Select Publications

Conference Papers

Wang D; Zou Y; Ma S; Xiao YA; Chen X, 2023, 'PASS2EDIT: A Multi-Step Generative Model for Guessing Edited Passwords', in SEC '23: Proceedings of the 32nd USENIX Conference on Security Symposium, USENIX Association, Anaheim, CA, pp. 983 - 1000, presented at 32nd USENIX Security Symposium, Anaheim, CA, 09 August 2023 - 11 August 2023, https://dl.acm.org/doi/10.5555/3620237.3620293

Wu Y; Sun C; Zeng D; Tan G; Ma S; Wang P, 2023, 'LibScan: Towards More Precise Third-Party Library Identification for Android Applications', in 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, pp. 3385 - 3402, presented at SEC '23: Proceedings of the 32nd USENIX Conference on Security Symposium, Anaheim, CA, USA, 09 August 2023, https://dl.acm.org/doi/10.5555/3620237.3620427

Han X; Zhang Y; Zhang X; Chen Z; Wang M; Zhang Y; Ma S; Yu Y; Bertino E; Li J, 2023, 'Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning', in 32nd USENIX Security Symposium, USENIX Security 2023, ANAHEIM, CA, USA, pp. 4607 - 4624, presented at 32nd USENIX Security Symposium, USENIX Security 2023, ANAHEIM, CA, USA, 09 August 2023, https://dl.acm.org/doi/10.5555/3620237.3620495

Liang J; Yuan M; Ding Z; Ma S; Han X; Zhang C, 2023, 'RaceBench: A Triggerable and Observable Concurrency Bug Benchmark', in Proceedings of the ACM Conference on Computer and Communications Security, pp. 415 - 428, http://dx.doi.org/10.1145/3579856.3595787

Chen C; Liu D; Ma S; Nepal S; Xu C, 2023, 'Private Image Generation with Dual-Purpose Auxiliary Classifier', in 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, pp. 20361 - 20370, presented at 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 17 June 2023 - 24 June 2023, http://dx.doi.org/10.1109/cvpr52729.2023.01950

Ma Z; Zhao B; Ren L; Li Z; Ma S; Luo X; Zhang C, 2022, 'PrIntFuzz: Fuzzing Linux drivers via automated virtual device simulation', in ISSTA 2022 - Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 404 - 416, http://dx.doi.org/10.1145/3533767.3534226

Jin X; Xiao X; Jia S; Gao W; Gu D; Zhang H; Ma S; Qian Z; Li J, 2022, 'Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK', in Proceedings - IEEE Symposium on Security and Privacy, pp. 650 - 665, http://dx.doi.org/10.1109/SP46214.2022.9833650

Han R; Yang C; Ma S; Ma JF; Sun C; Li J; Bertino E, 2022, 'Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search', in Proceedings - International Conference on Software Engineering, pp. 462 - 473, http://dx.doi.org/10.1145/3510003.3510084

Wang X; Huang J; Ma S; Nepal S; Xu C, 2022, 'DeepFake Disrupter: The Detector of DeepFake Is My Friend', in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 14900 - 14909, http://dx.doi.org/10.1109/CVPR52688.2022.01450

Lyu Y; Fang Y; Zhang Y; Sun Q; Ma S; Bertino E; Lu K; Li J, 2022, 'Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2096 - 2113, http://dx.doi.org/10.1109/SP46214.2022.9833613

Zhang Y; Ma S; Li J; Gu D; Bertino E, 2022, 'KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications', in Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, pp. 488 - 500, http://dx.doi.org/10.1109/DSN53405.2022.00055

Zhang Y; Liu X; Sun C; Zeng D; Tan G; Kan X; Ma S, 2021, 'ReCFA: Resilient Control-Flow Attestation', in ACM International Conference Proceeding Series, pp. 311 - 322, http://dx.doi.org/10.1145/3485832.3485900

Xu C; Ma S; Lo D, 2021, 'PLP 2021: Workshop on Programming Language Processing', in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 4171 - 4172, http://dx.doi.org/10.1145/3447548.3469460

Ma S; Li J; Kim H; Bertino E; Nepal S; Ostry D; Sun C, 2021, 'Fine with '1234'? An analysis of SMS one-time password randomness in android apps', in Proceedings - International Conference on Software Engineering, pp. 1671 - 1682, http://dx.doi.org/10.1109/ICSE43902.2021.00148

Kan X; Sun C; Liu S; Huang Y; Tan G; Ma S; Zhang Y, 2021, 'Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking', in IEEE International Conference on Software Quality, Reliability and Security, QRS, pp. 702 - 713, http://dx.doi.org/10.1109/QRS54544.2021.00080

Lyu Y; Gao W; Ma S; Sun Q; Li J, 2021, 'SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 129 - 148, http://dx.doi.org/10.1007/978-3-030-88323-2_7

Ma S; Li H; Yang W; Li J; Nepal S; Bertino E, 2020, 'Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services', in ACM International Conference Proceeding Series, pp. 320 - 331, http://dx.doi.org/10.1145/3427228.3427263

Liu Y; Ma Z; Liu X; Ma S; Nepal S; Deng RH; Ren K, 2020, 'Boosting privately: Federated extreme gradient boosting for mobile crowdsensing', in Proceedings - International Conference on Distributed Computing Systems, pp. 1 - 11, http://dx.doi.org/10.1109/ICDCS47774.2020.00017

Liu Y; Yang Y; Ma Z; Liu X; Wang Z; Ma S, 2020, 'PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication', in 2020 IEEE/ACM 28th International Symposium on Quality of Service, IWQoS 2020, http://dx.doi.org/10.1109/IWQoS49365.2020.9212822

Zhang Q; Wang Y; Li J; Ma S, 2020, 'EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts', in SANER 2020 - Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering, pp. 116 - 126, http://dx.doi.org/10.1109/SANER48275.2020.9054822

Zhang Y; Ma S; Li J; Li K; Nepal S; Gu D, 2020, 'SMARTSHIELD: Automatic Smart Contract Protection Made Easy', in SANER 2020 - Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering, pp. 23 - 34, http://dx.doi.org/10.1109/SANER48275.2020.9054825

Ma S; Feng R; Li J; Liu Y; Nepal S; Ostry D; Bertino E; Deng RH; Ma Z; Jha S, 2019, 'An empirical study of SMS one-time password authentication in android apps', in ACM International Conference Proceeding Series, pp. 339 - 354, http://dx.doi.org/10.1145/3359789.3359828

Ma S; Bertino E; Nepal S; Li J; Ostry D; Deng RH; Jha S, 2019, 'Finding Flaws from Password Authentication Code in Android Apps', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Luxembourg, pp. 619 - 637, presented at European Symposium on Research in Computer Security, ESORICS 2019, Luxembourg, 23 September 2019, http://dx.doi.org/10.1007/978-3-030-29959-0_30

Li T; Ma J; Pei Q; Shen Y; Lin C; Ma S; Obaidat MS, 2019, 'AClog: Attack chain construction based on log correlation', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOBECOM38437.2019.9013518

Wang J; Ma S; Zhang Y; Li J; Ma Z; Mai L; Chen T; Gu D, 2019, 'NLP-EYE: Detecting memory corruptions via semantic-aware memory operation function identification', in RAID 2019 Proceedings - 22nd International Symposium on Research in Attacks, Intrusions and Defenses, pp. 309 - 321

Ma S; Lo D; Li T; Deng RH, 2016, 'CDRep: Automatic repair of cryptographic misuses in android applications', in ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, pp. 711 - 722, http://dx.doi.org/10.1145/2897845.2897896

Ma S; Wang S; Lo D; Deng RH; Sun C, 2015, 'Active Semi-supervised Approach for Checking App Behavior against Its Description', in Proceedings - International Computer Software and Applications Conference, pp. 179 - 184, http://dx.doi.org/10.1109/COMPSAC.2015.93

Liu X; Zhu H; Ma J; Ma J; Ma S, 2014, 'Key-Policy Weighted Attribute based Encryption for fine-grained access control', in 2014 IEEE International Conference on Communications Workshops, ICC 2014, pp. 694 - 699, http://dx.doi.org/10.1109/ICCW.2014.6881280


Back to profile page