Select Publications
By Dr Siqi Ma
Conference Papers
2023, 'PASS2EDIT: A Multi-Step Generative Model for Guessing Edited Passwords', in SEC '23: Proceedings of the 32nd USENIX Conference on Security Symposium, USENIX Association, Anaheim, CA, pp. 983 - 1000, presented at 32nd USENIX Security Symposium, Anaheim, CA, 09 August 2023 - 11 August 2023, https://dl.acm.org/doi/10.5555/3620237.3620293
,2023, 'LibScan: Towards More Precise Third-Party Library Identification for Android Applications', in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, pp. 3385 - 3402, presented at SEC '23: Proceedings of the 32nd USENIX Conference on Security Symposium, Anaheim, CA, USA, 09 August 2023, https://dl.acm.org/doi/10.5555/3620237.3620427
,2023, 'Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning', in 32nd USENIX Security Symposium, USENIX Security 2023, ANAHEIM, CA, USA, pp. 4607 - 4624, presented at 32nd USENIX Security Symposium, USENIX Security 2023, ANAHEIM, CA, USA, 09 August 2023, https://dl.acm.org/doi/10.5555/3620237.3620495
,2023, 'RaceBench: A Triggerable and Observable Concurrency Bug Benchmark', in Proceedings of the ACM Conference on Computer and Communications Security, pp. 415 - 428, http://dx.doi.org/10.1145/3579856.3595787
,2023, 'Private Image Generation with Dual-Purpose Auxiliary Classifier', in 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, pp. 20361 - 20370, presented at 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 17 June 2023 - 24 June 2023, http://dx.doi.org/10.1109/cvpr52729.2023.01950
,2022, 'PrIntFuzz: Fuzzing Linux drivers via automated virtual device simulation', in ISSTA 2022 - Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 404 - 416, http://dx.doi.org/10.1145/3533767.3534226
,2022, 'Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK', in Proceedings - IEEE Symposium on Security and Privacy, pp. 650 - 665, http://dx.doi.org/10.1109/SP46214.2022.9833650
,2022, 'Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search', in Proceedings - International Conference on Software Engineering, pp. 462 - 473, http://dx.doi.org/10.1145/3510003.3510084
,2022, 'DeepFake Disrupter: The Detector of DeepFake Is My Friend', in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 14900 - 14909, http://dx.doi.org/10.1109/CVPR52688.2022.01450
,2022, 'Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2096 - 2113, http://dx.doi.org/10.1109/SP46214.2022.9833613
,2022, 'KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications', in Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, pp. 488 - 500, http://dx.doi.org/10.1109/DSN53405.2022.00055
,2021, 'ReCFA: Resilient Control-Flow Attestation', in ACM International Conference Proceeding Series, pp. 311 - 322, http://dx.doi.org/10.1145/3485832.3485900
,2021, 'PLP 2021: Workshop on Programming Language Processing', in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 4171 - 4172, http://dx.doi.org/10.1145/3447548.3469460
,2021, 'Fine with '1234'? An analysis of SMS one-time password randomness in android apps', in Proceedings - International Conference on Software Engineering, pp. 1671 - 1682, http://dx.doi.org/10.1109/ICSE43902.2021.00148
,2021, 'Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking', in IEEE International Conference on Software Quality, Reliability and Security, QRS, pp. 702 - 713, http://dx.doi.org/10.1109/QRS54544.2021.00080
,2021, 'SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 129 - 148, http://dx.doi.org/10.1007/978-3-030-88323-2_7
,2020, 'Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services', in ACM International Conference Proceeding Series, pp. 320 - 331, http://dx.doi.org/10.1145/3427228.3427263
,2020, 'Boosting privately: Federated extreme gradient boosting for mobile crowdsensing', in Proceedings - International Conference on Distributed Computing Systems, pp. 1 - 11, http://dx.doi.org/10.1109/ICDCS47774.2020.00017
,2020, 'PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication', in 2020 IEEE/ACM 28th International Symposium on Quality of Service, IWQoS 2020, http://dx.doi.org/10.1109/IWQoS49365.2020.9212822
,2020, 'EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts', in SANER 2020 - Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering, pp. 116 - 126, http://dx.doi.org/10.1109/SANER48275.2020.9054822
,2020, 'SMARTSHIELD: Automatic Smart Contract Protection Made Easy', in SANER 2020 - Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering, pp. 23 - 34, http://dx.doi.org/10.1109/SANER48275.2020.9054825
,2019, 'An empirical study of SMS one-time password authentication in android apps', in ACM International Conference Proceeding Series, pp. 339 - 354, http://dx.doi.org/10.1145/3359789.3359828
,2019, 'Finding Flaws from Password Authentication Code in Android Apps', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Luxembourg, pp. 619 - 637, presented at European Symposium on Research in Computer Security, ESORICS 2019, Luxembourg, 23 September 2019, http://dx.doi.org/10.1007/978-3-030-29959-0_30
,2019, 'AClog: Attack chain construction based on log correlation', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOBECOM38437.2019.9013518
,2019, 'NLP-EYE: Detecting memory corruptions via semantic-aware memory operation function identification', in RAID 2019 Proceedings - 22nd International Symposium on Research in Attacks, Intrusions and Defenses, pp. 309 - 321
,2016, 'CDRep: Automatic repair of cryptographic misuses in android applications', in ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, pp. 711 - 722, http://dx.doi.org/10.1145/2897845.2897896
,2015, 'Active Semi-supervised Approach for Checking App Behavior against Its Description', in Proceedings - International Computer Software and Applications Conference, pp. 179 - 184, http://dx.doi.org/10.1109/COMPSAC.2015.93
,2014, 'Key-Policy Weighted Attribute based Encryption for fine-grained access control', in 2014 IEEE International Conference on Communications Workshops, ICC 2014, pp. 694 - 699, http://dx.doi.org/10.1109/ICCW.2014.6881280
,