Purui Su

Orcid: 0000-0001-6701-0383

According to our database1, Purui Su authored at least 47 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Systematic Study of Android Non-SDK (Hidden) Service API Security.
IEEE Trans. Dependable Secur. Comput., 2023

One Simple API Can Cause Hundreds of Bugs An Analysis of Refcounting Bugs in All Modern Linux Kernels.
Proceedings of the 29th Symposium on Operating Systems Principles, 2023

VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

2022
FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries.
Proceedings of the 31st USENIX Security Symposium, 2022

Understanding and Mitigating Label Bias in Malware Classification: An Empirical Study.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

HTFuzz: Heap Operation Sequence Sensitive Fuzzing.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
InstruGuard: Find and Fix Instrumentation Errors for Coverage-based Greybox Fuzzing.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

2020
Visual Analysis of Collective Anomalies Using Faceted High-Order Correlation Graphs.
IEEE Trans. Vis. Comput. Graph., 2020

Resource Race Attacks on Android.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Fuzzing Program Logic Deeply Hidden in Binary Program Stages.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Detecting concurrency memory corruption vulnerabilities.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
A Comprehensive Study of Permission Usage on Android.
Proceedings of the Network and System Security - 12th International Conference, 2018

LEMNA: Explaining Deep Learning based Security Applications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Visual Analysis of Collective Anomalies Through High-Order Correlation Graph.
Proceedings of the IEEE Pacific Visualization Symposium, 2018

2017
Capability-Based Security Enforcement in Named Data Networking.
IEEE/ACM Trans. Netw., 2017

Towards Efficient Heap Overflow Discovery.
Proceedings of the 26th USENIX Security Symposium, 2017

Automatically assessing crashes from heap overflows.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

RealDroid: Large-Scale Evasive Malware Detection on "Real Devices".
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Direct Resource Hijacking in Android.
IEEE Internet Comput., 2016

Exploiting Android System Services Through Bypassing Service Helpers.
Proceedings of the Security and Privacy in Communication Networks, 2016

Attacks and Defence on Android Free Floating Windows.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Invalidating Idealized BGP Security Proposals and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015

Xede: Practical Exploit Early Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

A Rapid and Scalable Method for Android Application Repackaging Detection.
Proceedings of the Information Security Practice and Experience, 2015

Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Long Term Tracking and Characterization of P2P Botnet.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Automated User Profiling in Location-Based Mobile Messaging Applications.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Revisiting Node Injection of P2P Botnet.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Automatic Polymorphic Exploit Generation for Software Vulnerabilities.
Proceedings of the Security and Privacy in Communication Networks, 2013

VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing.
Proceedings of the Security and Privacy in Communication Networks, 2013

OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Bind your phone number with caution: automated user profiling through address book matching on smartphone.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Black-box testing based on colorful taint analysis.
Sci. China Inf. Sci., 2012

2010
CloudSEC: A Cloud Architecture for Composing Collaborative Security Services.
Proceedings of the Cloud Computing, Second International Conference, 2010

DepSim: A Dependency-Based Malware Similarity Comparison System.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
ReconBin: Reconstructing Binary File from Execution for Software Analysis.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Reconstructing a Packed DLL Binary for Static Analysis.
Proceedings of the Information Security Practice and Experience, 2009

2008
Exploring Malware Behaviors Based on Environment Constitution.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
SEPCOM: customizable zero copy model.
Proceedings of the 2nd International Conference on Performance Evaluation Methodolgies and Tools, 2007

2006
The Design of an Artificial Immune System.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

2005
Detecting the Deviations of Privileged Process Execution.
Proceedings of the Networking, 2005

A Packet Marking Scheme for IP Traceback.
Proceedings of the Networking, 2005


  Loading...