Select Publications

Conference Papers

Zhang Y; Liu X; Sun C; Zeng D; Tan G; Kan X; Ma S, 2021, 'ReCFA: Resilient Control-Flow Attestation', in ACM International Conference Proceeding Series, pp. 311 - 322, http://dx.doi.org/10.1145/3485832.3485900

Xu C; Ma S; Lo D, 2021, 'PLP 2021: Workshop on Programming Language Processing', in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 4171 - 4172, http://dx.doi.org/10.1145/3447548.3469460

Ma S; Li J; Kim H; Bertino E; Nepal S; Ostry D; Sun C, 2021, 'Fine with '1234'? An analysis of SMS one-time password randomness in android apps', in Proceedings - International Conference on Software Engineering, pp. 1671 - 1682, http://dx.doi.org/10.1109/ICSE43902.2021.00148

Kan X; Sun C; Liu S; Huang Y; Tan G; Ma S; Zhang Y, 2021, 'Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking', in IEEE International Conference on Software Quality, Reliability and Security, QRS, pp. 702 - 713, http://dx.doi.org/10.1109/QRS54544.2021.00080

Lyu Y; Gao W; Ma S; Sun Q; Li J, 2021, 'SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 129 - 148, http://dx.doi.org/10.1007/978-3-030-88323-2_7

Ma S; Li H; Yang W; Li J; Nepal S; Bertino E, 2020, 'Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services', in ACM International Conference Proceeding Series, pp. 320 - 331, http://dx.doi.org/10.1145/3427228.3427263

Liu Y; Ma Z; Liu X; Ma S; Nepal S; Deng RH; Ren K, 2020, 'Boosting privately: Federated extreme gradient boosting for mobile crowdsensing', in Proceedings - International Conference on Distributed Computing Systems, pp. 1 - 11, http://dx.doi.org/10.1109/ICDCS47774.2020.00017

Liu Y; Yang Y; Ma Z; Liu X; Wang Z; Ma S, 2020, 'PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication', in 2020 IEEE/ACM 28th International Symposium on Quality of Service, IWQoS 2020, http://dx.doi.org/10.1109/IWQoS49365.2020.9212822

Zhang Q; Wang Y; Li J; Ma S, 2020, 'EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts', in SANER 2020 - Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering, pp. 116 - 126, http://dx.doi.org/10.1109/SANER48275.2020.9054822

Zhang Y; Ma S; Li J; Li K; Nepal S; Gu D, 2020, 'SMARTSHIELD: Automatic Smart Contract Protection Made Easy', in SANER 2020 - Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering, pp. 23 - 34, http://dx.doi.org/10.1109/SANER48275.2020.9054825

Ma S; Feng R; Li J; Liu Y; Nepal S; Ostry D; Bertino E; Deng RH; Ma Z; Jha S, 2019, 'An empirical study of SMS one-time password authentication in android apps', in ACM International Conference Proceeding Series, pp. 339 - 354, http://dx.doi.org/10.1145/3359789.3359828

Ma S; Bertino E; Nepal S; Li J; Ostry D; Deng RH; Jha S, 2019, 'Finding Flaws from Password Authentication Code in Android Apps', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Luxembourg, pp. 619 - 637, presented at European Symposium on Research in Computer Security, ESORICS 2019, Luxembourg, 23 September 2019, http://dx.doi.org/10.1007/978-3-030-29959-0_30

Li T; Ma J; Pei Q; Shen Y; Lin C; Ma S; Obaidat MS, 2019, 'AClog: Attack chain construction based on log correlation', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOBECOM38437.2019.9013518

Wang J; Ma S; Zhang Y; Li J; Ma Z; Mai L; Chen T; Gu D, 2019, 'NLP-EYE: Detecting memory corruptions via semantic-aware memory operation function identification', in RAID 2019 Proceedings - 22nd International Symposium on Research in Attacks, Intrusions and Defenses, pp. 309 - 321

Ma S; Lo D; Li T; Deng RH, 2016, 'CDRep: Automatic repair of cryptographic misuses in android applications', in ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, pp. 711 - 722, http://dx.doi.org/10.1145/2897845.2897896

Ma S; Wang S; Lo D; Deng RH; Sun C, 2015, 'Active Semi-supervised Approach for Checking App Behavior against Its Description', in Proceedings - International Computer Software and Applications Conference, pp. 179 - 184, http://dx.doi.org/10.1109/COMPSAC.2015.93

Liu X; Zhu H; Ma J; Ma J; Ma S, 2014, 'Key-Policy Weighted Attribute based Encryption for fine-grained access control', in 2014 IEEE International Conference on Communications Workshops, ICC 2014, pp. 694 - 699, http://dx.doi.org/10.1109/ICCW.2014.6881280

Preprints

Gong H; Dong M; Ma S; Camtepe S; Nepal S; Xu C, 2023, Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks, , http://dx.doi.org/10.48550/arxiv.2309.16207

Gong H; Dong M; Ma S; Camtepe S; Nepal S; Xu C, 2023, Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization, , http://dx.doi.org/10.48550/arxiv.2309.09480

Ma S; Li J; Kim H; Bertino E; Nepal S; Ostry D; Sun C, 2021, Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps, , http://dx.doi.org/10.48550/arxiv.2103.05758

Gao Y; Doan BG; Zhang Z; Ma S; Zhang J; Fu A; Nepal S; Kim H, 2020, Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review, , http://dx.doi.org/10.48550/arxiv.2007.10760


Back to profile page