Time: 3:00 PM, Friday   Offline Venue: SIST 1A-505   Online: TencentMeeting

Speaker Order: Luwei ⇒ Pu Sun ⇒ Guangke ⇒ YuXin ⇒ Mingyang ⇒ Huiyu ⇒ Shi Pu ⇒ Yangbiao ⇒ Weijie ⇒ Hongyi ⇒ Yuyang ⇒ Cunhan ⇒ Jiaye ⇒ Pengfei ⇒Zhe Zhao ⇒ Yedi
Work Report Group 0: Zhensu & Yedi & Guangke & Mingyang & Huiyu & Shi Pu & Hongyi & Yuyang & CunHan
Work Report Group 1: Pengfei & Zhe Zhao & Luwei &Qi Qin & Pu Sun & YuXin & Yangbiao & Weijie & Jiaye

Paper

Speaker

Date

New ♥Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks

Luwei

2023-3-31

Large Language Models are Zero-Shot Fuzzers: Fuzzing Deep-Learning Libraries via Large Language Models

Huiyu

2023-3-24

Verifying Neural Networks Against Backdoor Attacks

Pengfei

2023-3-17

Verifying Hardware Security Modules with Information-Preserving Refinement

Cunhan

2023-3-3

Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source

Yuyang & Work Report Group 0

2023-2-24

SQUIP: Exploiting the Scheduler Queue Contention Side Channel

Hongyi & Work Report Group 1

2023-2-17

EAGLE: Creating Equivalent Graphs to Test Deep Learning Libraries

Weijie & Work Report Group 0

2023-1-7

SnR: Constraint-Based Type Inference for Incomplete Java Code Snippets

Yangbiao & Work Report Group 1

2022-12-17

Adversarial Texture for Fooling Person Detectors in the PhysicalWorld

Shi Pu & Work Report Group 0

2022-12-10

Adversarial Examples of Go AIs

Zhe Zhao & Work Report Group 1

2022-12-3

Towards Robust File System Checkers

Jiaye & Work Report Group 0

2022-11-19

Coverage-guided tensor compiler fuzzing with joint IR-pass mutation

Mingyang & Work Report Group 1

2022-11-12

Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing

Yuxin & Work Report Group 0

2022-11-5

Membership Inference Attacks by Exploiting Loss Trajectory

Guangke

2022-10-29

Fast MILP Models for Division Property

Pu Sun & Everyone

2022-10-22

Abacus: Precise Side-Channel Analysis

Luwei & Everyone

2022-10-15

GreedyFool: Distortion-Aware Sparse Adversarial Attack

Shi Pu & Pengfei

2022-3-11

Type4Py: Practical Deep Similarity Learning-Based Type Inference for Python

Yangbiao & Weijie

2022-3-4

Wireless Charging Power Side-Channel Attacks

Hongyi & Shi Pu

2021-12-30

DOMPTEUR: Taming Audio Adversarial Examples

Guangke & Yangbiao

2021-12-23

GhostCell: Separating Permissions from Data in Rust

Mingyang & Hongyi

2021-12-16

Attack of the Tails: Yes, You Really Can Backdoor Federated Learning

Huiyu & Guangke

2021-12-9

T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification

Qi Qin

2021-12-2

Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink

Yongjie & Mingyang

2021-11-18

Verifying Quantized Neural Networks using SMT-Based Model Checking

Yedi & Huiyu

2021-11-11

CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning

Zhensu & Qi Qin

2021-11-4

SecureML: A System for Scalable Privacy-Preserving Machine Learning

Yuxin & Yongjie

2021-10-21

SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets

Luwei & Yedi

2021-10-15

MILP Modeling for (Large) S-boxes to OptimizeProbability of Differential Characteristics

Pu Sun & Yuxin Fan

2021-09-30

Invited Talk Lightweight Global and Local Contexts Guided Method Name Recommendation with Prior Knowledge

Shangwen Wang & Luwei

2021-09-23

Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing

Pengfei Gao & Pu Sun

2021-09-16

Pruning and Slicing Neural Networks using Formal Verification

Yedi Zhang & Yuxin Fan

2021-07-02

Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding

Ziang Xiang & Mingyang Liu

2021-06-25

RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection

Qi Qin & Hongyi

2021-06-04

Universal Approximation with Certified Networks

Huiyu Tan & Pu Sun

2021-05-21

When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition

Guangke Chen & Yongjie Xu

2021-05-14

PASAPTO: Policy-aware Security and Performance Trade-off Analysis Computation on Encrypted Data with Restricted Leakage

Yuxin Fan & Luwei Cai

2021-05-07

Understanding Memory and Thread Safety Practicesand Issues in Real-World Rust Programs

Mingyang Liu & Guangke Chen

2021-04-23

Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage

Hongyi Xie & Yedi Zhang

2021-04-16

New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search

Pu Sun & Pengfei Gao

2021-04-09

Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks

Yongjie Xu & Zhe Zhao

2021-04-02

Invited Talk Application of deep learning in software security

Sen Nie

2021-03-26

Exposing Cache Timing Side-Channel Leaks through Out-of-Order Symbolic Execution

Luwei Cai & Qi Qin

2021-03-19

Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications

Guangke Chen & Huiyu Tan

2021-03-12

Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures

Pengfei Gao & Ziang Xiang

2021-03-05

Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning

Huiyu Tan & Yuxin Fan

2021-01-15

Adversarial Training and Provable Defenses: Bridging the Gap

Zhe Zhao & Mingyang

2021-01-08

PDiff: Semantic-based Patch Presence Testing for Downstream Kernels

Qi Qin

2020-12-18

Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features

Yedi Zhang & Pu Sun

2020-12-11

YOLOv4: Optimal Speed and Accuracy of Object Detection

Ziang Xiang

2020-12-04

Computer-aided proofs for multiparty computation with active security

YuXin Fan & Yongjie Xu

2020-11-27

Stacked Borrows: An Aliasing Model for Rust

Mingyang Liu & Luwei Cai

2020-11-13

Stealthy Tracking of Autonomous Vehicles with Cache Side Channels

Hongyi Xie & Zhe Zhao

2020-10-30

Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps

Pu Sun & Pengfei Gao

2020-10-23

On Training Robust PDF Malware Classifiers

Yongjie Xu & Yedi Zhang

2020-10-16

SpecuSym: Speculative Symbolic Execution for Cache Timing Leak Detection

Luwei Cai & Guangke Chen

2020-10-9

Typilus: Neural Type Hints

Zhe Zhao & Qi Qin

2020-9-25

Invited Talk Towards Secure and Robust Stateful Deep Learning Systems with Model-Based Analysis

Xiaoning Du

2020-9-18

Invited Talk SECURING SOFTWARE SYSTEMS VIA FUZZ TESTING AND VERIFICATION

Hongxu Chen

2020-9-11

Invited Talk Matryoshka: Fuzzing Deeply Nested Branches

Jianzhong Liu & Yuxin Fan

2020-9-4

Analyzing Deep Neural Networks with Symbolic Propagation: Towards Higher Precision and Faster Verification

Yedi Zhang & Hongyi Xie

2020-8-28

Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification

Pengfei Gao & Pu Sun

2020-8-21

Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks

YuXin Fan & Yongjie Xu

2020-7-31

Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices

Guangke Chen & Zhe Zhao

2020-7-24

RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks

Hongyi Xie & Yedi Zhang

2020-7-17

Resource Race Attacks on Android

Pu Sun & Pengfei Gao

2020-7-10

Matrix Multiplication: Verifying Strong Uniquely Solvable Puzzles

Yongjie Xu

2020-7-3

Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data

Luwei Cai & Guangke Chen

2020-6-19

DeepBillboard: Systematic Physical-World Testing of Autonomous Driving Systems

Zhe Zhao & Qi Qin

2020-6-12

An Abstraction-Based Framework for Neural Network Verification

Yedi Zhang

2020-6-5

JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation

Peifei Gao

2020-5-30

DeepStellar: Model-Based Quantitative Analysis of Stateful Deep Learning Systems

Guangke Chen

2020-5-22

CrystalBall: Gazing in the Black Box of SAT Solving

Zhe Zhao

2020-1-8

Scaling symbolic evaluation for automatedverification of systems code with Serval

Pengfei Gao

2019-12-25

Approximate Counting via Random Optimization

Yongjie Xu

2019-12-18

Understanding and Detecting Evolution-Induced CompatibilityIssues in Android Apps

Pu Sun

2019-12-11

FaCT: A DSL for Timing-Sensitive Computation

Luwei Cai

2019-12-4

Adversarial Music: Real World Audio AdversaryAgainst Wake-word Detection System

Guangke Chen

2019-11-27

History-Guided Configuration Diversification forCompiler Test-Program Generation

Pengfei Gao

2019-11-20

Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures

Zhe Zhao

2019-11-13

Knowledge Compilation meets Uniform Sampling  

Yongjie Xu

2019-11-06

DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps  

Pu Sun

2019-10-30

InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy 

Luwei Cai

2019-10-23

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems 

Guangke Chen

2019-10-16

Model-Reuse Attacks on Deep Learning Systems 

Zhe Zhao

2019-10-09

Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation 

Pengfei Gao

2019-09-25

Fast Sampling of Perfectly Uniform Satisfying Assignments 

Yongjie Xu

2019-09-18

An Empirical Study of Android Test Generation Tools in Industrial Cases 

Pu Sun

2019-09-11

Varys: Protecting SGX enclaves from practical side-channel attacks 

Luwei Cai

2019-09-04

Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels 

Hongyi Xie

2019-08-28

An inductive synthesis framework for verifiable reinforcement learning

Yedi Zhang

2019-08-21

Automated Testing of Basic Recognition Capability for Speech Recognition Systems

Guangke Chen

2019-08-14

CLTestCheck: Measuring Test Effectiveness for GPU Kernels

Zhe Zhao

2019-08-07

Semantic Fuzzing with Zest

Pengfei Gao

2019-07-31

Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities

Pu Sun

2019-07-24

Quantitative Mitigation of Timing Side Channels

Hongyi Xie

2019-07-17

Synthesis of Provably Correct Autonomy Protocols for Shared Control

Yedi Zhang

2019-07-03

Abstract Interpretation under Speculative Execution

Luwei Cai

2019-06-26

Formal Security Analysis of Neural Networks using Symbolic Intervals

Zhe Zhao

2019-06-19

Symbolic path cost analysis for side-channel detection

Pengfei Gao

2019-05-29

Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers

Weitian Wang

2019-05-22

Phishing Attacks on Modern Android

Pu Sun

2019-05-15

Attack Directories, Not Caches: Side-Channel Attacks in a Non-Inclusive World

Luwei Cai

2019-05-08

SoK: Keylogging Side Channels

Hongyi Xie

2019-04-24

Automatic Failure Explanation in CPS Models

Yedi Zhang

2019-04-17

Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems

Guangke Chen

2019-04-10

V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing

Zhe Zhao

2019-04-03

Mitigating Power Side Channels during Compilation

Pengfei Gao

2019-03-27

Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications

Weitian Wang

2019-03-20

ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android

Pu Sun

2019-03-13

Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic

Luwei Cai

2019-03-06

Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries

Hongyi Xie

2019-02-27

Predictive Run-Time Verification of Discrete-Time Reachability Properties in Black-Box Systems Using Trace-Level Abstraction and Statistical Learning

Yedi Zhang

2019-01-16

Learning a SAT Solver from Single-Bit Supervision

Zhe Zhao

2019-01-09

DIFFUZZ: Differential Fuzzing for Side-Channel Analysis

Pengfei Gao

2019-01-02

Ariadne: Analysis for Machine Learning Programs

Weitian Wang

2018-12-26

TDroid: Exposing App Switching Attacks in Android with Control Flow Specialization

Pu Sun

2018-12-19

Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks

Luwei Cai

2018-12-12

Rendered Insecure: GPU Side Channel Attacks are Practical

Hongyi Xie

2018-12-05

Formal Verification of Neural Network Controlled Autonomous Systems

Yedi Zhang

2018-11-21

DeepMutation: Mutation Testing of Deep Learning Systems

Zhe Zhao

2018-11-14

Efficient Sampling of SAT Solutions for Testing

Pengfei Gao

2018-11-07

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World

Weitian Wang

2018-10-31

A static technique for detecting input validation vulnerabilities in Android apps

Pu Sun

2018-10-24

Flush+Reload: A High Resolution, Low Noise,L3 Cache Side-Channel Attack

Luwei Cai

2018-10-17

Provably secure compilation of side-channel countermeasures

Hongyi Xie

2018-10-10

Simulation-based Adversarial Test Generation for Autonomous Vehicles with Machine Learning Components

Yedi Zhang

2018-9-18

Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures

Zhe Zhao

2018-9-11

Lazy Self-composition for Security Verification

Pengfei Gao

2018-8-28

MaxSMT-Based Type Inference for Python 3

Weitian Wang

2018-8-21

CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities

Pu Sun

2018-8-14

Constant time encryption as a countermeasure against remote cache timing attacks

Luwei Cai

2018-8-7

Eliminating Timing Side-Channel Leaks using Program Repair

Hongyi Xie

2018-7-31

Towards Optimal Concolic Testing

Zhe Zhao

2018-7-24

Safe Reinforcement Learning via Formal Methods Toward Safe Control Through Proof and Learning

Yedi Zhang

2018-7-10

MITIGATING ADVERSARIAL EFFECTS THROUGH RANDOMIZATION

Feng Wang

2018-7-3

Automatically Generating Search Heuristics for Concolic Testing

Pengfei Gao

2018-6-26

maskVerif: a formal tool for analyzing software and hardware

Jun Zhang

2018-6-19

DeepTest: Automated Testing of Deep-Neural-Network-driven Autonomous Cars

Zhe Zhao

2018-6-12

A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks

Feng Wang

2018-6-5

AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation

Jun Zhang

2018-5-29

On Learning Sparse Boolean Formulae For Explaining AI Decisions

Yedi Zhang

2018-5-22

Synode: Understanding and Automatically Preventing Injection Attacks on Node.js

Pengfei Gao

2018-5-15

Be Selfish and Avoid Dilemmas:Fork After Withholding (FAW) Attacks on Bitcoin

Pu Sun

2018-5-8

ADVERSARIAL EXAMPLES IN THE PHYSICAL WORLD

Zhe Zhao

2018-4-24

Invited TalkMagNet: a Two-Pronged Defense against Adversarial Examples

Dongyu Meng

2018-4-21

TeLEx: Passive STL Learning Using Only Positive Examples

Yedi Zhang

2018-4-10

ZEUS: Analyzing Safety of Smart Contracts

Feng Wang

2018-4-3

SymJS: Automatic Symbolic Testing of JavaScript Web Applications

Pengfei Gao

2018-3-27

Invited Talk Angora: Efficient Fuzzing by Principled Search

Peng Chen

2018-3-17

Seriously, get off my cloud!Cross-VM RSA Key Recovery in a Public Cloud

Jun Zhang

2018-3-13

Safe Autonomy Under Perception Uncertainty Using Chance-Constrained Temporal Logic

Yedi Zhang

2018-3-6

Generalizing Hamiltonian Monte Carlo with Neural Networks Daniel Levy

Feng Wang

2018-1-4

Practical blended taint analysis for JavaScript

Pengfei Gao

2017-12-28

Security by Compilation: An Automated Approach to Comprehensive Side-channel Resistance

Jun Zhang

2017-12-21

Use of Formal Methods at Amazon Web Services

Yedi Zhang

2017-12-14

Easy Over Hard: A Case Study on Deep Learning

Feng Wang

2017-12-7

Static Analysis of Event-Driven Node.js JavaScript Applications

Pengfei Gao

2017-11-30

DeepXplore: Automated Whitebox Testing of Deep Learning Systems

Jun Zhang

2017-11-23

Formal verification of autonomous vehicle platooning

Yedi Zhang

2017-11-19

DeepFix: Fixing Common C Language Errors by Deep Learning

Feng Wang

2017-11-2

Guided, Stochastic Model-Based GUI Testing of Android Apps

Pengfei Gao

2017-10-19

SMT-Based Verification of Software Countermeasures against Side-Channel Attacks

Jun Zhang

2017-10-12