Articles with public access mandates - Debin GaoLearn more
Available somewhere: 33
Mobipot: Understanding mobile telephony threats with honeycards
M Balduzzi, P Gupta, L Gu, D Gao, M Ahamad
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Mandates: US National Science Foundation
Software watermarking using return-oriented programming
H Ma, K Lu, X Ma, H Zhang, C Jia, D Gao
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
Mandates: National Natural Science Foundation of China
Understanding open ports in Android applications: Discovery, diagnosis, and security assessment
D Wu, D Gao, RKC Chang, E He, EKT Cheng, RH Deng
Internet Society, 2019
Mandates: National Natural Science Foundation of China, National Research Foundation …
{MopEye}: Opportunistic Monitoring of Per-app Mobile Network Performance
D Wu, RKC Chang, W Li, EKT Cheng, D Gao
2017 USENIX Annual Technical Conference (USENIX ATC 17), 445-457, 2017
Mandates: National Research Foundation, Singapore
Towards understanding Android system vulnerabilities: techniques and insights
D Wu, D Gao, EKT Cheng, Y Cao, J Jiang, RH Deng
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
Mandates: National Research Foundation, Singapore
When function signature recovery meets compiler optimization
Y Lin, D Gao
2021 IEEE Symposium on Security and Privacy (SP), 36-52, 2021
Mandates: National Research Foundation, Singapore
Appmod: Helping older adults manage mobile security with online social help
Z Wan, L Bao, D Gao, E Toch, X Xia, T Mendel, D Lo
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019
Mandates: National Natural Science Foundation of China
DynOpVm: VM-based software obfuscation with dynamic opcode mapping
X Cheng, Y Lin, D Gao, C Jia
Applied Cryptography and Network Security: 17th International Conference …, 2019
Mandates: National Natural Science Foundation of China
On-demand time blurring to support side-channel defense
W Liu, D Gao, MK Reiter
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
Mandates: US National Science Foundation
Control flow obfuscation using neural network to fight concolic testing
H Ma, X Ma, W Liu, Z Huang, D Gao, C Jia
International Conference on Security and Privacy in Communication Systems …, 2014
Mandates: National Natural Science Foundation of China
SCLib: A practical and lightweight defense against component hijacking in Android applications
D Wu, Y Cheng, D Gao, Y Li, RH Deng
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
Mandates: National Research Foundation, Singapore
Deep-learning–based app sensitive behavior surveillance for Android powered cyber–physical systems
H Ma, J Tian, K Qiu, D Lo, D Gao, D Wu, C Jia, T Baker
IEEE Transactions on Industrial Informatics 17 (8), 5840-5850, 2020
Mandates: National Natural Science Foundation of China, National Research Foundation …
When program analysis meets bytecode search: Targeted and efficient inter-procedural analysis of modern Android apps in BackDroid
D Wu, D Gao, RH Deng, CR KC
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
Mandates: National Research Foundation, Singapore
Stack layout randomization with minimal rewriting of Android binaries
Y Liang, X Ma, D Wu, X Tang, D Gao, G Peng, C Jia, H Zhang
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
Mandates: National Natural Science Foundation of China
An exploratory study of social support systems to help older adults in managing mobile safety
T Mendel, D Gao, D Lo, E Toch
Proceedings of the 23rd International Conference on Mobile Human-Computer …, 2021
Mandates: National Research Foundation, Singapore
On the usability (in) security of in-app browsing interfaces in mobile apps
Z Zhang
Proceedings of the 24th international symposium on research in attacks …, 2021
Mandates: National Research Foundation, Singapore
Towards mining comprehensive android sandboxes
TDB Le, L Bao, D Lo, D Gao, L Li
2018 23rd International conference on engineering of complex computer …, 2018
Mandates: National Research Foundation, Singapore
Integrated software fingerprinting via neural-network-based control flow obfuscation
H Ma, R Li, X Yu, C Jia, D Gao
IEEE Transactions on Information Forensics and Security 11 (10), 2322-2337, 2016
Mandates: National Natural Science Foundation of China
Replica placement for availability in the worst case
P Li, D Gao, MK Reiter
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
Mandates: National Natural Science Foundation of China
Active warden attack: On the (in) effectiveness of Android app repackage-proofing
H Ma, S Li, D Gao, D Wu, Q Jia, C Jia
IEEE Transactions on Dependable and Secure Computing 19 (5), 3508-3520, 2021
Mandates: National Natural Science Foundation of China, National Research Foundation …
Publication and funding information is determined automatically by a computer program