What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Heng Yin
Google Scholar
ORCID:
0000-0002-8942-7742
51
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic Execution.
Zhenxiao Qi
Jie Hu
Zhaoqi Xiao
Heng Yin
2024
conf/ndss
SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing.
Lian Gao
Yu Qu
Sheng Yu
Yue Duan
Heng Yin
2024
conf/dsn
On the Correctness of Metadata-Based SBOM Generation: A Differential Analysis Approach.
Sheng Yu
Wei Song
Xunchao Hu
Heng Yin
2022
conf/uss
SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis.
Ju Chen
Wookhyun Han
Mingjun Yin
Haochen Zeng
Chengyu Song
Byoungyoung Lee
Heng Yin
Insik Shin
2022
conf/uss
DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly.
Sheng Yu
Yu Qu
Xunchao Hu
Heng Yin
2022
conf/sp
JIGSAW: Efficient and Scalable Path Constraints Fuzzing.
Ju Chen
Jinghan Wang
Chengyu Song
Heng Yin
2022
conf/asiaccs
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware.
Wei Song
Xuezixiang Li
Sadia Afroz
Deepali Garg
Dmitry Kuznetsov
Heng Yin
2022
conf/ndss
LogicMEM: Automatic Profile Generation for Binary-Only Memory Forensics via Logic Inference.
Zhenxiao Qi
Yu Qu
Heng Yin
2022
conf/acsac
Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing.
Yiru Zhao
Xiaoke Wang
Lei Zhao
Yueqiang Cheng
Heng Yin
2021
conf/ccs
PalmTree: Learning an Assembly Language Model for Instruction Embedding.
Xuezixiang Li
Yu Qu
Heng Yin
2021
conf/uss
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.
Yousra Aafer
Wei You
Yi Sun
Yu Shi
Xiangyu Zhang
Heng Yin
2021
conf/ndss
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets.
Zhenxiao Qi
Qian Feng
Yueqiang Cheng
Mengjia Yan
Peng Li
Heng Yin
Tao Wei
2021
conf/ndss
Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing.
Jinghan Wang
Chengyu Song
Heng Yin
2020
conf/ccs
PatchScope: Memory Object Centric Patch Diffing.
Lei Zhao
Yuncong Zhu
Jiang Ming
Yichen Zhang
Haotian Zhang
Heng Yin
2020
conf/ndss
DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing.
Yue Duan
Xuezixiang Li
Jinghan Wang
Heng Yin
2020
conf/dsn
Chaser: An Enhanced Fault Injection Tool for Tracing Soft Errors in MPI Applications.
Qiang Guan
Xunchao Hu
Terence Grove
Bo Fang
Hailong Jiang
Heng Yin
Nathan DeBardeleben
2019
conf/uss
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation.
Yaowen Zheng
Ali Davanian
Heng Yin
Chengyu Song
Hongsong Zhu
Limin Sun
2019
conf/ndss
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing.
Lei Zhao
Yue Duan
Heng Yin
Jifeng Xuan
2018
conf/ccs
DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis.
Wei Song
Heng Yin
Chang Liu
Dawn Song
2018
conf/ndss
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis.
Shitong Zhu
Xunchao Hu
Zhiyun Qian
Zubair Shafiq
Heng Yin
2018
conf/ndss
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Yue Duan
Mu Zhang
Abhishek Vasisht Bhaskar
Heng Yin
Xiaorui Pan
Tongxin Li
Xueqiang Wang
XiaoFeng Wang
2017
conf/ccs
Capturing Malware Propagations with Code Injections and Code-Reuse Attacks.
David Korczynski
Heng Yin
2017
conf/ccs
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection.
Xiaojun Xu
Chang Liu
Qian Feng
Heng Yin
Le Song
Dawn Song
2017
conf/ccs
Extracting Conditional Formulas for Cross-Platform Bug Search.
Qian Feng
Minghua Wang
Mu Zhang
Rundong Zhou
Andrew Henderson
Heng Yin
2017
conf/ndss
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.
Xiaorui Pan
Xueqiang Wang
Yue Duan
XiaoFeng Wang
Heng Yin
2016
conf/ccs
Scalable Graph-based Bug Search for Firmware Images.
Qian Feng
Rundong Zhou
Chengcheng Xu
Yao Cheng
Brian Testa
Heng Yin
2016
conf/ccs
ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis.
Qian Feng
Aravind Prakash
Minghua Wang
Curtis Carmony
Heng Yin
2016
conf/ndss
Extract Me If You Can: Abusing PDF Parsers in Malware Detectors.
Curtis Carmony
Xunchao Hu
Heng Yin
Abhishek Vasisht Bhaskar
Mu Zhang
2015
conf/ccs
Towards Automatic Generation of Security-Centric Descriptions for Android Apps.
Mu Zhang
Yue Duan
Qian Feng
Heng Yin
2015
conf/ndss
vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.
Aravind Prakash
Xunchao Hu
Heng Yin
2015
conf/acsac
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries.
Minghua Wang
Heng Yin
Abhishek Vasisht Bhaskar
Purui Su
Dengguo Feng
2015
conf/acsac
Defeating ROP Through Denial of Stack Pivot.
Aravind Prakash
Heng Yin
2014
conf/ccs
Efficient, context-aware privacy leakage confinement for android applications without firmware modding.
Mu Zhang
Heng Yin
2014
conf/ccs
Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation.
Xing Jin
Xunchao Hu
Kailiang Ying
Wenliang Du
Heng Yin
Gautam Nagesh Peri
2014
conf/ccs
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs.
Mu Zhang
Yue Duan
Heng Yin
Zhiruo Zhao
2014
conf/ndss
AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.
Mu Zhang
Heng Yin
2014
conf/acsac
MACE: high-coverage and robust memory analysis for commodity operating systems.
Qian Feng
Aravind Prakash
Heng Yin
Zhiqiang Lin
2013
conf/ccs
Enforcing system-wide control flow integrity for exploit detection and diagnosis.
Aravind Prakash
Heng Yin
Zhenkai Liang
2013
conf/ndss
TransBlocker: Transforming and Taming Privacy-Breaching Android Applications.
Mu Zhang
Heng Yin
2013
conf/dsn
Manipulating semantic values in kernel data structures: Attack assessments and implications.
Aravind Prakash
Eknath Venkataramani
Heng Yin
Zhiqiang Lin
2012
conf/uss
DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis.
Lok-Kwong Yan
Heng Yin
2012
conf/ndss
Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation.
Lok-Kwong Yan
Manjukumar Jayachandra
Mu Zhang
Heng Yin
2012
conf/ndss
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.
Mingwei Zhang
Aravind Prakash
Xiaolei Li
Zhenkai Liang
Heng Yin
2011
conf/acsac
Attacks on WebView in the Android system.
Tongbo Luo
Hao Hao
Wenliang Du
Yifei Wang
Heng Yin
2009
conf/ccs
Emulating emulation-resistant malware.
Min Gyung Kang
Heng Yin
Steve Hanna
Stephen McCamant
Dawn Song
2008
conf/iciss
BitBlaze: A New Approach to Computer Security via Binary Analysis.
Dawn Xiaodong Song
David Brumley
Heng Yin
Juan Caballero
Ivan Jager
Min Gyung Kang
Zhenkai Liang
James Newsome
Pongsin Poosankam
Prateek Saxena
2008
conf/ndss
HookFinder: Identifying and Understanding Malware Hooking Behaviors.
Heng Yin
Zhenkai Liang
Dawn Song
2007
conf/ccs
Panorama: capturing system-wide information flow for malware detection and analysis.
Heng Yin
Dawn Xiaodong Song
Manuel Egele
Christopher Kruegel
Engin Kirda
2007
conf/ccs
Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
Juan Caballero
Heng Yin
Zhenkai Liang
Dawn Xiaodong Song
2006
conf/ccs
An effective defense against email spam laundering.
Mengjun Xie
Heng Yin
Haining Wang
2005
conf/uss
Building an Application-aware IPsec Policy System.
Heng Yin
Haining Wang
Coauthors
Abhishek Vasisht Bhaskar
(3)
Ali Davanian
(1)
Andrew Henderson
(1)
Aravind Prakash
(7)
Bo Fang
(1)
Brian Testa
(1)
Byoungyoung Lee
(1)
Chang Liu
(2)
Chengcheng Xu
(1)
Chengyu Song
(4)
Christopher Kruegel
(1)
Curtis Carmony
(2)
David Brumley
(1)
David Korczynski
(1)
Dawn Song
(4)
Dawn Xiaodong Song
(3)
Deepali Garg
(1)
Dengguo Feng
(1)
Dmitry Kuznetsov
(1)
Eknath Venkataramani
(1)
Engin Kirda
(1)
Gautam Nagesh Peri
(1)
Hailong Jiang
(1)
Haining Wang
(2)
Hao Hao
(1)
Haochen Zeng
(1)
Haotian Zhang
(1)
Heng Yin
(51)
Hongsong Zhu
(1)
Insik Shin
(1)
Ivan Jager
(1)
James Newsome
(1)
Jiang Ming
(1)
Jie Hu
(1)
Jifeng Xuan
(1)
Jinghan Wang
(3)
Ju Chen
(2)
Juan Caballero
(2)
Kailiang Ying
(1)
Le Song
(1)
Lei Zhao
(3)
Lian Gao
(1)
Limin Sun
(1)
Lok-Kwong Yan
(2)
Manjukumar Jayachandra
(1)
Manuel Egele
(1)
Mengjia Yan
(1)
Mengjun Xie
(1)
Min Gyung Kang
(2)
Minghua Wang
(3)
Mingjun Yin
(1)
Mingwei Zhang
(1)
Mu Zhang
(9)
Nathan DeBardeleben
(1)
Peng Li
(1)
Pongsin Poosankam
(1)
Prateek Saxena
(1)
Purui Su
(1)
Qian Feng
(7)
Qiang Guan
(1)
Rundong Zhou
(2)
Sadia Afroz
(1)
Sheng Yu
(3)
Shitong Zhu
(1)
Stephen McCamant
(1)
Steve Hanna
(1)
Tao Wei
(1)
Terence Grove
(1)
Tongbo Luo
(1)
Tongxin Li
(1)
Wei Song
(3)
Wei You
(1)
Wenliang Du
(2)
Wookhyun Han
(1)
Xiangyu Zhang
(1)
XiaoFeng Wang
(2)
Xiaojun Xu
(1)
Xiaoke Wang
(1)
Xiaolei Li
(1)
Xiaorui Pan
(2)
Xing Jin
(1)
Xueqiang Wang
(2)
Xuezixiang Li
(3)
Xunchao Hu
(7)
Yao Cheng
(1)
Yaowen Zheng
(1)
Yi Sun
(1)
Yichen Zhang
(1)
Yifei Wang
(1)
Yiru Zhao
(1)
Yousra Aafer
(1)
Yu Qu
(4)
Yu Shi
(1)
Yue Duan
(7)
Yueqiang Cheng
(2)
Yuncong Zhu
(1)
Zhaoqi Xiao
(1)
Zhenkai Liang
(5)
Zhenxiao Qi
(3)
Zhiqiang Lin
(2)
Zhiruo Zhao
(1)
Zhiyun Qian
(1)
Zubair Shafiq
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to