Publications

  • PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments

    The 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2016)
    pp. 595-606, 2016

    Chung Hwan Kim , Junghwan Rhee , Kyu Hyung Lee , Xiangyu Zhang , Dongyan Xu
    11/18/2016
  • High Fidelity Data Reduction for Big Data Security Dependency Analyses

    The 23rd ACM Conference on Computer and Communications Security (CCS 2016)
    pp. 504-516, 2016

    Zhang Xu, Zhenyu Wu, Zhichun Li, Xusheng Xiao, Kangkook Jee, Junghwan Rhee, Fengyuan Xu, Haining Wang, Guofei Jiang
    10/28/2016
  • Detecting Stack Layout Corruptions with Robust Stack Unwinding

    The 19th International Symposium on Research in Attacks (RAID 2016)
    Springer Publishing ISBN: 978-3-319-45719-2; pp. 71-94, 2016

    Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang
    09/21/2016
  • Behavior Query Discovery in System-Generated Temporal Graphs

    The 42nd International Conference on Bery Large Data Bases (VLDB 2016)
    Vol. 9, No. 4; pp. 240-251, 2015

    Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifen Yan, Ambuj Singh , Guofei Jiang
    09/09/2016
  • Entity Embedding-based Anomaly Detection for Heterogeneous Categorical Events

    The 25th International Joint Conference on Artificial Intelligence (IJCAI 2016)
    AAAI Press, pp. 1396-1403, 2016

    Ting Chen, Lu-An Tang, Yizhou Sun, Zhengzhang Chen, Kai Zhang
    07/15/2016
  • Integrating Community and Role Detection in Information Networks

    2016 SIAM International Conference on Data Mining (SDM 2016)
    pp. 72-80, 2016

    Ting Chen, NEC Laboratories America, Lu-An Tang, Yizhou Sun, Zhengzhang Chen, Haifeng Chen, Guofei Jiang
    05/07/2016
  • Extract Me If You Can: Abusing PDF Parsers in Malware Detectors

    Proceedings of The Network and Distributed System Security Symposium 2016 (NDSS 2016)
    pp. 1-15, 2016

    Curtis Carmony, Mu Zhang, Xunchao Hu, Abhishek Vasisht Bhaskar, Heng Yin
    02/24/2016
  • Towards Automatic Generation of Security-Centric Descriptions for Android Apps

    Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2015)
    pp. 518-529 - 2015

    Mu Zhang , Yue Duan, Qian Feng , Heng Yin
    11/23/2015
  • SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps

    Proceedings of the 24th USENIX Security Symposium, Washington, DC
    pp. 977-992, 2015

    Jianjun Huang , Zhichun Li , Xusheng Xiao , Zhenyu Wu , Kangjie Lu , Xiangyu Zhang , Guofei Jiang
    08/12/2015
  • AppContext: Differentiating Malicious and Benign Mobile App Behaviors Under Context

    Proceedings of the IEEE/ACM 37th International Conference on Software Engineering (ICSE 2015)
    pp. 303-313, 2015

    Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, William Enck
    05/24/2015
  • Discover and Tame Long-running Idling Processes in Enterprise Systems

    ASIACCS 2015 -- 10th ACM Symposium on Information, Computer and Communications Security , Singapore, China
    ACM 978-1-4503-3245-3/15/04; pp. 543-554, 2015

    Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee , Xia Ning, Peng Liu, Guofei Jiang
    04/15/2015
  • Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting

    NDSS Symposium 2015 -- The 2015 Network and Distributed System Security , San Diego, CA
    Proceedings of the NDSS 2015 Symposium

    Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang
    02/09/2015
  • IntroPerf: Transparent Context-Aware Multi-Layer Performance Inference using System Stack Traces

    Proceedings of The 2014 ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS 2014), Austin, TX
    ACM, New York, NY, pp. 235-247

    Chung Hwan Kim, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Xiangyu Zhang, Dongyan Xu
    06/16/2014
  • DeltaPath: Precise and Scalable Calling Context Encoding

    2014 International Symposium on Code Generation and Optimization (CGO 2014)
    pp. 109-119, 2014

    Qiang Zeng, Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Peng Liu
    02/17/2014
  • Automating Cloud Network Optimization and Evolution

    IEEE Journal on Selected Areas in Communications
    31(12):pp. 2620-2631, 2013

    Zhenyu Wu, Yueping Zhang, Vishal Singh, Guofei Jiang, Haining Wang
    12/01/2013
  • CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities

    Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012)
    ACM, pp. 229-240; 2012

    Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang
    10/16/2012
  • NetDEO: Automating Network Design, Evolution, and Optimization

    Proceedings of the 20th International Workshop on Quality of Serivce (IEEE/ACM IWQoS 2012), Coimbra, Portugal
    2012 IEEE, 978-1-4673-1298-1/12

    Zhenyu Wu, Yueping Zhang, Vishal Singh, Guofei Jiang, Haining Wang
    06/04/2012