Selected Publications

In Proceedings of the 25th ACM Conference on Computer and Communications Security, Toronto, Canada, October 15-19, 2018. (Acceptance ratio 16.6%=134809)

In Proceedings of the 25th ACM Conference on Computer and Communications Security, Toronto, Canada, October 15-19, 2018. (Acceptance ratio 16.6%=134809)

In Proceedings of the 27th USENIX Security Symposium, Baltimore, MD, USA, August 15-17, 2018. (Acceptance ratio 19.1%=100524)

In Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 16-18, 2017. (Acceptance ratio 16.3%=85522)

In Proceedings of the 38th IEEE Symposium on Security and Privacy, San Jose, CA, May 22-24, 2017. (Acceptance ratio 13.3%=60450)

In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, Technical Research Paper, Singapore, Singapore, September 3-7, 2016. (Acceptance ratio 19.1%=57298)

In Proceedings of the 1st IEEE European Symposium on Security and Privacy, Saarbr├╝cken, GERMANY, March 21-24, 2016. (Acceptance ratio 17.3%=29168)

In Proceedings of the 22nd ACM Conference on Computer and Communications Security, Denver, Colorado, October 12-16, 2015. (Acceptance ratio 19.3%=128660)

In Proceedings of the 24th USENIX Security Symposium, Washington, D.C., August 12-14, 2015. (Acceptance ratio 15.7%=67426)

In Proceedings of the 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Hong Kong, China, November 16-22, 2014. (Acceptance ratio 21.8%=61280)

Recent Publications

More Publications

  • [CCS'18] VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification


  • [CCS'18] Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost


  • [USENIX Security'18] Towards Predicting Efficient and Anonymous Tor Circuits


  • [USENIX Security'17] BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking

    Details PDF

  • [ConPro'17] Countering Double-Spend Attacks on Bitcoin Fast-Pay Transactions


  • [S&P'17] Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping

    Details PDF CSAW'17 Applied Research Competition Top 10 Finalists

  • [TSE] Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection


  • [SCAM'16] BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling

    Details PDF Code

  • [ISC'16] Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method

    Details PDF Code

  • [ASE'16] StraightTaint: Decoupled Offline Symbolic Taint Analysis

    Details PDF

  • [TR] Deviation-Based Obfuscation-Resilient Program Equivalence Checking with Application to Software Plagiarism Detection

    Details PDF

  • [JICV] Impeding Behavior-based Malware Analysis via Replacement Attacks to Malware Specifications


  • [JICV] MalwareHunt: Semantics-Based Malware Diffing Speedup by Normalized Basic Block Memoization


  • [Euro S&P'16] Translingual Obfuscation

    Details PDF Long Version in arXiv

  • [CODASPY'16] Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics

    Details PDF


I teach the following courses at University of Texas at Arlington:

  • CS5380: Information Security


I enjoy taking pictures to remember a particular moment in my life. There is just something about looking through that little window and seeing a whole new world that captivates me each time. My favorite topics are landscape, nature, and the night sky.