Dongdong She

According to our database1, Dongdong She authored at least 14 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
MC<sup>2</sup>: Rigorous and Efficient Directed Greybox Fuzzing.
CoRR, 2022

Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

NeuDep: neural binary memory dependence analysis.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

MC2: Rigorous and Efficient Directed Greybox Fuzzing.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Fine Grained Dataflow Tracking with Proximal Gradients.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
On Training Robust PDF Malware Classifiers.
Proceedings of the 29th USENIX Security Symposium, 2020

Neutaint: Efficient Dynamic Taint Analysis with Neural Networks.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

MTFuzz: fuzzing with a multi-task neural network.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

2019
Neutaint: Efficient Dynamic Taint Analysis with Neural Networks.
CoRR, 2019

NEUZZ: Efficient Fuzzing with Neural Program Smoothing.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
NEUZZ: Efficient Fuzzing with Neural Program Learning.
CoRR, 2018

2016
Android ION Hazard: the Curse of Customizable Memory Management System.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Android Root and its Providers: A Double-Edged Sword.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015


  Loading...