Time: 7:30pm, Wednesday
Venue: SIST 1A-505

Paper

Speaker

Date

NewAn inductive synthesis framework for verifiable reinforcement learning

Yedi Zhang

2019-08-21

Automated Testing of Basic Recognition Capability for Speech Recognition Systems

Guangke Chen

2019-08-14

CLTestCheck: Measuring Test Effectiveness for GPU Kernels

Zhe Zhao

2019-08-07

Semantic Fuzzing with Zest

Pengfei Gao

2019-07-31

Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities

Pu Sun

2019-07-24

Quantitative Mitigation of Timing Side Channels

Hongyi Xie

2019-07-17

Synthesis of Provably Correct Autonomy Protocols for Shared Control

Yedi Zhang

2019-07-03

Abstract Interpretation under Speculative Execution

Luwei Cai

2019-06-26

Formal Security Analysis of Neural Networks using Symbolic Intervals

Zhe Zhao

2019-06-19

Symbolic path cost analysis for side-channel detection

Pengfei Gao

2019-05-29

Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers

Weitian Wang

2019-05-22

Phishing Attacks on Modern Android

Pu Sun

2019-05-15

Attack Directories, Not Caches: Side-Channel Attacks in a Non-Inclusive World

Luwei Cai

2019-05-08

SoK: Keylogging Side Channels

Hongyi Xie

2019-04-24

Automatic Failure Explanation in CPS Models

Yedi Zhang

2019-04-17

Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems

Guangke Chen

2019-04-10

V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing

Zhe Zhao

2019-04-03

Mitigating Power Side Channels during Compilation

Pengfei Gao

2019-03-27

Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications

Weitian Wang

2019-03-20

ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android

Pu Sun

2019-03-13

Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic

Luwei Cai

2019-03-06

Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries

Hongyi Xie

2019-02-27

Predictive Run-Time Verification of Discrete-Time Reachability Properties in Black-Box Systems Using Trace-Level Abstraction and Statistical Learning

Yedi Zhang

2019-01-16

Learning a SAT Solver from Single-Bit Supervision

Zhe Zhao

2019-01-09

DIFFUZZ: Differential Fuzzing for Side-Channel Analysis

Pengfei Gao

2019-01-02

Ariadne: Analysis for Machine Learning Programs

Weitian Wang

2018-12-26

TDroid: Exposing App Switching Attacks in Android with Control Flow Specialization

Pu Sun

2018-12-19

Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks

Luwei Cai

2018-12-12

Rendered Insecure: GPU Side Channel Attacks are Practical

Hongyi Xie

2018-12-05

Formal Verification of Neural Network Controlled Autonomous Systems

Yedi Zhang

2018-11-21

DeepMutation: Mutation Testing of Deep Learning Systems

Zhe Zhao

2018-11-14

Efficient Sampling of SAT Solutions for Testing

Pengfei Gao

2018-11-07

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World

Weitian Wang

2018-10-31

A static technique for detecting input validation vulnerabilities in Android apps

Pu Sun

2018-10-24

Flush+Reload: A High Resolution, Low Noise,L3 Cache Side-Channel Attack

Luwei Cai

2018-10-17

Provably secure compilation of side-channel countermeasures

Hongyi Xie

2018-10-10

Simulation-based Adversarial Test Generation for Autonomous Vehicles with Machine Learning Components

Yedi Zhang

2018-9-18

Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures

Zhe Zhao

2018-9-11

Lazy Self-composition for Security Verification

Pengfei Gao

2018-8-28

MaxSMT-Based Type Inference for Python 3

Weitian Wang

2018-8-21

CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities

Pu Sun

2018-8-14

Constant time encryption as a countermeasure against remote cache timing attacks

Luwei Cai

2018-8-7

Eliminating Timing Side-Channel Leaks using Program Repair

Hongyi Xie

2018-7-31

Towards Optimal Concolic Testing

Zhe Zhao

2018-7-24

Safe Reinforcement Learning via Formal Methods Toward Safe Control Through Proof and Learning

Yedi Zhang

2018-7-10

MITIGATING ADVERSARIAL EFFECTS THROUGH RANDOMIZATION

Feng Wang

2018-7-3

Automatically Generating Search Heuristics for Concolic Testing

Pengfei Gao

2018-6-26

maskVerif: a formal tool for analyzing software and hardware

Jun Zhang

2018-6-19

DeepTest: Automated Testing of Deep-Neural-Network-driven Autonomous Cars

Zhe Zhao

2018-6-12

A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks

Feng Wang

2018-6-5

AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation

Jun Zhang

2018-5-29

On Learning Sparse Boolean Formulae For Explaining AI Decisions

Yedi Zhang

2018-5-22

Synode: Understanding and Automatically Preventing Injection Attacks on Node.js

Pengfei Gao

2018-5-15

Be Selfish and Avoid Dilemmas:Fork After Withholding (FAW) Attacks on Bitcoin

Pu Sun

2018-5-8

ADVERSARIAL EXAMPLES IN THE PHYSICAL WORLD

Zhe Zhao

2018-4-24

Invited TalkMagNet: a Two-Pronged Defense against Adversarial Examples

Dongyu Meng

2018-4-21

TeLEx: Passive STL Learning Using Only Positive Examples

Yedi Zhang

2018-4-10

ZEUS: Analyzing Safety of Smart Contracts

Feng Wang

2018-4-3

SymJS: Automatic Symbolic Testing of JavaScript Web Applications

Pengfei Gao

2018-3-27

Invited Talk Angora: Efficient Fuzzing by Principled Search

Peng Chen

2018-3-17

Seriously, get off my cloud!Cross-VM RSA Key Recovery in a Public Cloud

Jun Zhang

2018-3-13

Safe Autonomy Under Perception Uncertainty Using Chance-Constrained Temporal Logic

Yedi Zhang

2018-3-6

Generalizing Hamiltonian Monte Carlo with Neural Networks Daniel Levy

Feng Wang

2018-1-4

Practical blended taint analysis for JavaScript

Pengfei Gao

2017-12-28

Security by Compilation: An Automated Approach to Comprehensive Side-channel Resistance

Jun Zhang

2017-12-21

Use of Formal Methods at Amazon Web Services

Yedi Zhang

2017-12-14

Easy Over Hard: A Case Study on Deep Learning

Feng Wang

2017-12-7

Static Analysis of Event-Driven Node.js JavaScript Applications

Pengfei Gao

2017-11-30

DeepXplore: Automated Whitebox Testing of Deep Learning Systems

Jun Zhang

2017-11-23

Formal verification of autonomous vehicle platooning

Yedi Zhang

2017-11-19

DeepFix: Fixing Common C Language Errors by Deep Learning

Feng Wang

2017-11-2

Guided, Stochastic Model-Based GUI Testing of Android Apps

Pengfei Gao

2017-10-19

SMT-Based Verification of Software Countermeasures against Side-Channel Attacks

Jun Zhang

2017-10-12