Follow
Yue Duan
Title
Cited by
Cited by
Year
Semantics-aware android malware classification using weighted contextual api dependency graphs
M Zhang, Y Duan, H Yin, Z Zhao
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
6242014
DEEPBINDIFF: Learning Program-Wide Code Representations for Binary Diffing
Y Duan, X Li, J Wang, H Yin
Network and Distributed System Security Symposium (NDSS), 2020
2012020
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing
L Zhao, Y Duan, H Yin, J Xuan
Network and Distributed System Security Symposium (NDSS), 2019
1642019
Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation
Y Duan, M Zhang, AV Bhaskar, H Yin, X Pan, T Li, X Wang, XF Wang
Network and Distributed System Security Symposium (NDSS), 2018
1082018
Be sensitive and collaborative: Analyzing impact of coverage metrics in greybox fuzzing
J Wang, Y Duan, W Song, H Yin, C Song
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
1062019
Towards automatic generation of security-centric descriptions for android apps
M Zhang, Y Duan, Q Feng, H Yin
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1032015
Dark hazard: Learning-based, large-scale discovery of hidden sensitive operations in android apps
X Pan, X Wang, Y Duan, X Wang, H Yin
Network and Distributed System Security Symposium (NDSS), 2017
85*2017
Semantics-aware android malware classification
YIN Heng, M Zhang, Y Duan, Z Zhao
US Patent App. 14/833,491, 2016
522016
Jsforce: A forced execution engine for malicious javascript detection
X Hu, Y Cheng, Y Duan, A Henderson, H Yin
Security and Privacy in Communication Networks: 13th International …, 2018
302018
Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains
WE Bodell III, S Meisami, Y Duan
32nd USENIX Security Symposium (USENIX Security 23), 2023
202023
Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications
Y Duan, X Zhao, Y Pan, S Li, M Li, F Xu, M Zhang
Proceedings of the 29nd ACM SIGSAC Conference on Computer and Communications …, 2022
192022
Privacy-Preserving Offloading of Mobile App to the Public Cloud.
Y Duan, M Zhang, H Yin, Y Tang
HotCloud 15, 2015
162015
Social network based reputation computation and document classification
JY Lee, Y Duan, JC Oh, W Du, HA Blair, L Wang, X Jin
132012
Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications
Y Duan, L Gao, J Hu, H Yin
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
112019
Automatic reputation computation through document analysis: A social network approach
JY Lee, Y Duan, JC Oh, W Du, H Blair, L Wang, X Jin
2011 International Conference on Advances in Social Networks Analysis and …, 2011
102011
Probabilistic Path Prioritization for Hybrid Fuzzing
L Zhao, P Cao, Y Duan, H Yin, J Xuan
IEEE Transactions on Dependable and Secure Computing (TDSC), 2022
82022
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
S Yan, S Wang, Y Duan, H Hong, K Lee, D Kim, Y Hong
33rd USENIX Security Symposium (USENIX Security 24), 2024
72024
SIGMADIFF: Semantics-Aware Deep Graph Matching for Pseudocode Diffing
L Gao, Y Qu, S Yu, Y Duan, H Yin
Network and Distributed System Security Symposium (NDSS), 2024
22024
Marco: A Stochastic Asynchronous Concolic Explorer
J Hu, Y Duan, H Yin
2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE …, 2024
12024
Poster: Privacy-Preserving Offloading of Mobile App to the Public Cloud
Y Duan, M Zhang, H Yin, Y Tang
Syracuse University, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–20