Time: 3:00 PM, Friday Offline Venue: SIST 1A-505 Online: TencentMeeting
Speaker Order: Luwei ⇒ Pu Sun ⇒ Guangke ⇒ YuXin ⇒ Mingyang ⇒ Huiyu ⇒ Shi Pu ⇒ Yangbiao ⇒ Weijie ⇒ Hongyi ⇒ Yuyang ⇒ Cunhan ⇒ Jiaye ⇒ Pengfei ⇒Zhe Zhao ⇒ Yedi
Work Report Group 0: Zhensu & Yedi & Guangke & Mingyang & Huiyu & Shi Pu & Hongyi & Yuyang & CunHan
Work Report Group 1: Pengfei & Zhe Zhao & Luwei &Qi Qin & Pu Sun & YuXin & Yangbiao & Weijie & Jiaye
Paper |
Speaker |
Date |
New ♥Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks
| Luwei |
2023-3-31 |
Large Language Models are Zero-Shot Fuzzers: Fuzzing Deep-Learning Libraries via Large Language Models
| Huiyu |
2023-3-24 |
Verifying Neural Networks Against Backdoor Attacks
| Pengfei |
2023-3-17 |
Verifying Hardware Security Modules with Information-Preserving Refinement
| Cunhan |
2023-3-3 |
Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source
| Yuyang & Work Report Group 0 |
2023-2-24 |
SQUIP: Exploiting the Scheduler Queue Contention Side Channel
| Hongyi & Work Report Group 1 |
2023-2-17 |
EAGLE: Creating Equivalent Graphs to Test Deep Learning Libraries
| Weijie & Work Report Group 0 |
2023-1-7 |
SnR: Constraint-Based Type Inference for Incomplete Java Code Snippets
| Yangbiao & Work Report Group 1 |
2022-12-17 |
Adversarial Texture for Fooling Person Detectors in the PhysicalWorld
| Shi Pu & Work Report Group 0 |
2022-12-10 |
Adversarial Examples of Go AIs
| Zhe Zhao & Work Report Group 1 |
2022-12-3 |
Towards Robust File System Checkers
| Jiaye & Work Report Group 0 |
2022-11-19 |
Coverage-guided tensor compiler fuzzing with joint IR-pass mutation
| Mingyang & Work Report Group 1 |
2022-11-12 |
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing
| Yuxin & Work Report Group 0 |
2022-11-5 |
Membership Inference Attacks by Exploiting Loss Trajectory
| Guangke |
2022-10-29 |
Fast MILP Models for Division Property
| Pu Sun & Everyone |
2022-10-22 |
Abacus: Precise Side-Channel Analysis
| Luwei & Everyone |
2022-10-15 |
GreedyFool: Distortion-Aware Sparse Adversarial Attack
| Shi Pu & Pengfei |
2022-3-11 |
Type4Py: Practical Deep Similarity Learning-Based Type Inference for Python
| Yangbiao & Weijie |
2022-3-4 |
Wireless Charging Power Side-Channel Attacks
| Hongyi & Shi Pu |
2021-12-30 |
DOMPTEUR: Taming Audio Adversarial Examples
| Guangke & Yangbiao |
2021-12-23 |
GhostCell: Separating Permissions from Data in Rust
| Mingyang & Hongyi |
2021-12-16 |
Attack of the Tails: Yes, You Really Can Backdoor Federated Learning
| Huiyu & Guangke |
2021-12-9 |
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
| Qi Qin |
2021-12-2 |
Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink
| Yongjie & Mingyang |
2021-11-18 |
Verifying Quantized Neural Networks using SMT-Based Model Checking
| Yedi & Huiyu |
2021-11-11 |
CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning
| Zhensu & Qi Qin |
2021-11-4 |
SecureML: A System for Scalable Privacy-Preserving Machine Learning
| Yuxin & Yongjie |
2021-10-21 |
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets
| Luwei & Yedi |
2021-10-15 |
MILP Modeling for (Large) S-boxes to OptimizeProbability of Differential Characteristics
| Pu Sun & Yuxin Fan |
2021-09-30 |
Invited Talk Lightweight Global and Local Contexts Guided Method Name Recommendation with Prior Knowledge |
Shangwen Wang & Luwei |
2021-09-23 |
Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing |
Pengfei Gao & Pu Sun |
2021-09-16 |
Pruning and Slicing Neural Networks using Formal Verification |
Yedi Zhang & Yuxin Fan |
2021-07-02 |
Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding |
Ziang Xiang & Mingyang Liu |
2021-06-25 |
RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection |
Qi Qin & Hongyi |
2021-06-04 |
Universal Approximation with Certified Networks |
Huiyu Tan & Pu Sun |
2021-05-21 |
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition |
Guangke Chen & Yongjie Xu |
2021-05-14 |
PASAPTO: Policy-aware Security and Performance Trade-off Analysis Computation on Encrypted
Data with Restricted Leakage |
Yuxin Fan & Luwei Cai |
2021-05-07 |
Understanding Memory and Thread Safety Practicesand Issues in Real-World Rust Programs |
Mingyang Liu & Guangke Chen |
2021-04-23 |
Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage |
Hongyi Xie & Yedi Zhang |
2021-04-16 |
New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search |
Pu Sun & Pengfei Gao |
2021-04-09 |
Neural Cleanse: Identifying and Mitigating
Backdoor Attacks in Neural Networks |
Yongjie Xu & Zhe Zhao |
2021-04-02 |
Invited Talk Application of deep learning in software security |
Sen Nie |
2021-03-26 |
Exposing Cache Timing Side-Channel Leaks through
Out-of-Order Symbolic Execution |
Luwei Cai & Qi Qin |
2021-03-19 |
Life after Speech Recognition:
Fuzzing Semantic Misinterpretation for Voice Assistant Applications |
Guangke Chen & Huiyu Tan |
2021-03-12 |
Statistical Ineffective Fault Attacks
on Masked AES with Fault Countermeasures
|
Pengfei Gao & Ziang Xiang |
2021-03-05 |
Adversarial Preprocessing: Understanding and
Preventing Image-Scaling Attacks in Machine Learning
|
Huiyu Tan & Yuxin Fan |
2021-01-15 |
Adversarial Training and Provable Defenses: Bridging the Gap
|
Zhe Zhao & Mingyang |
2021-01-08 |
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels
|
Qi Qin |
2020-12-18 |
Composite Backdoor Attack for Deep Neural Network by
Mixing Existing Benign Features
|
Yedi Zhang & Pu Sun |
2020-12-11 |
YOLOv4: Optimal Speed and Accuracy of Object Detection |
Ziang Xiang |
2020-12-04 |
Computer-aided proofs for multiparty computation
with active security |
YuXin Fan & Yongjie Xu |
2020-11-27 |
Stacked Borrows: An Aliasing Model for Rust |
Mingyang Liu & Luwei Cai |
2020-11-13 |
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels |
Hongyi Xie & Zhe Zhao |
2020-10-30 |
Automatic Uncovering of Hidden Behaviors From
Input Validation in Mobile Apps |
Pu Sun & Pengfei Gao |
2020-10-23 |
On Training Robust PDF Malware Classifiers
|
Yongjie Xu & Yedi Zhang |
2020-10-16 |
SpecuSym: Speculative Symbolic Execution for Cache Timing
Leak Detection
|
Luwei Cai & Guangke Chen |
2020-10-9 |
Typilus: Neural Type Hints |
Zhe Zhao & Qi Qin |
2020-9-25 |
Invited Talk Towards Secure and Robust Stateful Deep
Learning Systems with Model-Based Analysis |
Xiaoning Du |
2020-9-18 |
Invited Talk SECURING SOFTWARE SYSTEMS
VIA FUZZ TESTING AND VERIFICATION |
Hongxu Chen |
2020-9-11 |
Invited Talk Matryoshka: Fuzzing Deeply Nested Branches |
Jianzhong Liu & Yuxin Fan |
2020-9-4 |
Analyzing Deep Neural Networks with Symbolic Propagation: Towards Higher Precision and Faster Verification |
Yedi Zhang & Hongyi Xie |
2020-8-28 |
Masking in Fine-Grained Leakage Models:
Construction, Implementation and Verification |
Pengfei Gao & Pu Sun |
2020-8-21 |
Enforcing ideal-world leakage bounds in
real-world secret sharing MPC frameworks |
YuXin Fan & Yongjie Xu |
2020-7-31 |
Devil’s Whisper: A General Approach for Physical Adversarial Attacks against
Commercial Black-box Speech Recognition Devices |
Guangke Chen & Zhe Zhao |
2020-7-24 |
RELOAD+REFRESH: Abusing Cache Replacement
Policies to Perform Stealthy Cache Attacks |
Hongyi Xie & Yedi Zhang |
2020-7-17 |
Resource Race Attacks on Android |
Pu Sun & Pengfei Gao |
2020-7-10 |
Matrix Multiplication: Verifying Strong
Uniquely Solvable Puzzles |
Yongjie Xu |
2020-7-3 |
Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data |
Luwei Cai & Guangke Chen |
2020-6-19 |
DeepBillboard: Systematic Physical-World Testing of Autonomous Driving Systems |
Zhe Zhao & Qi Qin |
2020-6-12 |
An Abstraction-Based Framework for Neural Network Verification |
Yedi Zhang |
2020-6-5 |
JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation |
Peifei Gao |
2020-5-30 |
DeepStellar: Model-Based Quantitative Analysis of Stateful Deep Learning Systems |
Guangke Chen |
2020-5-22 |
CrystalBall: Gazing in the Black Box of SAT Solving |
Zhe Zhao |
2020-1-8 |
Scaling symbolic evaluation for automatedverification of systems code with Serval |
Pengfei Gao |
2019-12-25 |
Approximate Counting via Random Optimization |
Yongjie Xu |
2019-12-18 |
Understanding and Detecting Evolution-Induced CompatibilityIssues in Android Apps |
Pu Sun |
2019-12-11 |
FaCT: A DSL for Timing-Sensitive Computation |
Luwei Cai |
2019-12-4 |
Adversarial Music: Real World Audio AdversaryAgainst Wake-word Detection System |
Guangke Chen |
2019-11-27 |
History-Guided Configuration Diversification forCompiler Test-Program Generation |
Pengfei Gao |
2019-11-20 |
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures |
Zhe Zhao |
2019-11-13 |
Knowledge Compilation meets Uniform Sampling |
Yongjie Xu |
2019-11-06 |
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps |
Pu Sun |
2019-10-30 |
InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy |
Luwei Cai |
2019-10-23 |
Practical Hidden Voice Attacks against Speech and
Speaker Recognition Systems |
Guangke Chen |
2019-10-16 |
Model-Reuse Attacks on Deep Learning Systems |
Zhe Zhao |
2019-10-09 |
Identifying Cache-Based Side Channels through
Secret-Augmented Abstract Interpretation |
Pengfei Gao |
2019-09-25 |
Fast Sampling of Perfectly Uniform
Satisfying Assignments |
Yongjie Xu |
2019-09-18 |
An Empirical Study of Android Test Generation Tools in
Industrial Cases |
Pu Sun |
2019-09-11 |
Varys: Protecting SGX enclaves from
practical side-channel attacks |
Luwei Cai |
2019-09-04 |
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels |
Hongyi Xie |
2019-08-28 |
An inductive synthesis framework for verifiable reinforcement learning |
Yedi Zhang |
2019-08-21 |
Automated Testing of Basic Recognition Capability for Speech Recognition Systems |
Guangke Chen |
2019-08-14 |
CLTestCheck: Measuring Test Effectiveness for GPU Kernels |
Zhe Zhao |
2019-08-07 |
Semantic Fuzzing with Zest |
Pengfei Gao |
2019-07-31 |
Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities |
Pu Sun |
2019-07-24 |
Quantitative Mitigation of Timing Side Channels |
Hongyi Xie |
2019-07-17 |
Synthesis of Provably Correct Autonomy Protocols for Shared Control |
Yedi Zhang |
2019-07-03 |
Abstract Interpretation under Speculative Execution |
Luwei Cai |
2019-06-26 |
Formal Security Analysis of Neural Networks using Symbolic Intervals |
Zhe Zhao |
2019-06-19 |
Symbolic path cost analysis for side-channel detection |
Pengfei Gao |
2019-05-29 |
Kiss from a Rogue: Evaluating Detectability of
Pay-at-the-Pump Card Skimmers |
Weitian Wang |
2019-05-22 |
Phishing Attacks on Modern Android |
Pu Sun |
2019-05-15 |
Attack Directories, Not Caches: Side-Channel Attacks in a Non-Inclusive World |
Luwei Cai |
2019-05-08 |
SoK: Keylogging Side Channels |
Hongyi Xie |
2019-04-24 |
Automatic Failure Explanation in CPS Models |
Yedi Zhang |
2019-04-17 |
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems |
Guangke Chen |
2019-04-10 |
V-Fuzz: Vulnerability-Oriented Evolutionary
Fuzzing |
Zhe Zhao |
2019-04-03 |
Mitigating Power Side Channels during Compilation |
Pengfei Gao |
2019-03-27 |
Pride and Prejudice in Progressive Web Apps:
Abusing Native App-like Features in Web Applications |
Weitian Wang |
2019-03-20 |
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android |
Pu Sun |
2019-03-13 |
Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic |
Luwei Cai |
2019-03-06 |
Unveiling your keystrokes: A Cache-based
Side-channel Attack on Graphics Libraries |
Hongyi Xie |
2019-02-27 |
Predictive Run-Time Verification of Discrete-Time Reachability Properties in Black-Box Systems Using Trace-Level Abstraction and Statistical Learning |
Yedi Zhang |
2019-01-16 |
Learning a SAT Solver from Single-Bit Supervision |
Zhe Zhao |
2019-01-09 |
DIFFUZZ: Differential Fuzzing for Side-Channel Analysis |
Pengfei Gao |
2019-01-02 |
Ariadne: Analysis for Machine Learning Programs |
Weitian Wang |
2018-12-26 |
TDroid: Exposing App Switching Attacks in Android with Control Flow Specialization |
Pu Sun |
2018-12-19 |
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks |
Luwei Cai |
2018-12-12 |
Rendered Insecure: GPU Side Channel Attacks are Practical |
Hongyi Xie |
2018-12-05 |
Formal Verification of Neural Network Controlled Autonomous Systems |
Yedi Zhang |
2018-11-21 |
DeepMutation: Mutation Testing of Deep Learning Systems |
Zhe Zhao |
2018-11-14 |
Efficient Sampling of SAT Solutions for Testing |
Pengfei Gao |
2018-11-07 |
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World |
Weitian Wang |
2018-10-31 |
A static technique for detecting input validation vulnerabilities in Android apps |
Pu Sun |
2018-10-24 |
Flush+Reload: A High Resolution, Low Noise,L3 Cache Side-Channel Attack |
Luwei Cai |
2018-10-17 |
Provably secure compilation of side-channel countermeasures |
Hongyi Xie |
2018-10-10 |
Simulation-based Adversarial Test Generation for Autonomous Vehicles with Machine Learning Components |
Yedi Zhang |
2018-9-18 |
Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures |
Zhe Zhao |
2018-9-11 |
Lazy Self-composition for Security Verification |
Pengfei Gao |
2018-8-28 |
MaxSMT-Based Type Inference for Python 3 |
Weitian Wang |
2018-8-21 |
CHEX: Statically Vetting Android Apps for
Component Hijacking Vulnerabilities |
Pu Sun |
2018-8-14 |
Constant time encryption as a countermeasure against remote cache timing attacks |
Luwei Cai |
2018-8-7 |
Eliminating Timing Side-Channel Leaks using Program Repair |
Hongyi Xie |
2018-7-31 |
Towards Optimal Concolic Testing |
Zhe Zhao |
2018-7-24 |
Safe Reinforcement Learning via Formal Methods Toward Safe Control Through Proof and Learning |
Yedi Zhang |
2018-7-10 |
MITIGATING ADVERSARIAL EFFECTS THROUGH RANDOMIZATION |
Feng Wang |
2018-7-3 |
Automatically Generating Search Heuristics for Concolic Testing |
Pengfei Gao |
2018-6-26 |
maskVerif: a formal tool for analyzing software and hardware |
Jun Zhang |
2018-6-19 |
DeepTest: Automated Testing of Deep-Neural-Network-driven Autonomous Cars |
Zhe Zhao |
2018-6-12 |
A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks |
Feng Wang |
2018-6-5 |
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation |
Jun Zhang |
2018-5-29 |
On Learning Sparse Boolean Formulae For Explaining AI Decisions |
Yedi Zhang |
2018-5-22 |
Synode: Understanding and Automatically Preventing Injection Attacks on Node.js |
Pengfei Gao |
2018-5-15 |
Be Selfish and Avoid Dilemmas:Fork After Withholding (FAW) Attacks on Bitcoin |
Pu Sun |
2018-5-8 |
ADVERSARIAL EXAMPLES IN THE PHYSICAL WORLD |
Zhe Zhao |
2018-4-24 |
Invited TalkMagNet: a Two-Pronged Defense against Adversarial Examples |
Dongyu Meng |
2018-4-21 |
TeLEx: Passive STL Learning Using Only Positive Examples |
Yedi Zhang |
2018-4-10 |
ZEUS: Analyzing Safety of Smart Contracts |
Feng Wang |
2018-4-3 |
SymJS: Automatic Symbolic Testing of JavaScript Web Applications |
Pengfei Gao |
2018-3-27 |
Invited Talk Angora: Efficient Fuzzing by Principled Search |
Peng Chen |
2018-3-17 |
Seriously, get off my cloud!Cross-VM RSA Key Recovery in a Public Cloud |
Jun Zhang |
2018-3-13 |
Safe Autonomy Under Perception Uncertainty Using Chance-Constrained Temporal Logic |
Yedi Zhang |
2018-3-6 |
Generalizing Hamiltonian Monte Carlo with Neural Networks Daniel Levy |
Feng Wang |
2018-1-4 |
Practical blended taint analysis for JavaScript |
Pengfei Gao |
2017-12-28 |
Security by Compilation: An Automated Approach to Comprehensive Side-channel Resistance |
Jun Zhang |
2017-12-21 |
Use of Formal Methods at Amazon Web Services |
Yedi Zhang |
2017-12-14 |
Easy Over Hard: A Case Study on Deep Learning |
Feng Wang |
2017-12-7 |
Static Analysis of Event-Driven Node.js JavaScript Applications |
Pengfei Gao |
2017-11-30 |
DeepXplore: Automated Whitebox Testing
of Deep Learning Systems |
Jun Zhang |
2017-11-23 |
Formal verification of autonomous vehicle platooning |
Yedi Zhang |
2017-11-19 |
DeepFix: Fixing Common C Language Errors by Deep Learning |
Feng Wang |
2017-11-2 |
Guided, Stochastic Model-Based GUI Testing of Android Apps |
Pengfei Gao |
2017-10-19 |
SMT-Based Verification of Software Countermeasures
against Side-Channel Attacks |
Jun Zhang |
2017-10-12 |