Daoyuan Wu
Daoyuan Wu
Verified email at - Homepage
Cited by
Cited by
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis
Y Sun, D Wu, Y Xue, H Liu, H Wang, Z Xu, X Xie, Y Liu
Proc. IEEE/ACM ICSE, 2024
On the accuracy of smartphone-based mobile network measurement
W Li, RKP Mok, D Wu, RKC Chang
2015 IEEE conference on computer communications (INFOCOM), 370-378, 2015
Analyzing Android Browser Apps for file:// Vulnerabilities
D Wu, RKC Chang
Information Security Conference (ISC), 345-363, 2014
MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance
D Wu, RKC Chang, W Li, EKT Cheng, D Gao
2017 USENIX Annual Technical Conference (ATC 17), 445-457, 2017
Understanding open ports in Android applications: Discovery, diagnosis, and security assessment
D Wu, D Gao, RKC Chang, E He, EKT Cheng, RH Deng
NDSS, 2019
Measuring the declared SDK versions and their consistency with API calls in Android apps
D Wu, X Liu, J Xu, D Lo, D Gao
Wireless Algorithms, Systems, and Applications: 12th International …, 2017
On extracting specialized code abilities from large language models: A feasibility study
Z Li, C Wang, P Ma, C Liu, S Wang, D Wu, C Gao, Y Liu
arXiv preprint arXiv:2303.03012, 2023
SCLib: A practical and lightweight defense against component hijacking in Android applications
D Wu, Y Cheng, D Gao, Y Li, RH Deng
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
Towards understanding Android system vulnerabilities: techniques and insights
D Wu, D Gao, EKT Cheng, Y Cao, J Jiang, RH Deng
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
Indirect File Leaks in Mobile Applications
D Wu, RKC Chang
IEEE Mobile Security Technologies (MoST), in conjunction with S&P (Oakland) 2015, 2015
A sink-driven approach to detecting exposed component vulnerabilities in android apps
D Wu, X Luo, RKC Chang
arXiv preprint arXiv:1405.6282, 2014
LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning
Y Sun, D Wu, Y Xue, H Liu, W Ma, L Zhang, M Shi, Y Liu
arXiv preprint arXiv:2401.16185, 2024
Split and merge: Aligning position biases in large language model based evaluators
Z Li, C Wang, P Ma, D Wu, S Wang, C Gao, Y Liu
arXiv preprint arXiv:2310.01432, 2023
Towards dynamically monitoring android applications on non-rooted devices in the wild
X Tang, Y Lin, D Wu, D Gao
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
Deep-learning–based app sensitive behavior surveillance for Android powered cyber–physical systems
H Ma, J Tian, K Qiu, D Lo, D Gao, D Wu, C Jia, T Baker
IEEE Transactions on Industrial Informatics 17 (8), 5840-5850, 2020
When program analysis meets bytecode search: Targeted and efficient inter-procedural analysis of modern Android apps in BackDroid
D Wu, D Gao, RH Deng, CR KC
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
Toward accurate network delay measurement on android phones
W Li, D Wu, RKC Chang, RKP Mok
IEEE Transactions on Mobile Computing 17 (3), 717-732, 2017
Stack layout randomization with minimal rewriting of Android binaries
Y Liang, X Ma, D Wu, X Tang, D Gao, G Peng, C Jia, H Zhang
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects
X Yi, Y Fang, D Wu, L Jiang
NDSS, 2023
An empirical study of blockchain system vulnerabilities: Modules, types, and patterns
X Yi, D Wu, L Jiang, Y Fang, K Zhang, W Zhang
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
The system can't perform the operation now. Try again later.
Articles 1–20