{MVP}: Detecting vulnerabilities using {Patch-Enhanced} vulnerability signatures Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu, Y Liu, W Huo, W Zou, ... 29th USENIX Security Symposium (USENIX Security 20), 1165-1182, 2020 | 116 | 2020 |
B2sfinder: Detecting open-source software reuse in cots software Z Yuan, M Feng, F Li, G Ban, Y Xiao, S Wang, Q Tang, H Su, C Yu, J Xu, ... 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 49 | 2019 |
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge S Yang, C Dong, Y Xiao, Y Cheng, Z Shi, Z Li, L Sun ACM Transactions on Software Engineering and Methodology 33 (1), 1-40, 2023 | 27 | 2023 |
Open-source license violations of binary software at large scale M Feng, W Mao, Z Yuan, Y Xiao, G Ban, W Wang, S Wang, Q Tang, J Xu, ... 2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019 | 23 | 2019 |
Viva: Binary level vulnerability identification via partial signature Y Xiao, Z Xu, W Zhang, C Yu, L Liu, W Zou, Z Yuan, Y Liu, A Piao, W Huo 2021 IEEE International Conference on Software Analysis, Evolution and …, 2021 | 19 | 2021 |
B2SMatcher: fine-Grained version identification of open-Source software in binary files G Ban, L Xu, Y Xiao, X Li, Z Yuan, W Huo Cybersecurity 4, 1-21, 2021 | 11 | 2021 |
Acetest: Automated constraint extraction for testing deep learning operators J Shi, Y Xiao, Y Li, Y Li, D Yu, C Yu, H Su, Y Chen, W Huo Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 10 | 2023 |
{RegexScalpel}: Regular Expression Denial of Service ({{{{{ReDoS}}}}}) Defense by {Localize-and-Fix} Y Li, Y Sun, Z Xu, J Cao, Y Li, R Li, H Chen, SC Cheung, Y Liu, Y Xiao 31st USENIX Security Symposium (USENIX Security 22), 4183-4200, 2022 | 10 | 2022 |
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis S Yang, Z Xu, Y Xiao, Z Lang, W Tang, Y Liu, Z Shi, H Li, L Sun ACM Transactions on Software Engineering and Methodology 32 (6), 1-29, 2023 | 6 | 2023 |
Unleashing the power of pseudo-code for binary code similarity analysis W Zhang, Z Xu, Y Xiao, Y Xue Cybersecurity 5 (1), 23, 2022 | 6 | 2022 |
Scale: Constructing structured natural language comment trees for software vulnerability detection XC Wen, C Gao, S Gao, Y Xiao, MR Lyu Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024 | 5 | 2024 |
VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis Q Sun, L Xu, Y Xiao, F Li, H Su, Y Liu, H Huang, W Huo 2022 IEEE International Conference on Software Maintenance and Evolution …, 2022 | 5 | 2022 |
NAVRepair: Node-type Aware C/C++ Code Vulnerability Repair R Wang, Z Li, C Wang, Y Xiao, C Gao arXiv preprint arXiv:2405.04994, 2024 | 4 | 2024 |
Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing B Wu, S Liu, Y Xiao, Z Li, J Sun, SW Lin Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 4 | 2023 |
Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation X Wang, C Zhang, Y Li, Z Xu, S Huang, Y Liu, Y Yao, Y Xiao, Y Zou, Y Liu, ... 2023 IEEE Symposium on Security and Privacy (SP), 2427-2443, 2023 | 4 | 2023 |
LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries C Dong, S Li, S Yang, Y Xiao, Y Wang, H Li, Z Li, L Sun Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024 | 3 | 2024 |
Enhancing OSS Patch Backporting with Semantics S Yang, Y Xiao, Z Xu, C Sun, C Ji, Y Zhang Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 3 | 2023 |
File hijacking vulnerability: The elephant in the room C Yu, Y Xiao, J Lu, Y Li, Y Li, L Li, Y Dong, J Wang, J Shi, D Bo, W Huo Proceedings of the Network and Distributed System Security Symposium, 2024 | 2 | 2024 |
Detecting {API}{Post-Handling} Bugs Using Code and Description in Patches M Lin, K Chen, Y Xiao 32nd USENIX Security Symposium (USENIX Security 23), 3709-3726, 2023 | 2 | 2023 |
Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded Systems J Zhao, Y Li, Y Zou, Z Liang, Y Xiao, Y Li, B Peng, N Zhong, X Wang, ... 33rd USENIX Security Symposium (USENIX Security 24), 7067-7084, 2024 | 1 | 2024 |