Ting Chen

Affiliations:
  • University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China


According to our database1, Ting Chen authored at least 83 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists.
IEEE Trans. Inf. Forensics Secur., 2024

2023
A License Management and Fine-Grained Verifiable Data Access Control System for Online Catering.
IEEE Trans. Comput. Soc. Syst., December, 2023

WASMOD: Detecting vulnerabilities in Wasm smart contracts.
IET Blockchain, December, 2023

BlockExplorer: Exploring Blockchain Big Data Via Parallel Processing.
IEEE Trans. Computers, August, 2023

Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts.
ACM Trans. Softw. Eng. Methodol., May, 2023

Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations.
IEEE Trans. Software Eng., April, 2023

Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts.
IEEE Trans. Software Eng., February, 2023

TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts.
ACM Trans. Softw. Eng. Methodol., January, 2023

TRacer: Scalable Graph-Based Transaction Tracing for Account-Based Blockchain Trading Systems.
IEEE Trans. Inf. Forensics Secur., 2023

Blockchain-Based Access and Timeliness Control for Administrative Punishment Market Supervision.
IEEE Internet Things J., 2023

Demystifying DeFi MEV Activities in Flashbots Bundle.
IACR Cryptol. ePrint Arch., 2023

SigRec: Automatic Recovery of Function Signatures in Smart Contracts.
IACR Cryptol. ePrint Arch., 2023

Bubble or Not: Measurements, Analyses, and Findings on the Ethereum ERC721 and ERC1155 Non-fungible Token Ecosystem.
CoRR, 2023

Know Your Transactions: Real-time and Generic Transaction Semantic Representation on Blockchain & Web3 Ecosystem.
Proceedings of the ACM Web Conference 2023, 2023

Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations.
Proceedings of the 32nd USENIX Security Symposium, 2023

Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

DAppHunter: Identifying Inconsistent Behaviors of Blockchain-based Decentralized Applications.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

2022
XDebloat: Towards Automated Feature-Oriented App Debloating.
IEEE Trans. Software Eng., 2022

DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode.
IEEE Trans. Software Eng., 2022

Defining Smart Contract Defects on Ethereum.
IEEE Trans. Software Eng., 2022

SigRec: Automatic Recovery of Function Signatures in Smart Contracts.
IEEE Trans. Software Eng., 2022

SNPSFuzzer: A Fast Greybox Fuzzer for Stateful Network Protocols Using Snapshots.
IEEE Trans. Inf. Forensics Secur., 2022

Vulnerability Detection of ICS Protocols via Cross-State Fuzzing.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

AntFuzzer: A Grey-Box Fuzzing Framework for EOSIO Smart Contracts.
CoRR, 2022

Uncovering Cross-Context Inconsistent Access Control Enforcement in Android.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Enabling Privacy-Preserving Off-chain Payment via Hybrid Multi-hop Mechanism.
Proceedings of the IEEE International Conference on Communications, 2022

TokenCat: Detect Flaw of Authentication on ERC20 Tokens.
Proceedings of the IEEE International Conference on Communications, 2022

Smart contract vulnerability detection based on variant LSTM.
Proceedings of the International Conference on Big Data, IoT, and Cloud Computing, 2022

2021
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts.
IEEE Trans. Emerg. Top. Comput., 2021

Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example.
IEEE Netw., 2021

Transaction-based classification and detection approach for Ethereum smart contract.
Inf. Process. Manag., 2021

iBatch: Saving Ethereum Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations.
CoRR, 2021

HEALER: Relation Learning Guided Kernel Fuzzing.
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021

iBatch: saving Ethereum fees via secure and cost-effective batching of smart-contract invocations.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

CLUE: towards discovering locked cryptocurrencies in ethereum.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Finding the Missing Piece: Permission Specification Analysis for Android NDK.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

SCStudio: a secure and efficient integrated development environment for smart contracts.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

GANMIA: GAN-based Black-box Membership Inference Attack.
Proceedings of the ICC 2021, 2021

Invited: Hardware/Software Co-Synthesis and Co-Optimization for Autonomous Systems.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

2020
Understanding Ethereum via Graph Analysis.
ACM Trans. Internet Techn., 2020

Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats.
Sensors, 2020

A survey on the security of blockchain systems.
Future Gener. Comput. Syst., 2020

STAN: Towards Describing Bytecodes of Smart Contract.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

SODA: A Generic Online Detection Framework for Smart Contracts.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Characterizing Erasable Accounts in Ethereum.
Proceedings of the Information Security - 23rd International Conference, 2020

2019
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface.
Secur. Commun. Networks, 2019

Domain Specific Code Smells in Smart Contracts.
CoRR, 2019

DataEther: Data Exploration Framework For Ethereum.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts.
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019

TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device.
Wirel. Commun. Mob. Comput., 2018

System-level attacks against android by exploiting asynchronous programming.
Softw. Qual. J., 2018

Automated forensic analysis of mobile applications on Android devices.
Digit. Investig., 2018

DBAF: Dynamic Binary Analysis Framework and Its Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

Understanding Ethereum via Graph Analysis.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Towards saving money in using smart contracts.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Under-optimized smart contracts devour your money.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Cloud-based parallel concolic execution.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART.
Proceedings of the 26th USENIX Security Symposium, 2017

A Program Manipulation Middleware and Its Applications on System Security.
Proceedings of the Security and Privacy in Communication Networks, 2017

An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
Proceedings of the Information Security Practice and Experience, 2017

Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Characterizing the Impacts of Application Layer DDoS Attacks.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

2016
A multi-granularity heuristic-combining approach for censorship circumvention activity identification.
Secur. Commun. Networks, 2016

Silent Battery Draining Attack against Android Systems by Subverting Doze Mode.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Test Generation for Embedded Executables via Concolic Execution in a Real Environment.
IEEE Trans. Reliab., 2015

An empirical investigation into path divergences for concolic execution using CREST.
Secur. Commun. Networks, 2015

2014
Constructing a Boolean implication network to study the interactions between environmental factors and OTUs.
Quant. Biol., 2014

FPM: Four-factors Propagation Model for passive P2P worms.
Future Gener. Comput. Syst., 2014

Conpy: Concolic Execution Engine for Python Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
Design and implementation of a dynamic symbolic execution tool for windows executables.
J. Softw. Evol. Process., 2013

Propagation modeling of active P2P worms based on ternary matrix.
J. Netw. Comput. Appl., 2013

State of the art: Dynamic symbolic execution for automated test generation.
Future Gener. Comput. Syst., 2013

2011
CRBA: A Capacity Restricted Model Evolved from BA Model for Complex Network.
J. Networks, 2011

Fast quarantining of proactive worms in unstructured P2P networks.
J. Netw. Comput. Appl., 2011

2010
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks.
J. Zhejiang Univ. Sci. C, 2010

2009
Research and Application of the Transparent Data Encpryption in Intranet Data Leakage Prevention.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009


  Loading...