Selected Publications

In Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 16-18, 2017. (Acceptance ratio 16.3%=85522)

In Proceedings of the 38th IEEE Symposium on Security and Privacy, San Jose, CA, May 22-24, 2017. (Acceptance ratio 13.3%=60450)

In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, Technical Research Paper, Singapore, Singapore, September 3-7, 2016. (Acceptance ratio 19.1%=57298)

In Proceedings of the 1st IEEE European Symposium on Security and Privacy, Saarbr├╝cken, GERMANY, March 21-24, 2016. (Acceptance ratio 17.3%=29168)

In Proceedings of the 22nd ACM Conference on Computer and Communications Security, Denver, Colorado, October 12-16, 2015. (Acceptance ratio 19.3%=128660)

In Proceedings of the 24th USENIX Security Symposium, Washington, D.C., August 12-14, 2015. (Acceptance ratio 15.7%=67426)

In Proceedings of the 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Hong Kong, China, November 16-22, 2014. (Acceptance ratio 21.8%=61280)

Recent Publications

More Publications

  • [USENIX Security'17] BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking

    Details

  • [ConPro'17] Countering Double-Spend Attacks on Bitcoin Fast-Pay Transactions

    Details

  • [S&P'17] Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping

    Details

  • [TSE] Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection

    Details

  • [SCAM'16] BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling

    Details PDF Code

  • [ISC'16] Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method

    Details PDF Code

  • [ASE'16] StraightTaint: Decoupled Offline Symbolic Taint Analysis

    Details PDF

  • [TR] Deviation-Based Obfuscation-Resilient Program Equivalence Checking with Application to Software Plagiarism Detection

    Details PDF

  • [JICV] Impeding Behavior-based Malware Analysis via Replacement Attacks to Malware Specifications

    Details

  • [JICV] MalwareHunt: Semantics-Based Malware Diffing Speedup by Normalized Basic Block Memoization

    Details

  • [Euro S&P'16] Translingual Obfuscation

    Details PDF Long Version in arXiv

  • [CODASPY'16] Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics

    Details PDF

  • [ITCon] Automatic Building Information Model Query Generation

    Details

  • [CCS'15] LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code

    Details PDF Code

  • [USENIX Security'15] TaintPipe: Pipelined Symbolic Taint Analysis

    Details PDF

Teaching

I teach the following courses at University of Texas at Arlington:

  • CS5380: Information Security

Versatility

I enjoy taking pictures to remember a particular moment in my life. There is just something about looking through that little window and seeing a whole new world that captivates me each time. My favorite topics are landscape, nature, and the night sky.

CONTINUE READING

Contact