What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Debin Gao
Google Scholar
ORCID:
0000-0001-9412-9961
41
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Density Boosts Everything: A One-stop Strategy for Improving Performance, Robustness, and Sustainability of Malware Detectors.
Jianwen Tian
Wei Kong
Debin Gao
Tong Wang
Taotao Gu
Kefan Qiu
Zhi Wang
Xiaohui Kuang
2024
conf/uss
Peep With A Mirror: Breaking The Integrity of Android App Sandboxing via Unprivileged Cache Side Channel.
Yan Lin
Joshua Wong
Xiang Li
Haoyu Ma
Debin Gao
2024
conf/eurosp
MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search.
Zicheng Zhang
Haoyu Ma
Daoyuan Wu
Debin Gao
Xiao Yi
Yufan Chen
Yan Wu
Lingxiao Jiang
2023
conf/ccs
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis.
Ziyi Lin
Jinku Li
Bowen Li
Haoyu Ma
Debin Gao
Jianfeng Ma
2023
conf/uss
Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks.
Jianwen Tian
Kefan Qiu
Debin Gao
Zhi Wang
Xiaohui Kuang
Gang Zhao
2023
conf/acisp
BinAlign: Alignment Padding Based Compiler Provenance Recovery.
Maliha Ismail
Yan Lin
DongGyun Han
Debin Gao
2022
conf/ndss
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators.
Shijia Li
Chunfu Jia
Pengda Qiu
Qiyuan Chen
Jiang Ming
Debin Gao
2021
conf/sp
When Function Signature Recovery Meets Compiler Optimization.
Yan Lin
Debin Gao
2021
conf/dsn
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
Daoyuan Wu
Debin Gao
Robert H. Deng
Rocky K. C. Chang
2019
conf/ccs
Towards Understanding Android System Vulnerabilities: Techniques and Insights.
Daoyuan Wu
Debin Gao
Eric K. T. Cheng
Yichen Cao
Jintao Jiang
Robert H. Deng
2019
conf/ccs
Control-Flow Carrying Code.
Yan Lin
Xiaoyang Cheng
Debin Gao
2019
conf/acns
DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping.
Xiaoyang Cheng
Yan Lin
Debin Gao
Chunfu Jia
2019
conf/ndss
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
Daoyuan Wu
Debin Gao
Rocky K. C. Chang
En He
Eric K. T. Cheng
Robert H. Deng
2018
conf/wisec
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild.
Xiaoxiao Tang
Yan Lin
Daoyuan Wu
Debin Gao
2017
conf/acisp
SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow Hijacking.
Yan Lin
Xiaoxiao Tang
Debin Gao
2017
conf/esorics
On-Demand Time Blurring to Support Side-Channel Defense.
Weijie Liu
Debin Gao
Michael K. Reiter
2016
journals/tifs
Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation.
Haoyu Ma
Ruiqi Li
Xiaoxu Yu
Chunfu Jia
Debin Gao
2016
conf/ccs
MobiPot: Understanding Mobile Telephony Threats with Honeycards.
Marco Balduzzi
Payas Gupta
Lion Gu
Debin Gao
Mustaque Ahamad
2016
conf/icisc
On the Effectiveness of Code-Reuse-Based Android Application Obfuscation.
Xiaoxiao Tang
Yu Liang
Xinjie Ma
Yan Lin
Debin Gao
2015
conf/ccs
Software Watermarking using Return-Oriented Programming.
Haoyu Ma
Kangjie Lu
Xinjie Ma
Haining Zhang
Chunfu Jia
Debin Gao
2015
conf/icisc
Stack Layout Randomization with Minimal Rewriting of Android Binaries.
Yu Liang
Xinjie Ma
Daoyuan Wu
Xiaoxiao Tang
Debin Gao
Guojun Peng
Chunfu Jia
Huanguo Zhang
2013
conf/ccs
Your love is public now: questioning the use of personal information in authentication.
Payas Gupta
Swapna Gottipati
Jing Jiang
Debin Gao
2013
conf/acns
Keystroke Timing Analysis of on-the-fly Web Apps.
Chee Meng Tey
Payas Gupta
Debin Gao
Yan Zhang
2013
conf/acns
Launching Generic Attacks on iOS with Approved Third-Party Applications.
Jin Han
Su Mon Kywe
Qiang Yan
Feng Bao
Robert H. Deng
Debin Gao
Yingjiu Li
Jianying Zhou
2013
conf/ndss
Comparing Mobile Privacy Protection through Cross-Platform Applications.
Jin Han
Qiang Yan
Debin Gao
Jianying Zhou
Robert H. Deng
2013
conf/ndss
I can be You: Questioning the use of Keystroke Dynamics as Biometrics.
Chee Meng Tey
Payas Gupta
Debin Gao
2013
conf/icics
Defending against Heap Overflow by Using Randomization in Nested Virtual Clusters.
Chee Meng Tey
Debin Gao
2013
conf/dsn
Mitigating access-driven timing channels in clouds using StopWatch.
Peng Li
Debin Gao
Michael K. Reiter
2012
conf/ccs
OTO: online trust oracle for user-centric trust establishment.
Tiffany Hyun-Jin Kim
Payas Gupta
Jun Han
Emmanuel Owusu
Jason I. Hong
Adrian Perrig
Debin Gao
2012
conf/ccs
Coercion resistance in authentication responsibility shifting.
Payas Gupta
Xuhua Ding
Debin Gao
2012
conf/icisc
iBinHunt: Binary Hunting with Inter-procedural Control Flow.
Jiang Ming
Meng Pan
Debin Gao
2011
conf/esorics
Linear Obfuscation to Combat Symbolic Execution.
Zhi Wang
Jiang Ming
Chunfu Jia
Debin Gao
2011
conf/acsac
deRop: removing return-oriented programming from malware.
Kangjie Lu
Dabi Zou
Weiping Wen
Debin Gao
2010
conf/uss
Fighting Coercion Attacks in Key Generation using Skin Conductance.
Payas Gupta
Debin Gao
2010
conf/icisc
Revisiting Address Space Randomization.
Zhi Wang
Renquan Cheng
Debin Gao
2010
conf/acsac
A multi-user steganographic file system on untrusted shared storage.
Jin Han
Meng Pan
Debin Gao
HweeHwa Pang
2009
conf/icics
Denial-of-Service Attacks on Host-Based Generic Unpackers.
Limin Liu
Jiang Ming
Zhi Wang
Debin Gao
Chunfu Jia
2008
conf/icics
BinHunt: Automatically Finding Semantic Differences in Binary Programs.
Debin Gao
Michael K. Reiter
Dawn Xiaodong Song
2008
conf/acsac
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection.
Peng Li
Hyundo Park
Debin Gao
Jianming Fu
2004
conf/ccs
Gray-box extraction of execution graphs for anomaly detection.
Debin Gao
Michael K. Reiter
Dawn Xiaodong Song
2004
conf/uss
On Gray-Box Program Tracking for Anomaly Detection.
Debin Gao
Michael K. Reiter
Dawn Xiaodong Song
Coauthors
Adrian Perrig
(1)
Bowen Li
(1)
Chee Meng Tey
(3)
Chunfu Jia
(7)
Dabi Zou
(1)
Daoyuan Wu
(6)
Dawn Xiaodong Song
(3)
Debin Gao
(41)
DongGyun Han
(1)
Emmanuel Owusu
(1)
En He
(1)
Eric K. T. Cheng
(2)
Feng Bao
(1)
Gang Zhao
(1)
Guojun Peng
(1)
Haining Zhang
(1)
Haoyu Ma
(5)
Huanguo Zhang
(1)
HweeHwa Pang
(1)
Hyundo Park
(1)
Jason I. Hong
(1)
Jianfeng Ma
(1)
Jiang Ming
(4)
Jianming Fu
(1)
Jianwen Tian
(2)
Jianying Zhou
(2)
Jin Han
(3)
Jing Jiang
(1)
Jinku Li
(1)
Jintao Jiang
(1)
Joshua Wong
(1)
Jun Han
(1)
Kangjie Lu
(2)
Kefan Qiu
(2)
Limin Liu
(1)
Lingxiao Jiang
(1)
Lion Gu
(1)
Maliha Ismail
(1)
Marco Balduzzi
(1)
Meng Pan
(2)
Michael K. Reiter
(5)
Mustaque Ahamad
(1)
Payas Gupta
(7)
Peng Li
(2)
Pengda Qiu
(1)
Qiang Yan
(2)
Qiyuan Chen
(1)
Renquan Cheng
(1)
Robert H. Deng
(5)
Rocky K. C. Chang
(2)
Ruiqi Li
(1)
Shijia Li
(1)
Su Mon Kywe
(1)
Swapna Gottipati
(1)
Taotao Gu
(1)
Tiffany Hyun-Jin Kim
(1)
Tong Wang
(1)
Wei Kong
(1)
Weijie Liu
(1)
WeiPing Wen
(1)
Xiang Li
(1)
Xiao Yi
(1)
Xiaohui Kuang
(2)
Xiaoxiao Tang
(4)
Xiaoxu Yu
(1)
Xiaoyang Cheng
(2)
Xinjie Ma
(3)
Xuhua Ding
(1)
Yan Lin
(8)
Yan Wu
(1)
Yan Zhang
(1)
Yichen Cao
(1)
Yingjiu Li
(1)
Yu Liang
(2)
Yufan Chen
(1)
Zhi Wang
(5)
Zicheng Zhang
(1)
Ziyi Lin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to