Calculated based on number of publications stored in Pure and citations from Scopus
20012025

Research activity per year

Filter
Conference article published in proceeding or book

Search results

  • 2025

    SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone

    Zhang, Y., Zhang, F., Luo, X., Hou, R., Ding, X., Liang, Z., Yan, S., Wei, T. & He, Z., Feb 2025, Proceedings of the 32nd Network and Distributed System Security Symposium (NDSS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • 2024

    A First Look at Security and Privacy Risks in the RapidAPI Ecosystem

    Liao, S., Cheng, L., Luo, X., Song, Z., Cai, H., Yao, D. & Hu, H., Oct 2024, Proceedings of the 31st ACM Conference on Computer and Communications Security (CCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts

    Sun, T., He, N., Xiao, J., Yue, Y., Luo, X. & Wang, H., Aug 2024, The 33rd USENIX Security Symposium.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • An Empirical Study on the Performance of EVMs and Wasm VMs for Smart Contract Execution

    Song, S., Liao, Z., Chen, T., Luo, X., Zhang, Y. & Wang, G., Jul 2024, Proceedings of International Conference on Blockchain and Trustworthy Systems (BlockSys).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers

    Wu, S., Li, Z., Yan, L., Chen, W., Jiang, M., Wang, C., Luo, X. & Zhou, H., Apr 2024, 46th International Conference on Software Engineering.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps

    Cheng, Y., Tang, R., Zuo, C., Zhang, X., Lei, X., Luo, X. & Zhao, Q., Apr 2024, Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. p. 1–13

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Be Careful of What You Embed: Demystifying OLE Vulnerabilities

    Tian, Y., Dong, F., Liu, H., Xu, M., Peng, Z., Ye, Z., Li, S., Luo, X. & Wang, H., Feb 2024, Proceedings of the 32nd Network and Distributed System Security Symposium (NDSS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack

    Zhou, H., Wu, S., Qian, C., Luo, X., Cai, H. & Zhang, C., Feb 2024, The 31st Network and Distributed System Security Symposium. p. 1-17

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification

    Zhou, X., Xiao, X., Li, Q., Zhang, B., Hu, G., Luo, X. & Zhang, T., Jul 2024, The 19th ACM ASIA Conference on Computer and Communications Security.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • ConFuzz: Towards Large Scale Fuzz Testing of Smart Contracts in Ethereum

    Wong, T., Zhang, C., Ni, Y., Luo, M., Chen, H., Yu, Y., Li, W., Luo, X. & Wang, H., May 2024, IEEE International Conference on Computer Communications. p. 1-15

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Contrastive Fingerprinting: A Novel Website Fingerprinting Attack over Few-shot Traces

    Xie, Y., Feng, J., Huang, W., Zhang, Y., Sun, X., Chen, X. & Luo, X., May 2024, Proceedings of the ACM on Web Conference 2024. Association for Computing Machinery, p. 1203–1214

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • DNSScope: Fine-Grained DNS Cache Probing for Remote Network Activity Characterization

    Li, J., Lin, Z., Ma, X., Li, J., Qu, J., Luo, X. & Guan, X., May 2024, IEEE International Conference on Computer Communications.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back

    Sun, Z., Li, Z., Peng, X., Luo, X., Jiang, M., Zhou, H. & Zhang, Y., Oct 2024, Proceedings of the 31st ACM Conference on Computer and Communications Security (CCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis

    Song, S., Chen, J., Chen, T., Luo, X., Li, T., Yang, W., Wang, L., Zhang, W., Luo, F., He, Z., Lu, Y. & Li, P., 11 Sept 2024, ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. Christakis, M. & Pradel, M. (eds.). Association for Computing Machinery, Inc, p. 1682-1694 13 p. (ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • EVMBT: A Binary Translation Scheme for Upgrading EVM Smart Contracts to WASM

    Chen, W., Wang, H., Cui, H., Luo, X., Zheng, S. & Liu, X., 20 Jun 2024, LCTES 2024 - Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems, Co-located with: PLDI 2024. Shrivastava, A. & Sui, Y. (eds.). p. 131-142 12 p. (Proceedings of the ACM SIGPLAN Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES)).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    2 Citations (Scopus)
  • fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup

    Li, Z., Peng, X., He, Z., Luo, X. & Chen, T., Oct 2024, Proceedings of the 31st ACM Conference on Computer and Communications Security (CCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • FDI: Attack Neural Code Generation Systems through User Feedback Channel

    Sun, Z., Du, X., Luo, X., Song, F., Lo, D. & Li, L., 11 Sept 2024, ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. Christakis, M. & Pradel, M. (eds.). Association for Computing Machinery, Inc, p. 528-540 13 p. (ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • Following the "Thread": Toward Finding Manipulatable Bottlenecks In Blockchain Clients

    Wu, S., Li, Z., Zhou, H., Luo, X., Li, J. & Wang, H., 11 Sept 2024, ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. Christakis, M. & Pradel, M. (eds.). Association for Computing Machinery, Inc, p. 1440-1452 13 p. (ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach

    Ai, X., Zhou, J., Zhu, Y., Li, G., Michalak, T. P., Luo, X. & Zhou, K., May 2024, 40th IEEE International Conference on Data Engineering (ICDE). IEEE, p. 1-15

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Learning to Detect and Localize Multilingual Bugs

    Yang, H., Nong, Y., Zhang, T., Luo, X. & Cai, H., Jul 2024, Proceedings of the ACM International Conference on the Foundations of Software Engineering (FSE). Vol. 1. p. 2190 - 2213 97

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
  • LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts

    Zheng, P., Su, B., Luo, X., Chen, T., Zhang, N. & Zheng, Z., 11 Sept 2024, ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. Christakis, M. & Pradel, M. (eds.). Association for Computing Machinery, Inc, p. 566-577 12 p. (ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • LLMIF: Augmented Large Language Model for Fuzzing IoT Devices

    Wang, J., Yu, L. & Luo, X., May 2024, 2024 IEEE Symposium on Security and Privacy. p. 196-196

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation

    He, Z., Li, Z., Qiao, A., Luo, X., Zhang, X., Chen, T., Song, S., Liu, D. & Niu, W., May 2024, 2024 IEEE Symposium on Security and Privacy. p. 128-128

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Rethinking Mesh Watermark: Towards Highly Robust and Adaptable Deep 3D Mesh Watermarking

    Zhu, X., Ye, G., Luo, X. & Wei, X., 25 Mar 2024, Technical Tracks 14. Wooldridge, M., Dy, J. & Natarajan, S. (eds.). 7 ed. Washington: AAAI press, Vol. 38. p. 7784-7792 9 p. (Proceedings of the AAAI Conference on Artificial Intelligence; vol. 38, no. 7).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    5 Citations (Scopus)
  • Revisiting Automotive Attack Surfaces: a Practitioners' Perspective

    Jing, P., Cai, Z., Yu, L., Du, Y., Zhang, W., Qian, C., Luo, X., Nie, S. & Wu, S., May 2024, 2024 IEEE Symposium on Security and Privacy. p. 83-83

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading

    Chen, S., Chen, J., Yu, J., Luo, X. & Wang, Y., 24 Jul 2024, 15th Asia-Pacific Symposium on Internetware, Internetware 2024 - Proceedings. Association for Computing Machinery, p. 447-456 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Towards Automatic Discovery of Denial-of-Service Weaknesses in Blockchain Resource Models

    Luo, F., Lin, H., Li, Z., Luo, X., Luo, R., He, Z., Song, S., Chen, T. & Luo, W., Oct 2024, Proceedings of the 31st ACM Conference on Computer and Communications Security (CCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Towards Smart Contract Fuzzing on GPUs

    Chen, W., Luo, X., Cai, H. & Wang, H., May 2024, 2024 IEEE Symposium on Security and Privacy. p. 195-195

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Trace-agnostic and Adversarial Training-resilient Website Fingerprinting Defense

    Qiao, L., Wu, B., Li, H., Gao, C., YUAN, W. & Luo, X., May 2024, IEEE International Conference on Computer Communications. p. 1-18

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Transfer of Learning from Metaverse to Blockchain for Secondary Students: Implementation and Effectiveness Evaluation

    Leung, A. C. Y., Li, Z. Z., Liu, Y. W. D., Lui, W. C., Luo, X. & Im, S. W. T., Jan 2024, Proceedings of the 26th Australasian Computing Education Conference. ACM Press, p. 154–163

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces

    Luo, X., Liao, S., Aldeen, M., Yan, J., Cheng, L., Luo, X., Cai, H. & Hu, H., May 2024, Proceedings of the ACM on Web Conference 2024. p. 1081–1091

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Unveiling the Paradox of NFT Prosperity

    Huang, J., Xia, P., Li, J., Ma, K., Tyson, G., Luo, X., Wu, L., Zhou, Y., Cai, W. & Wang, H., May 2024, Proceedings of the ACM on Web Conference 2024. p. 167–177

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses

    Nong, Y., Fang, R., Yi, G., Zhao, K., Luo, X., Chen, F. & Cai, H., Apr 2024, Proceedings - 2024 ACM/IEEE 44th International Conference on Software Engineering, ICSE 2024. p. 1837-1849 13 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
    3 Citations (Scopus)
  • 2023

    1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing

    Yang, S., He, Y., Chen, K., Ma, Z., Luo, X., Xie, Y., Chen, J. & Zhang, C., Jul 2023, Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. p. 867–879

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    7 Citations (Scopus)
  • Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features

    Zhang, Y., Hu, Y., Li, H., Shi, W., Ning, Z., Luo, X. & Zhang, F., Jul 2023, Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. p. 917–928

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    2 Citations (Scopus)
  • An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting

    Qu, J., Ma, X., Li, J., Luo, X., Xue, L., Zhang, J., Li, Z., Li, F. & Guan, X., Aug 2023, 32nd USENIX Security Symposium 2023.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools

    Dong, F., Liu, S., Jiang, P., Li, D., Wang, H., Huang, L., Xiao, X., Chen, J., Luo, X., Guo, Y. & Chen, X., Nov 2023, Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. p. 2396–2410

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    10 Citations (Scopus)
  • Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation

    Zhang, C., Li, Y., Zhou, H., Zhang, X., Zheng, Y., Zhan, X., Xie, X., Luo, X., Li, X., Liu, Y. & Mahbub Habib, S., Aug 2023, 32nd USENIX Security Symposium 2023. p. 2867-2884

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    2 Citations (Scopus)
  • BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs

    Wu, T., Xiao, X., Li, Q., Liu, Q., Hu, G., Luo, X. & Jiang, Y., Oct 2023, 2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). p. 1-9

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information

    Li, H., Cheng, Z., Wu, B., Yuan, L., Gao, C., YUAN, W. & Luo, X., Aug 2023, 32nd USENIX Security Symposium 2023. p. 1-18

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts

    Zheng, P., Luo, X. & Zheng, Z., 17 May 2023, Proceedings of the 45th International Conference on Software Engineering (ICSE). p. 1-12

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
  • CydiOS: A Model-Based Testing Framework for iOS Apps

    Wu, S., Li, J., Zhou, H., Fang, Y., Zhao, K., Wang, H., Qian, C. & Luo, X., Jul 2023, Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. p. 1-13

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    2 Citations (Scopus)
  • DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing

    Yuan, M., Zhao, B., Li, P., Liang, J., Han, X., Luo, X. & Zhang, C., Aug 2023, 32nd USENIX Security Symposium, USENIX Security 2023. p. 2849-2866

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    9 Citations (Scopus)
  • DeepInfer: Deep Type Inference from Smart Contract Bytecode

    Zhao, K., Li, Z., Li, J., Ye, H., Luo, X. & Chen, T., Nov 2023, Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. p. 745–757

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    11 Citations (Scopus)
  • Demystifying DeFi MEV Activities in Flashbots Bundle

    Li, Z., Li, J., He, Z., Luo, X., Wang, T., Ni, X., Yang, W., Chen, X. & Chen, T., Nov 2023, Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 165–179

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    12 Citations (Scopus)
  • Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps

    Zhao, K., Zhan, X., Yu, L., Zhou, S., Zhou, H., Luo, X., Wang, H. & Liu, Y., May 2023, Proceedings of the 45th International Conference on Software Engineering (ICSE). p. 1-13

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
  • DISTDET: A Cost-Effective Distributed Cyber Threat Detection System

    Dong, F., Wang, L., Nie, X., Shao, F., Wang, H., Li, D., Luo, X. & Xiao, X., Aug 2023, 32nd USENIX Security Symposium 2023. p. 6575-6592

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    27 Citations (Scopus)
  • Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing

    Su, J., Dai, H.-N., Zhao, L., Zheng, Z. & Luo, X., 5 Jan 2023, Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE). Association for Computing Machinery (ACM), p. 1-12 2006 p. 36

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning

    Ni, T., Li, J., Zhang, X., Zuo, C., Wang, W., Xu, W., Luo, X. & Zhao, Q., Oct 2023, Proceedings of the 29th Annual International Conference on Mobile Computing and Networking. p. 1–15

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    12 Citations (Scopus)
  • Know Your Transactions: Real-time and Generic Transaction Semantic Representation on Blockchain & Web3 Ecosystem

    Wu, Z., Liu, J., Wu, J., Zheng, Z., Luo, X. & Chen, T., 30 Apr 2023, Proceedings of the 32nd World Wide Web Conference (WWW). Association for Computing Machinery (ACM), p. 1918-1927 4293 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    15 Citations (Scopus)