ORCID as entered in ROS

Select Publications
2022, 'Demystifying the underground ecosystem of account registration bots', in ESEC/FSE 2022 - Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 897 - 909, http://dx.doi.org/10.1145/3540250.3549090
,2022, 'You see what I want you to see: poisoning vulnerabilities in neural code search', in ESEC/FSE 2022 - Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1233 - 1245, http://dx.doi.org/10.1145/3540250.3549153
,2022, 'MalWhiteout: Reducing Label Errors in Android Malware Detection', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3551349.3560418
,2022, 'Path-sensitive code embedding via contrastive learning for software vulnerability detection', in ISSTA 2022 - Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 519 - 531, http://dx.doi.org/10.1145/3533767.3534371
,2022, 'Path-Sensitive and Alias-Aware Typestate Analysis for Detecting OS Bugs', in International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS, pp. 859 - 872, http://dx.doi.org/10.1145/3503222.3507770
,2022, 'Cross-Language Binary-Source Code Matching with Intermediate Representations', in Proceedings - 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2022, pp. 601 - 612, http://dx.doi.org/10.1109/SANER53432.2022.00077
,2022, 'Enhancing Traceability Link Recovery with Unlabeled Data', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 446 - 457, http://dx.doi.org/10.1109/ISSRE55969.2022.00050
,2022, 'Field-Based Static Taint Analysis for Industrial Microservices', in Proceedings - International Conference on Software Engineering, pp. 149 - 150, http://dx.doi.org/10.1109/ICSE-SEIP55303.2022.9794096
,2022, 'NaturalCC: An Open-Source Toolkit for Code Intelligence', in Proceedings - International Conference on Software Engineering, pp. 149 - 153, http://dx.doi.org/10.1109/ICSE-Companion55297.2022.9793799
,2022, 'What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code', in Proceedings - International Conference on Software Engineering, pp. 2377 - 2388, http://dx.doi.org/10.1145/3510003.3510050
,2021, 'An exploratory study of autopilot software bugs in unmanned aerial vehicles', in ESEC/FSE 2021 - Proceedings of the 29th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 20 - 31, http://dx.doi.org/10.1145/3468264.3468559
,2021, 'Runtime detection of memory errors with smart status', in ISSTA 2021 - Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, ACM, pp. 296 - 308, presented at ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, http://dx.doi.org/10.1145/3460319.3464807
,2021, 'Object Versioning for Flow-Sensitive Pointer Analysis', in CGO 2021 - Proceedings of the 2021 IEEE/ACM International Symposium on Code Generation and Optimization, pp. 222 - 235, http://dx.doi.org/10.1109/CGO51591.2021.9370334
,2021, 'Disentangled Code Representation Learning for Multiple Programming Languages', in Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021, pp. 4454 - 4466
,2021, 'Fix-Filter-Fix: Intuitively Connect Any Models for Effective Bug Fixing', in EMNLP 2021 - 2021 Conference on Empirical Methods in Natural Language Processing, Proceedings, pp. 3495 - 3504
,2021, 'Hash Consed Points-To Sets', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 25 - 48, http://dx.doi.org/10.1007/978-3-030-88806-0_2
,2021, 'Nondeterministic Impact of CPU Multithreading on Training Deep Learning Systems', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 557 - 568, http://dx.doi.org/10.1109/ISSRE52982.2021.00063
,2020, 'An empirical study of code deobfuscations on detecting obfuscated android piggybacked apps', in Proceedings - Asia-Pacific Software Engineering Conference, APSEC, pp. 41 - 50, http://dx.doi.org/10.1109/APSEC51365.2020.00012
,2020, 'All your app links are belong to us: Understanding the threats of instant apps based attacks', in ESEC/FSE 2020 - Proceedings of the 28th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 914 - 926, http://dx.doi.org/10.1145/3368089.3409702
,2020, 'PCA: Memory leak detection using partial call-path analysis', in ESEC/FSE 2020 - Proceedings of the 28th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1621 - 1625, http://dx.doi.org/10.1145/3368089.3417923
,2020, 'Flow-sensitive type-based heap cloning', in Leibniz International Proceedings in Informatics, LIPIcs, http://dx.doi.org/10.4230/LIPIcs.ECOOP.2020.24
,2020, 'Perf-AL: Performance prediction for configurable software through adversarial learning', in International Symposium on Empirical Software Engineering and Measurement, http://dx.doi.org/10.1145/3382494.3410677
,2020, 'An exploratory study of bugs in extended reality applications on the web', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 172 - 183, http://dx.doi.org/10.1109/ISSRE5003.2020.00025
,2020, 'Clairvoyance: Cross-contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts', in Proceedings - 2020 ACM/IEEE 42nd International Conference on Software Engineering: Companion, ICSE-Companion 2020, pp. 274 - 275, http://dx.doi.org/10.1145/3377812.3390908
,2020, 'Fault triggers in the tensorflow framework: An experience report', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 1 - 12, http://dx.doi.org/10.1109/ISSRE5003.2020.00010
,2020, 'HINDBR: Heterogeneous information network based duplicate bug report prediction', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 195 - 206, http://dx.doi.org/10.1109/ISSRE5003.2020.00027
,2020, 'Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts', in Proceedings - 2020 35th IEEE/ACM International Conference on Automated Software Engineering, ASE 2020, pp. 1029 - 1040, http://dx.doi.org/10.1145/3324884.3416553
,2020, 'A literature review of automatic traceability links recovery for software change impact analysis', in IEEE International Conference on Program Comprehension, pp. 14 - 24, http://dx.doi.org/10.1145/3387904.3389251
,2020, 'Typestate-guided fuzzer for discovering use-after-free vulnerabilities', in Proceedings - International Conference on Software Engineering, pp. 999 - 1010, http://dx.doi.org/10.1145/3377811.3380386
,2020, 'MUZZ: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs', in Proceedings of the 29th USENIX Security Symposium, pp. 2325 - 2342
,2019, 'Multi-modal attention network learning for semantic source code retrieval', in Proceedings - 2019 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019, pp. 13 - 25, http://dx.doi.org/10.1109/ASE.2019.00012
,2019, 'Static detection of control-flow-related vulnerabilities using graph embedding', in Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS, pp. 41 - 50, http://dx.doi.org/10.1109/ICECCS.2019.00012
,2019, 'Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Porto, Portugal, pp. 48 - 72, presented at 26th international symposium, SAS 2019, Porto, Portugal, October 8-11, 2019, Porto, Portugal, 08 October 2019 - 11 October 2019, http://dx.doi.org/10.1007/978-3-030-32304-2_4
,2019, 'TCD: Statically Detecting Type Confusion Errors in C++ Programs', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 292 - 302, http://dx.doi.org/10.1109/ISSRE.2019.00037
,2019, 'Interactive Traceability Links Visualization using Hierarchical Trace Map', in Proceedings - 2019 IEEE International Conference on Software Maintenance and Evolution, ICSME 2019, pp. 367 - 369, http://dx.doi.org/10.1109/ICSME.2019.00059
,2019, 'Event trace reduction for effective bug replay of Android apps via differential GUI state analysis', in ESEC/FSE 2019 - Proceedings of the 2019 27th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1095 - 1099, http://dx.doi.org/10.1145/3338906.3341183
,2019, 'VFix: Value-Flow-Guided Precise Program Repair for Null Pointer Dereferences', in Proceedings - International Conference on Software Engineering, pp. 512 - 523, http://dx.doi.org/10.1109/ICSE.2019.00063
,2019, 'Precise static happens-before analysis for detecting UAF order violations in android', in Proceedings - 2019 IEEE 12th International Conference on Software Testing, Verification and Validation, ICST 2019, pp. 276 - 287, http://dx.doi.org/10.1109/ICST.2019.00035
,2019, 'Fast and Precise Handling of Positive Weight Cycles for Field-Sensitive Pointer Analysis', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 27 - 47, http://dx.doi.org/10.1007/978-3-030-32304-2_3
,2018, 'Permission Analysis of Health and Fitness Apps in IoT Programming Frameworks', in Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, pp. 533 - 538, http://dx.doi.org/10.1109/TrustCom/BigDataSE.2018.00081
,2018, 'CoBOT: Static C/C++ bug detection in the presence of incomplete code', in Proceedings - International Conference on Software Engineering, pp. 385 - 388, http://dx.doi.org/10.1145/3196321.3196367
,2018, 'POSTER: Live path control flow integrity', in Proceedings - International Conference on Software Engineering, pp. 195 - 196, http://dx.doi.org/10.1145/3183440.3195093
,2018, 'Launch-Mode-Aware Context-Sensitive Activity Transition Analysis', in Proceedings - International Conference on Software Engineering, IEEE, Gothenburg, SWEDEN, pp. 598 - 608, presented at 40th ACM/IEEE International Conference on Software Engineering (ICSE), Gothenburg, SWEDEN, 27 May 2018 - 03 June 2018, http://dx.doi.org/10.1145/3180155.3180188
,2018, 'Spatio-Temporal Context Reduction: A Pointer-Analysis-Based Static Approach for Detecting Use-After-Free Vulnerabilities', in Proceedings - International Conference on Software Engineering, IEEE, Gothenburg, SWEDEN, pp. 327 - 337, presented at 40th ACM/IEEE International Conference on Software Engineering (ICSE), Gothenburg, SWEDEN, 27 May 2018 - 03 June 2018, http://dx.doi.org/10.1145/3180155.3180178
,2018, 'Live path CFI against control flow hijacking attacks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 768 - 779, http://dx.doi.org/10.1007/978-3-319-93638-3_45
,2017, 'Machine-learning-guided typestate analysis for static use-After-free detection', in ACM International Conference Proceeding Series, Orlando, FL, USA, pp. 42 - 54, presented at 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, 04 December 2017 - 08 December 2017, http://dx.doi.org/10.1145/3134600.3134620
,2017, 'Incremental analysis for probabilistic programs', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), New York, NY, USA, pp. 450 - 472, presented at 24th International Symposium, SAS 2017, New York, NY, USA, 30 August 2017 - 01 September 2017, http://dx.doi.org/10.1007/978-3-319-66706-5_22
,2017, 'Boosting the precision of virtual call integrity protection with partial pointer analysis for C++', in ISSTA 2017 - Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, pp. 329 - 340, presented at ISSTA 2017 Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, 10 July 2017 - 14 July 2017, http://dx.doi.org/10.1145/3092703.3092729
,2016, 'On-demand Strong Update Analysis via value-flow Refinement', in International symposium on the foundations of software engineering, IEEE, Seattle, pp. 460 - 473, presented at FSE'16, Seattle, 13 November 2016 - 18 November 2016, http://dx.doi.org/10.1145/2950290.2950296
,2016, 'Loop-Oriented array- and field-sensitive pointer analysis for automatic SIMD vectorization', in Proceedings of the ACM SIGPLAN Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES), Santa Barbara, CA, USA, pp. 41 - 51, presented at 17th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, Tools, and Theory for Embedded Systems, Santa Barbara, CA, USA, 13 June 2016 - 14 June 2016, http://dx.doi.org/10.1145/2907950.2907957
,