Haoyu Wang

Orcid: 0000-0003-1100-8633

Affiliations:
  • Huazhong University of Science and Technology, Wuhan, China
  • Beijing University of Posts and Telecommunications, Beijing, China
  • Peking University, MOE Key Laboratory of High-Confidence Software Technologies, Beijing, China (PhD 2016)


According to our database1, Haoyu Wang authored at least 150 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Characterizing and Detecting WebAssembly Runtime Bugs.
ACM Trans. Softw. Eng. Methodol., February, 2024

How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors.
IEEE Trans. Dependable Secur. Comput., 2024

The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024

The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors.
CoRR, 2024

MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack.
CoRR, 2024

Digger: Detecting Copyright Content Mis-usage in Large Language Model Training.
CoRR, 2024

2023
Miracle or Mirage? A Measurement Study of NFT Rug Pulls.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023

Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective.
ACM Trans. Softw. Eng. Methodol., November, 2023

<i>FaaSLight</i>: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing.
ACM Trans. Softw. Eng. Methodol., September, 2023

Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews.
IEEE Trans. Software Eng., April, 2023

APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps.
IEEE Trans. Software Eng., 2023

WRTester: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation.
CoRR, 2023

SoK: On the Security of Non-Fungible Tokens.
CoRR, 2023

Software Engineering for OpenHarmony: A Research Roadmap.
CoRR, 2023

Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey.
CoRR, 2023

Large Language Models for Software Engineering: A Systematic Literature Review.
CoRR, 2023

WASMixer: Binary Obfuscation for WebAssembly.
CoRR, 2023

Abusing the Ethereum Smart Contract Verification Services for Fun and Profit.
CoRR, 2023

A Deep Dive into NFT Rug Pulls.
CoRR, 2023

A General Static Binary Rewriting Framework for WebAssembly.
CoRR, 2023

Are Mobile Advertisements in Compliance with App's Age Group?
Proceedings of the ACM Web Conference 2023, 2023

DISTDET: A Cost-Effective Distributed Cyber Threat Detection System.
Proceedings of the 32nd USENIX Security Symposium, 2023

Potential Risks Arising from the Absence of Signature Verification in Miniapp Plugins.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

On the Usage-scenario-based Data Minimization in Mini Programs.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

BREWasm: A General Static Binary Rewriting Framework for WebAssembly.
Proceedings of the Static Analysis - 30th International Symposium, 2023

WADIFF: A Differential Testing Framework for WebAssembly Runtimes.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

CydiOS: A Model-Based Testing Framework for iOS Apps.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper).
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Poster: Uncovering Vulnerabilities in Wasm Smart Contracts.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A Systematic Assessment on Android Third-Party Library Detection Tools.
IEEE Trans. Software Eng., 2022

XDebloat: Towards Automated Feature-Oriented App Debloating.
IEEE Trans. Software Eng., 2022

A Systematical Study on Application Performance Management Libraries for Apps.
IEEE Trans. Software Eng., 2022

Make Web3.0 Connected.
IEEE Trans. Dependable Secur. Comput., 2022

MalRadar: Demystifying Android Malware in the New Era.
Proc. ACM Meas. Anal. Comput. Syst., 2022

A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation.
CoRR, 2022

LambdaLite: Application-Level Optimization for Cold Start Latency in Serverless Computing.
CoRR, 2022

iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps.
CoRR, 2022

Dataset Bias in Android Malware Detection.
CoRR, 2022

Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Demystifying "removed reviews" in iOS app store.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

What did you pack in my app? a systematic analysis of commercial Android packers.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Uncovering Cross-Context Inconsistent Access Control Enforcement in Android.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity.
Proceedings of the 9th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2022

Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade Era.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

MalWhiteout: Reducing Label Errors in Android Malware Detection.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Path-sensitive code embedding via contrastive learning for software vulnerability detection.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

WASAI: uncovering vulnerabilities in Wasm smart contracts.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Challenges in decentralized name management: the case of ENS.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

PROMAL: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Uncovering Intent based Leak of Sensitive Data in Android Framework.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection.
ACM Trans. Softw. Eng. Methodol., 2021

DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network.
ACM Trans. Softw. Eng. Methodol., 2021

Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications.
IEEE Trans. Dependable Secur. Comput., 2021

Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Characterizing Cryptocurrency-themed Malicious Browser Extensions.
Proc. ACM Meas. Anal. Comput. Syst., 2021

SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Beyond the virus: a first look at coronavirus-themed Android malware.
Empir. Softw. Eng., 2021

Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO.
CoRR, 2021

Demystifying Scam Tokens on Uniswap Decentralized Exchange.
CoRR, 2021

Ethereum Name Service: the Good, the Bad, and the Ugly.
CoRR, 2021

Towards Understanding and Demystifying Bitcoin Mixing Services.
Proceedings of the WWW '21: The Web Conference 2021, 2021

A Longitudinal Study of Removed Apps in iOS App Store.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Demystifying Illegal Mobile Gambling Apps.
Proceedings of the WWW '21: The Web Conference 2021, 2021

EOSAFE: Security Analysis of EOSIO Smart Contracts.
Proceedings of the 30th USENIX Security Symposium, 2021

MMGuard: Automatically Protecting On-Device Deep Learning Models in Android Apps.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Understanding the Impact of COVID-19 on Github Developers: A Preliminary Study.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

On the Effectiveness of Deep Vulnerability Detectors to Simple Stupid Bug Detection.
Proceedings of the 18th IEEE/ACM International Conference on Mining Software Repositories, 2021

Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms.
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021

Towards Understanding iOS App Store Search Advertising: An Explorative Study.
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021

Finding the Missing Piece: Permission Specification Analysis for Android NDK.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Understanding (Mis)Behavior on the EOSIO Blockchain.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Tracking Counterfeit Cryptocurrency End-to-end.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Flow2Vec: value-flow-based precise code embedding.
Proc. ACM Program. Lang., 2020

HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
IACR Cryptol. ePrint Arch., 2020

VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts.
CoRR, 2020

Understanding Characteristics of Commodity Serverless Computing Platforms.
CoRR, 2020

Towards understanding flash loan and its applications in defi ecosystem.
CoRR, 2020

When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories.
CoRR, 2020

A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps.
CoRR, 2020

Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware.
CoRR, 2020

Understanding Challenges in Deploying Deep Learning Based Software: An Empirical Study.
CoRR, 2020

Security Analysis of EOSIO Smart Contracts.
CoRR, 2020

Characterizing EOSIO Blockchain.
CoRR, 2020

MadDroid: Characterising and Detecting Devious Ad Content for Android Apps.
CoRR, 2020

Characterizing cryptocurrency exchange scams.
Comput. Secur., 2020

MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Mobile App Squatting.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

All your app links are belong to us: understanding the threats of instant apps based attacks.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

A comprehensive study on challenges in deploying deep learning based software.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Dissecting Mobile Offerwall Advertisements: An Explorative Study.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Demystifying Diehard Android Apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Automated Third-Party Library Detection for Android Applications: Are We There Yet?
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Market-level analysis of government-backed COVID-19 contact tracing apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020

KnowledgeZooClient: constructing knowledge graph for Android.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020

A<sup>3</sup>Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

Characterizing Code Clones in the Ethereum Smart Contract Ecosystem.
Proceedings of the Financial Cryptography and Data Security, 2020

Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

Does the Presence of Privacy Relevant Information Affect App Market Choice?
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

2019
Revisiting the impact of common libraries for android-related investigations.
J. Syst. Softw., 2019

On Identifying and Explaining Similarities in Android Apps.
J. Comput. Sci. Technol., 2019

Automated Deobfuscation of Android Native Binary Code.
CoRR, 2019

EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level.
CoRR, 2019

AppAuth: Authorship Attribution for Android App Clones.
IEEE Access, 2019

Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play.
Proceedings of the World Wide Web Conference, 2019

Knowledge Graphing Git Repositories: A Preliminary Study.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

AppNet: understanding app recommendation in Google Play.
Proceedings of the 3rd ACM SIGSOFT International Workshop on App Market Analytics, 2019

RmvDroid: towards a reliable Android malware dataset with app metadata.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

Characterizing Android App Signing Issues.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

DaPanda: Detecting Aggressive Push Notifications in Android Apps.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking.
Proceedings of the Information Security - 22nd International Conference, 2019

Characterizing the global mobile app developers: a large-scale empirical study.
Proceedings of the 6th International Conference on Mobile Software Engineering and Systems, 2019

Deobfuscating Android native binary code.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries?
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

FraudDroid: automated ad fraud detection for Android apps.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Re-checking App Behavior against App Description in the Context of Third-party Libraries.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Why are Android apps removed from Google Play?: a large-scale empirical study.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

CiD: automating the detection of API-related compatibility issues in Android apps.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets.
Proceedings of the Internet Measurement Conference 2018, 2018

Towards Light-Weight Deep Learning Based Malware Detection.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Understanding the Purpose of Permission Use in Mobile Apps.
ACM Trans. Inf. Syst., 2017

FrauDroid: An Accurate and Scalable Approach to Automated Mobile Ad Fraud Detection.
CoRR, 2017

CRSPR: PageRank for Android Apps.
IEEE Access, 2017

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective.
Proceedings of the 26th International Conference on World Wide Web, 2017

Understanding third-party libraries in mobile app analysis.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Identifying and Analyzing the Privacy of Apps for Kids.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

LibRadar: fast and accurate detection of third-party libraries in Android apps.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
WuKong: a scalable and accurate two-phase approach to Android app clone detection.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Using text mining to infer the purpose of permission use in mobile apps.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Reevaluating Android Permission Gaps with Static and Dynamic Analysis.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Similarity-based web browser optimization.
Proceedings of the 23rd International World Wide Web Conference, 2014

2013
Mobile Web Browser Optimizations in the Cloud Era: A Survey.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013


  Loading...