPD],
     FSE [CoP],
     ASE [PiE, StraightTaint, IMF],
     ISSTA [AlgPlg, Parema],
     IEEE Trans. Software Eng. (TSE) [PackerGrind, LibD, CoP, VaPD],
     IEEE Trans. Cloud Computing (TCC) [Kruiser],
     Software: Practice and Experience [Obfuscation field study],
     AAAI [DeepFuzz],
     NeurIPS [A3FL],
     ICML [LAGNN, FusionRetro, Graph Contrastive Backdoor Attacks],
     MICRO [Hardware Support for Constant-Time Programming].

    2024

  1. DOS-GNN: Dual-Feature Aggregations with Over-Sampling for Class-Imbalanced Fraud Detection on Graphs, by Shixiong Jing, Lingwei Chen, Quan Li, and Dinghao Wu. In Proceedings of the 2024 International Joint Conference on Neural Networks (IJCNN), Yokohama, Japan, 2024. (accepted)

    2023

  2. A3FL: Adversarially Adaptive Backdoor Attacks to Federated Learning, by Hangfan Zhang, Jinyuan Jia, Jinghui Chen, Lu Lin, Dinghao Wu. In Proceedings of the Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS 2023), New Orleans, December 2023.

  3. Pseudo-Labeling with Graph Active Learning for Few-shot Node Classification, by Quan Li, Lingwei Chen, Shixiong Jing, and Dinghao Wu. In Proceedings of the 23rd IEEE International Conference on Data Mining (ICDM), Shanghai, China, December 2023. (short paper)

  4. Hardware Support for Constant-Time Programming, by Yuanqing Miao, Mahmut Taylan Kandemir, Danfeng Zhang, Yingtian Zhang, Gang Tan, and Dinghao Wu. In Proceedings of the 56th IEEE/ACM International Symposium on Microarchitecture (MICRO), Toronto, Canada, October-November 2023.

  5. Quantifying and Mitigating Cache Side Channel Leakage with Differential Set, by Cong Ma, Dinghao Wu, Gang Tan, Mahmut Taylan Kandemir, and Danfeng Zhang. In Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), OOPSLA issue of the Proceedings of the ACM on Programming Languages (PACMPL), October 2023.

  6. µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture, by Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, and Wenke Lee. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security '23), 2023.

  7. Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy, by Xiaoting Li, Lingwei Chen, and Dinghao Wu. ACM Transactions on Knowledge Discovery from Data (TKDD), Volume 18, Issue 2, Article No.: 46, pp. 1-24, 2023.

  8. Graph Contrastive Backdoor Attacks, by Hangfan Zhang, Jinghui Chen, Lu Lin, Jinyuan Jia, and Dinghao Wu. In Proceedings of the 40 th International Conference on Machine Learning (ICML), Honolulu, Hawaii, USA. PMLR 202, 2023.

  9. FusionRetro: Molecule Representation Fusion via In-Context Learning for Retrosynthetic Planning, by Songtao Liu, Zhengkai Tu, Minkai Xu, Zuobai Zhang, Lu Lin, Rex Ying, Jian Tang, Peilin Zhao, and Dinghao Wu. In Proceedings of the 40 th International Conference on Machine Learning (ICML), Honolulu, Hawaii, USA. PMLR 202, 2023.

  10. Source Code Implied Language Structure Abstraction through Backward Taint Analysis, by Zihao Wang, Pei Wang, Qinkun Bao, and Dinghao Wu. In Proceedings of the 18th International Conference on Software Technologies (ICSOFT), Rome, Italy, 2023.

  11. LibSteal: Model Extraction Attack towards Deep Learning Compilers by Reversing DNN Binary Library, by Jinquan Zhang, Pei Wang, and Dinghao Wu. In Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE), 2023.

  12. Hierarchical Graph Neural Network for Patient Treatment Preference Prediction with External Knowledge, by Quan Li, Lingwei Chen, Yong Cai, and Dinghao Wu. In Proceedings of the 27th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2023.

  13. Knowledge Distillation on Cross-Modal Adversarial Reprogramming for Data-Limited Attribute Inference, by Quan Li, Lingwei Chen, Shixiong Jing, and Dinghao Wu. In WWW '23 Companion: Companion Proceedings of the ACM Web Conference, 2023. (short paper)

    2022

  14. Detecting and Interpreting Changes in Scanning Behavior in Large Network Telescopes, by Michael Kallitsis, Rupesh Prajapati, Vasant Honavar, Dinghao Wu, and John Yen. IEEE Transactions on Information Forensics & Security, vol. 17, pp. 3611-3625, October 2022.

  15. Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks, by Xiaoting Li, Lingwei Chen, and Dinghao Wu. In Proceedings of the 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2022), pp. 710-728, October 2022.

  16. Local Augmentation for Graph Neural Networks, by Songtao Liu, Rex Ying, Hanze Dong, Lanqing Li, Tingyang Xu, Yu Rong, Peilin Zhao, Junzhou Huang, and Dinghao Wu. In International Conference on Machine Learning 2022 (ICML), Baltimore, Maryland, USA, July 2022.

  17. How Powerful is Implicit Denoising in Graph Neural Networks, by Songtao Liu, Rex Ying, Hanze Dong, Lu Lin, Jinghui Chen, and Dinghao Wu. In NeurIPS 2022 Workshop: New Frontiers in Graph Learning (GLFrontiers), 2022.

  18. Enhancing Multi-hop Connectivity for Graph Convolutional Networks, by Songtao Liu, Shixiong Jing, Tong Zhao, Zengfeng Huang, and Dinghao Wu. In ICML 2022 Workshop on Pre-training: Perspectives, Pitfalls, and Paths Forward, Baltimore, Maryland, USA, July 2022.

  19. FuzzBoost: Reinforcement Compiler Fuzzing, by Xiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati, and Dinghao Wu. In The 24th International Conference on Information and Communications Security (ICICS 2022), Canterbury, UK, September, 2022.

  20. Semi-synchronized Non-blocking Concurrent Kernel Cruising, by Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, and Changzhen Hu. IEEE Transactions on Cloud Computing, 10(2):1428-1444, 2022.

  21. Distilling Knowledge on Text Graph for Social Media Attribute Inference, by Quan Li, Xiaoting Li, Lingwei Chen, and Dinghao Wu. In International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR'22), Madrid, Spain, July 2022. (short paper)

  22. PackerGrind: An Adaptive Unpacking System for Android Apps, by Lei Xue, Hao Zhou, Xiapu Luo, Le Yu, Dinghao Wu, Yajin Zhou, and Xiabo Ma. IEEE Transactions on Software Engineering (TSE), 48(2):551-570, 2022.

  23. Adversarially Reprogramming Pretrained Neural Networks for Data-limited and Cost-efficient Malware Detection, by Lingwei Chen, Xiaoting Li, and Dinghao Wu. In Proceedings of the SIAM International Conference on Data Mining (SDM'22), 2022.

  24. AlphaProg: Reinforcement Generation of Valid Programs for Compiler Fuzzing, by Xiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati, and Dinghao Wu. In Proceedings of the Thirty-Fourth Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-22), 2022.

    2021

  25. Shedding Light Into the Darknet: Scanning Characterization and Detection of Temporal Changes (poster paper), by Rupesh Prajapati, Vasant Honavar, Dinghao Wu, John Yen, and Michalis Kallitsis. In Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT). December 7-10, 2021. (poster)

  26. Characterizing AI Model Inference Applications Running in SGX Environment, by Shixiong Jing, Qinkun Bao, Pei Wang, Xulong Tang, and Dinghao Wu. In Proceedings of the 15th IEEE International Conference on Networking, Architecture, and Storage (NAS), 2021. (short paper)

  27. Parema: An Unpacking Framework for Demystifying VM-based Android Packers, by Lei Xue, Yuxiao Yan, Luyi Yan, Muhui Jiang, Xiapu Luo, Dinghao Wu, and Yajin Zhou. In Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2021).

  28. Abacus: Precise Side-Channel Analysis, by Qinkun Bao, Zihao Wang, Xiaoting Li, James Larus, and Dinghao Wu. In Proceedings of the 43rd International Conference on Software Engineering (ICSE 2021).

  29. Abacus: A Tool for Precise Side-Channel Analysis, by Qinkun Bao, Zihao Wang, James R. Larus, Dinghao Wu. In IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 2021: 238-239.

  30. One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation, by Yongheng Chen, Rui Zhong, Hong Hu, Hangfan Zhang, Yupeng Yang, Dinghao Wu, and Wenke Lee. In Proceedings of the 42nd IEEE Symposium on Security and Privacy (IEEE S&P 2021).

  31. Watermarking-based Defense Against Adversarial Attacks on Deep Neural Networks, by Xiaoting Li, Lingwei Chen, Jingquan Zhang, James Larus, and Dinghao Wu. In Proceedings of International Joint Conference on Neural Networks (IJCNN 2021), Shenzhen, China, 2021.

  32. Turning Attacks into Protection: Social Media Privacy Protection Using Adversarial Attacks, by Xiaoting Li, Lingwei Chen, and Dinghao Wu. In Proceedings of the SIAM International Conference on Data Mining (SDM 2021), April 29 - May 1, 2021.

  33. Deep Learning for COVID-19, by B. S. Prashanth, M. V. Manoj Kumar, Likewin Thomas, M. A. Ajay Kumar, Dinghao Wu, B. Annappa, Anirudh Hebbar, and Y. V. Srinivasa Murthy. Book chapter in Understanding COVID-19: The Role of Computational Intelligence, Springer, 2021.

  34. Fine-Grained Compiler Identification with Sequence-oriented Neural Modeling, by Zhenzhou Tian, Yaqian Huang, Borun Xie, Yanping Chen, Lingwei Chen, and Dinghao Wu. IEEE Access, vol. 9, 2021.

  35. Zooming Into the Darknet: Characterizing Internet Background Radiation and its Structural Changes. Michalis Kallitsis, Vasant G. Honavar, Rupesh Prajapati, Dinghao Wu, John Yen. CoRR abs/2108.00079 (2021)

    2020

  36. Enhancing Robustness of Graph Convolutional Networks via Dropping Graph Connections, by Lingwei Chen, Xiaoting Li, and Dinghao Wu. In Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2020), Ghent, Belgium, September 14-18, 2020.

  37. Squirrel: Testing Database Management Systems with Language Validity and Coverage Feedback, by Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, and Dinghao Wu. In Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS 2020), Orlando, USA, November 9-13, 2020.

  38. Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries, by Pei Wang, Jinquan Zhang, Shuai Wang, and Dinghao Wu. In Proceedings of the 5th IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2020), Genova, Italy, June 16-18, 2020. (Acceptance rate: 15%)

  39. Unexpected Data Dependency Creation and Chaining: A New Attack to SDN, by Feng Xiao, Jinquan Zhang, Jianwei Huang, Guofei Gu, Dinghao Wu, and Peng Liu. In Proceedings of the 41st IEEE Symposium on Security and Privacy (IEEE S&P 2020), San Francisco, CA, May 18-20, 2020.

  40. Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization, by Yanhao Wang, Xiangkun Jia, Yuwei Liu, Kyle Zeng, Tiffany Bao, Dinghao Wu, and Purui Su. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2020), San Diego, California, February 23-26, 2020. (Acceptance rate: 17.4%)

  41. Plagiarism Detection of Multi-threaded Programs via Siamese Neural Networks, by Zhenzhou Tian, Qing Wang, Cong Gao, Lingwei Chen, and Dinghao Wu. IEEE Access, vol. 8, 2020.

  42. Plagiarism Detection of Multi-threaded Programs using Frequent Behavioral Pattern Mining, by Zhenzhou Tian, Qing Wang, Cong Gao, Lingwei Chen, and Dinghao Wu. International Journal of Software Engineering and Knowledge Engineering (IJSEKE), 30(11&12):1667-1688, 2020.

  43. Model Checking---Case Study of a Temporary Structures Monitoring System, by Dongpeng Xu, Xiao Yuan, Dinghao Wu, and Chimay J. Anumba. Book chapter in Chinemelu J. Anumba and Nazila Roofigari-Esfahan (Ed.), Cyber Physical Systems in the Built Environment, Springer, 2020.

    2019

  44. Higher-order Weighted Graph Convolutional Networks, by Songtao Liu, Lingwei Chen, Hanze Dong, Zihao Wang, Dinghao Wu, and Zengfeng Huang. arXiv preprint arXiv:1911.04129, 2019.

  45. MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus, by Li Wang, Dongpeng Xu, Jiang Ming, Yu Fu, and Dinghao Wu. In Proceedings of the 3rd International Workshop on Software PROtection (SPRO2019), Co-located with the 26th ACM Conference on Computer and Communications Security, London, UK November 11-15, 2019.

  46. Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation, by Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, and Dinghao Wu. In Proceedings of the 28th USENIX Security Symposium (USENIX Security '19), Santa Clara, CA, August 14-16, 2019. An extended version is available at arXiv.

  47. Xmark: Dynamic Software Watermarking Using Collatz Conjecture, by Haoyu Ma, Chunfu Jia, Shijia Li, Wantong Zheng, and Dinghao Wu. IEEE Transactions on Information Forensics and Security, 14(11):2859-2874, November, 2019.

  48. Automatic Grading of Programming Assignments: An Approach Based on Formal Semantics, by Xiao Liu, Shuai Wang, Pei Wang, and Dinghao Wu. In Proceedings of the 41st ACM/IEEE International Conference on Software Engineering (ICSE 2019), the Software Engineering Education and Training (SEET) track, Montreal, QC, Canada, 25 May - 31 May 2019.

  49. DeepFuzz: Automatic Generation of Syntax Valid C Programs for Fuzz Testing, by Xiao Liu, Xiaoting Li, Rupesh Prajapati, and Dinghao Wu. In Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence (AAAI-19), Honolulu, Hawaii, USA, January 27 - February 1, 2019.

  50. A Lightweight Framework for Regular Expression Verification, by Xiao Liu, Yufei Jiang, and Dinghao Wu. In Proceedings of the 19th IEEE international Symposium on High Assurance Systems Engineering (HASE 2019), Hangzhou, China, January 3-5, 2019. Best Paper Award.

    2018

  51. Bridging the Gap Between Security Tools and SDN Controllers, by Li Wang and Dinghao Wu. EAI Endorsed Transactions on Security and Safety, 5(17), December 2018.

  52. Field Experience with Obfuscating Million-User iOS Apps in Large Enterprise Mobile Development, by Pei Wang, Dinghao Wu, Zhaofeng Chen, and Tao Wei. Software: Practice and Experience, 2018.

  53. Large-scale Third-party Library Detection in Android Markets, by Menghao Li, Pei Wang, Wei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo, and Wei Zou. IEEE Transactions on Software Engineering (TSE), 2018.

  54. VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification, by Dongpeng Xu, Jiang Ming, Yu Fu, and Dinghao Wu. In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 15-19, 2018.

  55. RedDroid: Android Application Redundancy Customization Based on Static Analysis, by Yufei Jiang, Qinkun Bao, Shuai Wang, Xiao Liu, and Dinghao Wu. In Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering (ISSRE 2018), Memphis, TN, October 15-18, 2018.

  56. Software Protection on the Go: A Large-Scale Empirical Study on Mobile App Obfuscation, by Pei Wang, Qinkun Bao, Li Wang, Shuai Wang, Zhaofeng Chen, Tao Wei, and Dinghao Wu. In Proceedings of the 40th International Conference on Software Engineering (ICSE 2018), Gothenburg, Sweden, May 27 - June 3, 2018. (Acceptance rate: 105/502 = 20.9%)

  57. Protecting Million-User iOS Apps with Obfuscation: Motivations, Pitfalls, and Experience, by Pei Wang, Dinghao Wu, Zhaofeng Chen, and Tao Wei. In Proceedings of the 40th International Conference on Software Engineering (ICSE 2018), Software Engineering in Practice (SEIP) Track, Gothenburg, Sweden, May 27 - June 3, 2018.

  58. From Natural Language to Programming Language, by Xiao Liu and Dinghao Wu. Book chapter in Steve Goschnick (Ed.), Innovative Methods, User-Friendly Tools, Coding, and Design Approaches in People-Oriented Programming. 2018.

    2017

  59. In-Memory Fuzzing for Binary Code Similarity Analysis, by Shuai Wang and Dinghao Wu. In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017), Urbana Champaign, Illinois, USA, October 30 - November 3, 2017. (Acceptance rate 65/314=20.7%)

  60. Binary Code Retrofitting and Hardening Using SGX, by Shuai Wang, Wenhao Wang, Qinkun Bao, Pei Wang, XiaoFeng Wang, and Dinghao Wu. In Proceedings of the Second Workshop on Forming an Ecosystem Around Software Transformation (FEAST 2017), co-located with CCS 2017, Dallas, USA, November 3, 2017.

  61. Automated Synthesis of Access Control Lists, by Xiao Liu, Brett Holden, and Dinghao Wu. In Proceedings of the 3rd International Conference on Software Security and Assurance (ICSSA 2017), Altoona, Pennsylvania, USA, July 24-25, 2017. Best Paper Award.

  62. Lambda Obfuscation, by Pengwei Lan, Pei Wang, Shuai Wang, and Dinghao Wu. In Proceedings of the 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017), Niagara Falls, Canada, October 22-25, 2017.

  63. Turing Obfuscation, by Yan Wang, Shuai Wang, Pei Wang, and Dinghao Wu. In Proceedings of the 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017), Niagara Falls, Canada, October 22-25, 2017.

  64. SecControl: Bridging the Gap Between Security Tools and SDN Controllers, by Li Wang and Dinghao Wu. In Workshop on Applications and Techniques in Cyber Security (ATCS), co-located with the 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017), Niagara Falls, Canada, October 22-25, 2017.

  65. Semantics-Aware Machine Learning for Function Recognition in Binary Code, by Shuai Wang, Pei Wang, and Dinghao Wu. In Proceedings of the 33rd IEEE International Conference on Software Maintenance and Evolution (ICSME 2017), Shanghai, China. September 17-24, 2017.

  66. Composite Software Diversification, by Shuai Wang, Pei Wang, and Dinghao Wu. In Proceedings of the 33rd IEEE International Conference on Software Maintenance and Evolution (ICSME 2017), Shanghai, China. September 17-24, 2017.

  67. BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking, by Jiang Ming, Dongpeng Xu, Yufei Jiang, and Dinghao Wu. In Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 16-18, 2017. (Acceptance rate 85/522=16.3%)
  68. CacheD: Identifying Cache-Based Timing Channels in Production Software, by Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, and Dinghao Wu. In Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 16-18, 2017. (Acceptance rate 85/522=16.3%)
  69. A Lightweight Framework for Regex Verification, by Xiao Liu and Dinghao Wu (advisor). Bronze Medal, the ACM Graduate Student Research Competition at PLDI'17, Barcelona, Spain. June 2017.

  70. Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping, by Dongpeng Xu, Jiang Ming, and Dinghao Wu. In Proceedings of the 38th IEEE Symposium on Security and Privacy (IEEE S&P 2017), San Jose, CA, May 22-24, 2017. (Acceptance rate 60/450=13.3%)
  71. LibD: Scalable and Precise Third-party Library Detection in Android Markets, by Menghao Li, Wei Wang, Pei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, and Wei Huo. In Proceedings of the 39th ACM/IEEE International Conference on Software Engineering (ICSE 2017), Buenos Aires, Argentina, May 20-28, 2017. (Acceptance rate: 16.4%)
  72. Adaptive Unpacking of Android Apps, by Lei Xue, Xiapu Luo, Le Yu, Shuai Wang, and Dinghao Wu. In Proceedings of the 39th ACM/IEEE International Conference on Software Engineering (ICSE 2017), Buenos Aires, Argentina, May 20-28, 2017. (Acceptance rate: 16.4%)
  73. Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection, by Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, and Sencun Zhu. IEEE Transactions on Software Engineering, 43(12), December 2017. A preliminary version appeared in Proceedings of the 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2014).
  74. MalwareHunt: Semantics-Based Malware Diffing Speedup by Normalized Basic Block Memoization, by Jiang Ming, Dongpeng Xu, and Dinghao Wu. Journal of Computer Virology and Hacking Techniques, 13(3), August 2017. (First online May 17, 2016). A preliminary version appeared in Proceedings of the 30th IFIP SEC 2015 International Information Security and Privacy Conference (IFIP SEC 2015).
  75. Impeding Behavior-based Malware Analysis via Replacement Attacks to Malware Specifications, by Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, and Bing Mao. Journal of Computer Virology and Hacking Techniques, 13(3), August 2017. (First online May 31, 2016). A preliminary version appeared in Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS 2015).
  76. Natural Shell: An Assistant for End-user Scripting, by Xiao Liu, Yufei Jiang, Lawrence Wu, and Dinghao Wu. International Journal of People-Oriented Programming (IJPOP), 2017.
  77. 2016

  78. StraightTaint: Decoupled Offline Symbolic Taint Analysis, by Jiang Ming, Dinghao Wu, Jun Wang, Gaoyao Xiao, and Peng Liu. In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (ASE 2016), Singapore, September 3-7, 2016. (Acceptance rate: 19.1%)
  79. Software Plagiarism Detection: A Survey, by Zhenzhou Tian, Ting Liu, Qinghua Zheng, Feifei Tong, Dinghao Wu, Sencun Zhu, and Kai Chen. Journal of Cyber Security, 1(3):52-76, 2016.

  80. BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling, by Jiang Ming and Dinghao Wu. In Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, Engineering Track, (SCAM 2016), Raleigh, NC, USA, October 2-3, 2016.

  81. Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method, by Dongpeng Xu, Jiang Ming, and Dinghao Wu. In Proceedings of the 19th Information Security Conference (ISC '16), Honolulu, Hawaii, USA, September 7-9, 2016.
  82. Moving Target Defense Against Network Reconnaissance with Software Defined Networking, by Li Wang and Dinghao Wu. In Proceedings of the 19th Information Security Conference (ISC '16), Honolulu, Hawaii, USA, September 7-9, 2016.
  83. iCruiser: Protecting Kernel Link-Based Data Structures with Secure Canary, by Li Wang, Dinghao Wu, and Peng Liu. In Proceedings of the 7th IEEE International Workshop on Trustworthy Computing (TC 2016), in conjunction with QRS 2016, Vienna, Austria, August 1-3, 2016.
  84. Deviation-Based Obfuscation-Resilient Program Equivalence Checking with Application to Software Plagiarism Detection, by Jiang Ming, Fangfang Zhang, Dinghao Wu, Peng Liu, and Sencun Zhu. IEEE Transactions on Reliability, 65(4), December 2016. A preliminary version appeared in Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering (ISSRE 2014).
  85. Repackage-proofing Android Apps, by Lannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, and Peng Liu. In Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), Toulouse, France, June 28 - July 1, 2016. (Acceptance rate: 58/259 = 22.4%)
  86. JRed: Program Customization and Bloatware Mitigation based on Static Analysis, by Yufei Jiang, Dinghao Wu, and Peng Liu. In Proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC 2016), Atlanta, Georgia, USA, June 10-14, 2016. (Acceptance rate: 18%)
  87. An Analysis of BIM Web Service Requirements and Design to Support Energy Efficient Building Lifecycle, by Yufei Jiang, Xiao Liu, Fangxiao Liu, Dinghao Wu, and Chimay J. Anumba. Buildings, Special Issue BIM in Building Lifecycle, 6(2):20:1-20:24, 2016.
  88. Translingual Obfuscation, by Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, and Dinghao Wu. In Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro S&P 2016), Saarbrucken, Germany, March 21-24, 2016. (Acceptance rate: 29/168 = 17.3%) An extended version is available at arXiv.
  89. Uroboros: Instrumenting Stripped Binaries with Static Reassembling, by Shuai Wang, Pei Wang, and Dinghao Wu. In Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016), Osaka, Japan, March 14-16, 2016.
  90. Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics, by Gaoyao Xiao, Jun Wang, Peng Liu, Jiang Ming, and Dinghao Wu. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016), New Orleans, LA, March 9-11, 2016.
  91. Feature-based Software Customization: Preliminary Analysis, Formalization, and Methods, by Yufei Jiang, Can Zhang, Dinghao Wu, and Peng Liu. In Proceedings of the 17th IEEE High Assurance Systems Engineering Symposium (HASE 2016), Orlando, Florida, USA, January 7-9, 2016.
  92. 2015

  93. Automatic Building Information Model Query Generation, by Yufei Jiang, Nan Yu, Jiang Ming, Sanghoon Lee, Jason DeGraw, John Yen, John I. Messner, and Dinghao Wu. Journal of Information Technology in Construction (ITCon), 20:518-535, 2015.

  94. LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code, by Jiang Ming, Dongpeng Xu, Li Wang, and Dinghao Wu. In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, Colorado, USA, October 12-16, 2015. (Acceptance rate: 128/646 = 19.8%) Open source software release.
  95. Reassembleable Disassembling, by Shuai Wang, Pei Wang, and Dinghao Wu. In Proceedings of the 24th USENIX Security Symposium, Washington, D.C., August 12-14, 2015. (Acceptance rate: 67/426 = 15.7%)
    Open source software release.
  96. TaintPipe: Pipelined Symbolic Taint Analysis, by Jiang Ming, Dinghao Wu, Gaoyao Xiao, Jun Wang, and Peng Liu. In Proceedings of the 24th USENIX Security Symposium, Washington, D.C., August 12-14, 2015. (Acceptance rate: 67/426 = 15.7%)
  97. A Preliminary Analysis and Case Study of Feature-based Software Customization (Extended Abstract), by Yufei Jiang, Can Zhang, Dinghao Wu, and Peng Liu. In Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS 2015), Vancouver, Canada, August 3-5, 2015.
  98. Replacement Attacks: Automatically Impeding Behavior-based Malware Specifications, by Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, and Bing Mao. In Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS 2015), New York, June 2-5, 2015.
  99. Risk Assessment of Buffer "Heartbleed" Over-read Vulnerabilities, by Jun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, and Peng Liu. In Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2015), Rio de Janeiro, Brazil, June 22-25, 2015. (Acceptance rate: 50/227 = 22.0%)
  100. Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference, by Jiang Ming, Dongpeng Xu, and Dinghao Wu. In Proceedings of the 30th IFIP SEC 2015 International Information Security and Privacy Conference (IFIP SEC 2015), Hamburg, Germany, May 26-28, 2015.
  101. Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection, by Yoon-Chan Jhi, Xiaoqi Jia, Xinran Wang, Sencun Zhu, Peng Liu, and Dinghao Wu. IEEE Transactions on Software Engineering. 41(9):925-943, 2015. A preliminary version appeared in Proceedings of the 33rd ACM/IEEE International Conference on Software Engineering (ICSE 2011), Software Engineering in Practice Track.
  102. Towards Discovering and Understanding the Unexpected Hazards in Tailoring Antivirus Software for Android, by Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, and Dinghao Wu. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), Singapore, April 14-17, 2015. (Acceptance rate: 48/269 = 17.8%)
  103. 2014

  104. Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection, by Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, and Sencun Zhu. In Proceedings of the 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2014), Hong Kong, China, November 16-22, 2014. (Distinguished Paper Award Nomination) (Acceptance rate: 61/273 = 22.3%)

  105. Program Logic Based Software Plagiarism Detection, by Fangfang Zhang, Dinghao Wu, Peng Liu, and Sencun Zhu. In Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering (ISSRE 2014), Naples, Italy, November 3-6, 2014. (Acceptance rate: 31/124 = 25.0%)

  106. Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms, by Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu, and Dinghao Wu. In Proceedings of the International Workshop on System Level Security of Smartphones (SLSS 2014), Beijing, China, September 23, 2014.

  107. PiE: Programming in Eliza, by Xiao Liu and Dinghao Wu. In Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014), pages 695-700. New Ideas Papers. Vasteras, Sweden, September 15-19, 2014. (Acceptance rate: 82/337 = 24.3%)

  108. ViewDroid: Towards Obfuscation-Resilient Mobile Application Repackaging Detection, by Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, and Peng Liu. In Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), Oxford, United Kingdom, July 23-25, 2014. (Acceptance rate: 14/96 = 14.6%) Download the software prototype here.

  109. A Framework for Integrating Change Management with Building Information Modeling, by Fangxiao Liu, Abdou Karim Jallow, Chimay J. Anumba, and Dinghao Wu. In Proceedings of the 15th International Conference on Computing in Civil and Building Engineering (ICCCBE 2014), Orlando, FL, June 23-25, 2014.

  110. Teaching Information Security with Virtual Laboratories, by Dinghao Wu, John Fulmer, and Shannon Johnson. In Innovative Practices in Teaching Information Sciences and Technology: Experience Reports and Reflections, John M. Carroll (Ed.), pages 179-192. Springer, 2014.

  111. Software Cruising: A New Technology for Building Concurrent Software Monitor, by Dinghao Wu, Peng Liu, Qiang Zeng, and Donghai Tian. In Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, and Cliff Wang (Eds.), Secure Cloud Computing, Advances in Information Security Series, pages 303-324. Springer, 2014.

    2013

  112. Building Knowledge Modeling: Integrating Knowledge in BIM, by Fangxiao Liu, Abdou K. Jallow, Chimay J. Anumba, and Dinghao Wu. In Proceedings of the 30th International Conference on Applications of IT in the AEC Industry (CIB W78 2013), Beijing, China, October 9-12, 2013.

  113. Integrating BIMserver and OpenStudio for Energy Efficient Building, by Nan Yu, Yufei Jiang, Lannan Luo, Sanghoon Lee, Abdou Jallow, Dinghao Wu, John Messner, Robert Leicht, and John Yen. In Proceedings of the 2013 ASCE International Workshop on Computing in Civil Engineering (ASCE 2013), pages 516-523, Los Angeles, CA, USA, June 23-25, 2013.

  114. Reactive Transport Modeling of Induced Selective Plugging by Leuconostoc Mesenteroides in Carbonate Formations, by Javier Vilcaez, Li Li, Dinghao Wu, and Susan Hubbard. Geomicrobiology Journal. Taylor & Francis, 30(9):813-828, 2013.

  115. Semantic Aware Attribution Analysis of Remote Exploits, by Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, and Dinghao Wu. Wiley Journal of Security and Communication Networks, 6(7):818-832, July 2013.

  116. A Framework for Evaluating Mobile App Repackaging Detection Algorithms, by Heqing Huang, Sencun Zhu, Peng Liu, and Dinghao Wu. In Proceedings of the 6th International Conference on Trust & Trustworthy Computing (TRUST 2013), London, UK, June 17-19, 2013. (Acceptance rate: 20.5%)

    2012

  117. A First Step Towards Algorithm Plagiarism Detection, by Fangfang Zhang, Yoon-Chan Jhi, Dinghao Wu, Peng Liu, and Sencun Zhu. In Proceedings of the 2012 ACM International Symposium on Software Testing and Analysis (ISSTA 2012), Minneapolis, MN, July 15-20, 2012. (Acceptance rate: 31/108 = 28.7%)

  118. BIM Server Requirements to Support the Energy Efficient Building Lifecycle, by Yufei Jiang, Jiang Ming, Dinghao Wu, John Yen, Prasenjit Mitra, John I. Messner, and Robert Leicht. In Proceedings of the 2012 ASCE International Conference on Computing in Civil Engineering (ASCE 2012), Special Session on BIM Computer Science Fundamentals, Clearwater Beach, FL, June 17-20, 2012.

  119. Towards Trusted Services: Result Verification Schemes for MapReduce, by Chu Huang, Sencun Zhu, and Dinghao Wu. In Proceedings of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012), Ottawa, Canada, May 13-16, 2012. (Acceptance rate: 83/302 = 27.5%)

  120. Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring, by Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, and Changzhen Hu. In Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012), San Diego, California, February 5-8, 2012. (Acceptance rate: 46/258 = 17.8%)

    2011

  121. Identifying Leaders in an Online Cancer Survivor Community, by Kang Zhao, Baojun Qiu, Cornelia Caragea, Dinghao Wu, Prasenjit Mitra, John Yen, Greta E. Greer, and Kenneth Portier. In Proceedings of the 21st Annual Workshop on Information Technologies and Systems (WITS 2011), Shanghai, China, December 3-4, 2011.

  122. Get Online Support, Feel Better—Sentiment Analysis and Dynamics in an Online Cancer Survivor Community, by Baojun Qiu, Kang Zhao, Prasenjit Mitra, Dinghao Wu, Cornelia Caragea, John Yen, Greta E. Greer, and Kenneth Portier. In Proceedings of the Third IEEE International Conference on Social Computing (SocialCom 2011), Boston, USA, October 9-11, 2011. (Acceptance rate: 9.8%)

  123. SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits, by Deguang Kong, Donghai Tian, Peng Liu, and Dinghao Wu. In Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2011), London, UK, September 7-9, 2011. (Acceptance rate: 23/92= 24.2%)

  124. Cruiser: Concurrent Buffer Overflow Monitoring Using Lock-free Data Structures, by Qiang Zeng, Dinghao Wu, and Peng Liu. In Proceedings of the 2011 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2011), pages 367-377, San Jose, CA, USA, June 4-8, 2011. (Acceptance rate: 55/236 = 23.0%)

  125. Value-Based Program Characterization and Its Application to Software Plagiarism Detection, by Yoon-Chan Jhi, Xinran Wang, Xiaoqi Jia, Sencun Zhu, Peng Liu, and Dinghao Wu. In Proceedings of the 33rd ACM/IEEE International Conference on Software Engineering (ICSE 2011), Software Engineering in Practice Track, pages 756-765, Honolulu, Hawaii, USA, May 21-28, 2011. (Acceptance rate: 18/100 = 18.0%)

  126. Classifying Text Messages for the Haiti Earthquake, by Cornelia Caragea, Nathan McNeese, Anuj Jaiswal, Greg Traylor, Hyun-Woo Kim, Prasenjit Mitra, Dinghao Wu, Andrea Tapia, C. Lee Giles, Jim Jansen, and John Yen. In Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011), Lisbon, Portugal, May 8-11, 2011.

    2010 and earlier

  127. KISS: Keep It Simple and Sequential, by Shaz Qadeer and Dinghao Wu. In Proceedings of the 2004 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2004), pages 14-24, Washington DC, June 9-11, 2004.

    The KISS project was started in Summer 2003 and reviewed by Bill Gates in Summer 2004. This is the first work on analyzing concurrent software with sequential analysis, and has been followed by many other researchers. There are 188 citations as of March 2015 by Google Scholar.

  128. Construction of a Semantic Model for a Typed Assembly Language, by Gang Tan, Andrew W. Appel, Kedar N. Swadi, and Dinghao Wu. In Proceedings of the 5th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI '04). Springer-Verlag Lecture Notes in Computer Science (LNCS 2937), pages 30-43, Venice, Italy, January 2004.

  129. Foundational Proof Checkers with Small Witnesses, by Dinghao Wu, Andrew W. Appel, and Aaron Stump. In Proceedings of the Fifth ACM-SIGPLAN International Conference on Principles and Practice of Declarative Programming (PPDP 2003), pages 264-274, Uppsala, Sweden, August 27-29, 2003.

  130. A Provably Sound TAL for Back-end Optimization, by Juan Chen, Dinghao Wu, Andrew W. Appel, and Hai Fang. In Proceedings of the 2003 ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI 2003), pages 208-219, San Diego, California, June 8-11, 2003.

  131. (in Chinese) On Theoretical Basis of a State-Space Based Approach to the Design of Hybrid Systems, by Dinghao Wu and Jian Lu. Journal of Nanjing University (Natural Sciences), 35(5):564-572, 1999.

  132. (in Chinese) Researches on Software Interoperability, by Junhua Ding, Huan Dong, Dinghao Wu, and Jian Lu. Computer Research and Development, 35(7):577-583, 1998.

  133. (in Chinese) A State-Space Based Approach to the Design of Hybrid Systems, by Dinghao Wu and Jian Lu. In Proceedings of the 7th National Conference of Young Computer Scientists (NCYCS '98), pages 48-53, Shanghai, China, October 1998. China Computer Federation (CCF), Shanghai Sci-Tech Press.

  134. Two-Dimensional Dealiasing of Doppler Velocities, by Guoqing Liu, Wenzhong Ge, Xueru Zhang, Dinghao Wu, and Ji Zhou. In Proceedings of the 27th International Conference on Radar Meteorology. American Meteorological Society. Vail, Colorado, October 9-13, 1995.

    Technical Reports

  135. Tailored Application-specific System Call Tables, by Qiang Zeng, Zhi Xin, Dinghao Wu, Peng Liu, and Bing Mao. Technical Report. 2014.

  136. Detecting Data Race and Atomicity Violation via Typestate-Guided Static Analysis, by Yue Yang, Anna Gringauze, Dinghao Wu, and Henning Rohde, Technical Report MSR-TR-2008-108, Microsoft Research, August 2008.

    Theses

  137. Interfacing Compilers, Proof Checkers, and Proofs for Foundational Proof-Carrying Code, by Dinghao Wu. Ph.D. thesis, Department of Computer Science, Princeton University, 2005.

  138. A State-Space Based Approach to the Specification and Verification of Hybrid Systems and Its Axiomatic Basis, by Dinghao Wu. Master's Thesis. Department of Computer Science, Nanjing University. May 1999.

  139. (in Chinese) Numerical Simulation of Free Turbulent Jets, by Dinghao Wu. Bachelor's Thesis. Department of Chemical Engineering, Nanjing University of Chemical Technology. June 1996.

    Patents

  140. Data Race Detection Using Sequential Program Analysis. (Shaz Qadeer and Dinghao Wu), US Patent US7316005. Issued on January 01, 2008.

  141. Detecting Data Race and Atomicity Violation via Typestate-Guided Static Analysis. (Yue Yang, Anna Gringauze, Dinghao Wu, and Henning Rohde), US Patent 8,510,722. Issued on August 13, 2013.