What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Dinghao Wu
Google Scholar
30
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/tifs
Enhancing Malware Classification via Self-Similarity Techniques.
Fangtian Zhong
Qin Hu
Yili Jiang
Jiaqi Huang
Cheng Zhang
Dinghao Wu
2024
conf/uss
DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis.
Tianrou Xia
Hong Hu
Dinghao Wu
2023
conf/uss
µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture.
Yongheng Chen
Rui Zhong
Yupeng Yang
Hong Hu
Dinghao Wu
Wenke Lee
2022
journals/tifs
Detecting and Interpreting Changes in Scanning Behavior in Large Network Telescopes.
Michael G. Kallitsis
Rupesh Prajapati
Vasant G. Honavar
Dinghao Wu
John Yen
2022
conf/icics
FuzzBoost: Reinforcement Compiler Fuzzing.
Xiaoting Li
Xiao Liu
Lingwei Chen
Rupesh Prajapati
Dinghao Wu
2021
conf/sp
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation.
Yongheng Chen
Rui Zhong
Hong Hu
Hangfan Zhang
Yupeng Yang
Dinghao Wu
Wenke Lee
2020
conf/ccs
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback.
Rui Zhong
Yongheng Chen
Hong Hu
Hangfan Zhang
Wenke Lee
Dinghao Wu
2020
conf/sp
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN.
Feng Xiao
Jinquan Zhang
Jianwei Huang
Guofei Gu
Dinghao Wu
Peng Liu
2020
conf/eurosp
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries.
Pei Wang
Jinquan Zhang
Shuai Wang
Dinghao Wu
2020
conf/ndss
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Yanhao Wang
Xiangkun Jia
Yuwei Liu
Kyle Zeng
Tiffany Bao
Dinghao Wu
Purui Su
2019
journals/tifs
Xmark: Dynamic Software Watermarking Using Collatz Conjecture.
Haoyu Ma
Chunfu Jia
Shijia Li
Wantong Zheng
Dinghao Wu
2019
conf/ccs
MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus.
Li Wang
Dongpeng Xu
Jiang Ming
Yu Fu
Dinghao Wu
2019
conf/uss
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation.
Shuai Wang
Yuyan Bao
Xiao Liu
Pei Wang
Danfeng Zhang
Dinghao Wu
2018
conf/ccs
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification.
Dongpeng Xu
Jiang Ming
Yu Fu
Dinghao Wu
2017
conf/ccs
Binary Code Retrofitting and Hardening Using SGX.
Shuai Wang
Wenhao Wang
Qinkun Bao
Pei Wang
XiaoFeng Wang
Dinghao Wu
2017
conf/ccs
FEAST 2017: The Second Workshop on Forming an Ecosystem Around Software Transformation.
Taesoo Kim
Dinghao Wu
2017
conf/uss
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking.
Jiang Ming
Dongpeng Xu
Yufei Jiang
Dinghao Wu
2017
conf/uss
CacheD: Identifying Cache-Based Timing Channels in Production Software.
Shuai Wang
Pei Wang
Xiao Liu
Danfeng Zhang
Dinghao Wu
2017
conf/sp
Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping.
Dongpeng Xu
Jiang Ming
Dinghao Wu
2016
conf/eurosp
Translingual Obfuscation.
Pei Wang
Shuai Wang
Jiang Ming
Yufei Jiang
Dinghao Wu
2016
conf/dsn
Repackage-Proofing Android Apps.
Lannan Luo
Yu Fu
Dinghao Wu
Sencun Zhu
Peng Liu
2015
conf/ccs
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Heqing Huang
Kai Chen
Chuangang Ren
Peng Liu
Sencun Zhu
Dinghao Wu
2015
conf/ccs
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code.
Jiang Ming
Dongpeng Xu
Li Wang
Dinghao Wu
2015
conf/uss
Reassembleable Disassembling.
Shuai Wang
Pei Wang
Dinghao Wu
2015
conf/uss
TaintPipe: Pipelined Symbolic Taint Analysis.
Jiang Ming
Dinghao Wu
Gaoyao Xiao
Jun Wang
Peng Liu
2015
conf/sec
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference.
Jiang Ming
Dongpeng Xu
Dinghao Wu
2015
conf/acns
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
Jiang Ming
Zhi Xin
Pengwei Lan
Dinghao Wu
Peng Liu
Bing Mao
2015
conf/dsn
Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities.
Jun Wang
Mingyi Zhao
Qiang Zeng
Dinghao Wu
Peng Liu
2014
conf/wisec
ViewDroid: towards obfuscation-resilient mobile application repackaging detection.
Fangfang Zhang
Heqing Huang
Sencun Zhu
Dinghao Wu
Peng Liu
2012
conf/ndss
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Donghai Tian
Qiang Zeng
Dinghao Wu
Peng Liu
Changzhen Hu
Coauthors
Bing Mao
(1)
Changzhen Hu
(1)
Cheng Zhang
(1)
Chuangang Ren
(1)
Chunfu Jia
(1)
Danfeng Zhang
(2)
Dinghao Wu
(30)
Donghai Tian
(1)
Dongpeng Xu
(6)
Fangfang Zhang
(1)
Fangtian Zhong
(1)
Feng Xiao
(1)
Gaoyao Xiao
(1)
Guofei Gu
(1)
Hangfan Zhang
(2)
Haoyu Ma
(1)
Heqing Huang
(2)
Hong Hu
(4)
Jiang Ming
(9)
Jianwei Huang
(1)
Jiaqi Huang
(1)
Jinquan Zhang
(2)
John Yen
(1)
Jun Wang
(2)
Kai Chen
(1)
Kyle Zeng
(1)
Lannan Luo
(1)
Li Wang
(2)
Lingwei Chen
(1)
Michael G. Kallitsis
(1)
Mingyi Zhao
(1)
Pei Wang
(6)
Peng Liu
(8)
Pengwei Lan
(1)
Purui Su
(1)
Qiang Zeng
(2)
Qin Hu
(1)
Qinkun Bao
(1)
Rui Zhong
(3)
Rupesh Prajapati
(2)
Sencun Zhu
(3)
Shijia Li
(1)
Shuai Wang
(6)
Taesoo Kim
(1)
Tianrou Xia
(1)
Tiffany Bao
(1)
Vasant G. Honavar
(1)
Wantong Zheng
(1)
Wenhao Wang
(1)
Wenke Lee
(3)
Xiangkun Jia
(1)
Xiao Liu
(3)
XiaoFeng Wang
(1)
Xiaoting Li
(1)
Yanhao Wang
(1)
Yili Jiang
(1)
Yongheng Chen
(3)
Yu Fu
(3)
Yufei Jiang
(2)
Yupeng Yang
(2)
Yuwei Liu
(1)
Yuyan Bao
(1)
Zhi Xin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to