Daoyuan Wu

Orcid: 0000-0002-3752-0718

According to our database1, Daoyuan Wu authored at least 39 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Combining Fine-Tuning and LLM-based Agents for Intuitive Smart Contract Auditing with Justifications.
CoRR, 2024

ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts.
CoRR, 2024

Pre-trained Model-based Actionable Warning Identification: A Feasibility Study.
CoRR, 2024

LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper.
CoRR, 2024

LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning.
CoRR, 2024

2023
VRPTEST: Evaluating Visual Referring Prompting in Large Multimodal Models.
CoRR, 2023

Machine Learning for Actionable Warning Identification: A Comprehensive Survey.
CoRR, 2023

Split and Merge: Aligning Position Biases in Large Language Model based Evaluators.
CoRR, 2023

When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan.
CoRR, 2023

On the Feasibility of Specialized Ability Extracting for Large Language Code Models.
CoRR, 2023

BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing.
IEEE Trans. Dependable Secur. Comput., 2022

On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps.
CoRR, 2022

iExam: A Novel Online Exam Monitoring and Analysis System Based on Face Detection and Recognition.
CoRR, 2022

An empirical study of blockchain system vulnerabilities: modules, types, and patterns.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

2021
Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls.
Empir. Softw. Eng., 2021

Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities.
CoRR, 2021

AGChain: A Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets.
CoRR, 2021

When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Understanding Android VoIP Security: A System-Level Vulnerability Assessment.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2019
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

An empirical study of mobile network behavior and application performance in the wild.
Proceedings of the International Symposium on Quality of Service, 2019

Towards Understanding Android System Vulnerabilities: Techniques and Insights.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Toward Accurate Network Delay Measurement on Android Phones.
IEEE Trans. Mob. Comput., 2018

Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

2016
MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic.
CoRR, 2016

SecComp: Towards Practically Defending Against Component Hijacking in Android Applications.
CoRR, 2016

Demystifying and Puncturing the Inflated Delay in Smartphone-based WiFi Network Measurement.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016

2015
Indirect File Leaks in Mobile Applications.
CoRR, 2015

On the accuracy of smartphone-based mobile network measurement.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Stack Layout Randomization with Minimal Rewriting of Android Binaries.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2014
A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps.
CoRR, 2014

Analyzing Android Browser Apps for file: // Vulnerabilities.
Proceedings of the Information Security - 17th International Conference, 2014


  Loading...