Wei You

Orcid: 0000-0003-1009-6627

Affiliations:
  • Renmin University of China, School of Information, Beijing, China
  • Purdue University, Department of Computer Science, West Lafayette, IN, USA (2017 - 2019)
  • Indiana University, School of Informatics and Computing, Bloomington, IN, USA (2016 - 2017)
  • Renmin University of China, Beijing, China (PhD 2016)


According to our database1, Wei You authored at least 35 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
BridgeRouter: Automated Capability Upgrading of Out-Of-Bounds Write Vulnerabilities to Arbitrary Memory Write Primitives in the Linux Kernel.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
Toward Unbiased Multiple-Target Fuzzing with Path Diversity.
Proceedings of the 33rd USENIX Security Symposium, 2024

SICode: Embedding-Based Subgraph Isomorphism Identification for Bug Detection.
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024

Define-Use Guided Path Exploration for Better Forced Execution.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

FuzzInMem: Fuzzing Programs via In-memory Structures.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Raisin: Identifying Rare Sensitive Functions for Bug Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering.
IEEE Trans. Software Eng., April, 2023

AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering.
Proceedings of the 32nd USENIX Security Symposium, 2023

Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts.
IEEE Trans. Computers, 2022

NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices.
Cybersecur., 2022

Hunting bugs with accelerated optimal graph vertex matching.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

TensileFuzz: facilitating seed input generation in fuzzing via string constraint solving.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

2021
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching.
IEEE Trans. Inf. Forensics Secur., 2021

Detecting the Capacitance-Based Gamepad for Protecting Mobile Game Fairness.
IEEE Trans. Computers, 2021

Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.
Proceedings of the 30th USENIX Security Symposium, 2021

OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices.
IEEE Trans. Dependable Secur. Comput., 2020

PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Finding client-side business flow tampering vulnerabilities.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation.
Proc. ACM Program. Lang., 2019

ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

SLF: fuzzing without valid seed inputs.
Proceedings of the 41st International Conference on Software Engineering, 2019

2017
一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation).
计算机科学, 2017

SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter.
Proceedings of the 25th International Conference on World Wide Web, 2016

Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices.
Proceedings of the 38th International Conference on Software Engineering, 2016

AntMiner: mining more bugs by reducing noise interference.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Android Implicit Information Flow Demystified.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Scriptless Timing Attacks on Web Browser Privacy.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2011
Detecting stealthy malware with inter-structure and imported signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011


  Loading...