default search action
Debin Gao
Person information
- affiliation: Singapore Management University, Singapore
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Yan Lin, Trisha Singhal, Debin Gao, David Lo:
Analyzing and revivifying function signature inference using deep learning. Empir. Softw. Eng. 29(3): 69 (2024) - [c73]Zicheng Zhang, Haoyu Ma, Daoyuan Wu, Debin Gao, Xiao Yi, Yufan Chen, Yan Wu, Lingxiao Jiang:
MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search. EuroS&P 2024: 724-740 - [c72]Haoxin Tu, Lingxiao Jiang, Debin Gao, He Jiang:
Beyond a Joke: Dead Code Elimination Can Delete Live Code. NIER@ICSE 2024: 32-36 - [c71]Jiakun Liu, Zicheng Zhang, Xing Hu, Ferdian Thung, Shahar Maoz, Debin Gao, Eran Toch, Zhipeng Zhao, David Lo:
MiniMon: Minimizing Android Applications with Intelligent Monitoring-Based Debloating. ICSE 2024: 206:1-206:13 - [c70]Ferdian Thung, Jiakun Liu, Pattarakrit Rattanukul, Shahar Maoz, Eran Toch, Debin Gao, David Lo:
Towards Speedy Permission-Based Debloating for Android Apps. MOBILESoft@ICSE 2024: 84-87 - [c69]Yan Lin, Joshua Wong, Xiang Li, Haoyu Ma, Debin Gao:
Peep With A Mirror: Breaking The Integrity of Android App Sandboxing via Unprivileged Cache Side Channel. USENIX Security Symposium 2024 - [e3]Jianying Zhou, Tony Q. S. Quek, Debin Gao, Alvaro A. Cárdenas:
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2024, Singapore, July 1-5, 2024. ACM 2024 [contents] - 2023
- [c68]Maliha Ismail, Yan Lin, DongGyun Han, Debin Gao:
BinAlign: Alignment Padding Based Compiler Provenance Recovery. ACISP 2023: 609-629 - [c67]Ziyi Lin, Jinku Li, Bowen Li, Haoyu Ma, Debin Gao, Jianfeng Ma:
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis. CCS 2023: 2725-2739 - [c66]Jiakun Liu, Xing Hu, Ferdian Thung, Shahar Maoz, Eran Toch, Debin Gao, David Lo:
AutoDebloater: Automated Android App Debloating. ASE 2023: 2090-2093 - [c65]Jianwen Tian, Kefan Qiu, Debin Gao, Zhi Wang, Xiaohui Kuang, Gang Zhao:
Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks. USENIX Security Symposium 2023: 2689-2706 - [c64]Yan Lin, Joshua Wong, Debin Gao:
FA3: Fine-Grained Android Application Analysis. HotMobile 2023: 74-80 - 2022
- [j10]Haoyu Ma, Jianwen Tian, Debin Gao, Chunfu Jia:
On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping. IEEE Trans. Dependable Secur. Comput. 19(5): 3257-3270 (2022) - [j9]Haoyu Ma, Shijia Li, Debin Gao, Chunfu Jia:
Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture. IEEE Trans. Dependable Secur. Comput. 19(5): 3271-3285 (2022) - [j8]Haoyu Ma, Shijia Li, Debin Gao, Daoyuan Wu, Qiaowen Jia, Chunfu Jia:
Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing. IEEE Trans. Dependable Secur. Comput. 19(5): 3508-3520 (2022) - [c63]Yan Lin, Debin Gao, David Lo:
ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge. CODASPY 2022: 107-118 - [c62]Mulin Duan, Lingxiao Jiang, Lwin Khin Shar, Debin Gao:
UIPDroid: Unrooted Dynamic Monitor of Android App UIs for Fine-Grained Permission Control. ICSE-Companion 2022: 227-231 - [c61]Shijia Li, Chunfu Jia, Pengda Qiu, Qiyuan Chen, Jiang Ming, Debin Gao:
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators. NDSS 2022 - [i8]Zicheng Zhang, Daoyuan Wu, Lixiang Li, Debin Gao:
On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps. CoRR abs/2209.01568 (2022) - 2021
- [j7]Daoyuan Wu, Debin Gao, David Lo:
Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls. Empir. Softw. Eng. 26(1): 7 (2021) - [j6]Haoyu Ma, Jianwen Tian, Kefan Qiu, David Lo, Debin Gao, Daoyuan Wu, Chunfu Jia, Thar Baker:
Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems. IEEE Trans. Ind. Informatics 17(8): 5840-5850 (2021) - [c60]Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky K. C. Chang:
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid. DSN 2021: 543-554 - [c59]Tamir Mendel, Debin Gao, David Lo, Eran Toch:
An Exploratory Study of Social Support Systems to Help Older Adults in Managing Mobile Safety. MobileHCI 2021: 30:1-30:13 - [c58]Yan Lin, Debin Gao:
When Function Signature Recovery Meets Compiler Optimization. SP 2021: 36-52 - [e2]Debin Gao, Qi Li, Xiaohong Guan, Xiaofeng Liao:
Information and Communications Security - 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12918, Springer 2021, ISBN 978-3-030-86889-5 [contents] - [e1]Debin Gao, Qi Li, Xiaohong Guan, Xiaofeng Liao:
Information and Communications Security - 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12919, Springer 2021, ISBN 978-3-030-88051-4 [contents] - 2020
- [c57]Haoyu Ma, Jianwen Tian, Debin Gao, Chunfu Jia:
Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel. ISC 2020: 178-195 - [i7]Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky K. C. Chang:
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid. CoRR abs/2005.11527 (2020)
2010 – 2019
- 2019
- [j5]Zhiyuan Wan, Lingfeng Bao, Debin Gao, Eran Toch, Xin Xia, Tamir Mendel, David Lo:
AppMoD: Helping Older Adults Manage Mobile Security with Online Social Help. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4): 154:1-154:22 (2019) - [c56]Xiaoyang Cheng, Yan Lin, Debin Gao, Chunfu Jia:
DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping. ACNS 2019: 155-174 - [c55]Yan Lin, Xiaoyang Cheng, Debin Gao:
Control-Flow Carrying Code. AsiaCCS 2019: 3-14 - [c54]Daoyuan Wu, Debin Gao, Eric K. T. Cheng, Yichen Cao, Jintao Jiang, Robert H. Deng:
Towards Understanding Android System Vulnerabilities: Techniques and Insights. AsiaCCS 2019: 295-306 - [c53]Shiwei Zhang, Weichao Li, Daoyuan Wu, Bo Jin, Rocky K. C. Chang, Debin Gao, Yi Wang, Ricky K. P. Mok:
An empirical study of mobile network behavior and application performance in the wild. IWQoS 2019: 4:1-4:10 - [c52]Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, Eric K. T. Cheng, Robert H. Deng:
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment. NDSS 2019 - [c51]Jehyun Lee, Akshaya Venkateswara Raja, Debin Gao:
SplitSecond: Flexible Privilege Separation of Android Apps. PST 2019: 1-10 - [i6]Daoyuan Wu, Debin Gao, David Lo:
Scalable Online Vetting of Android Apps for Measuring Declared SDK Versions and Their Consistency with API Calls. CoRR abs/1912.12982 (2019) - 2018
- [c50]Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng:
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. CODASPY 2018: 299-306 - [c49]Tien-Duy B. Le, Lingfeng Bao, David Lo, Debin Gao, Li Li:
Towards Mining Comprehensive Android Sandboxes. ICECCS 2018: 51-60 - [c48]Xiaoxiao Tang, Yan Lin, Daoyuan Wu, Debin Gao:
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild. WISEC 2018: 212-223 - [i5]Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng:
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. CoRR abs/1801.04372 (2018) - 2017
- [c47]Yan Lin, Xiaoxiao Tang, Debin Gao:
SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow Hijacking. ACISP (2) 2017: 95-112 - [c46]Weijie Liu, Debin Gao, Michael K. Reiter:
On-Demand Time Blurring to Support Side-Channel Defense. ESORICS (2) 2017: 210-228 - [c45]Akshaya Venkateswara Raja, Jehyun Lee, Debin Gao:
On Return Oriented Programming Threats in Android Runtime. PST 2017: 259-267 - [c44]Daoyuan Wu, Rocky K. C. Chang, Weichao Li, Eric K. T. Cheng, Debin Gao:
MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance. USENIX ATC 2017: 445-457 - [c43]Daoyuan Wu, Ximing Liu, Jiayun Xu, David Lo, Debin Gao:
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps. WASA 2017: 678-690 - [i4]Daoyuan Wu, Ximing Liu, Jiayun Xu, David Lo, Debin Gao:
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps. CoRR abs/1702.04872 (2017) - [i3]Daoyuan Wu, Rocky K. C. Chang, Weichao Li, Eric K. T. Cheng, Debin Gao:
MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance. CoRR abs/1703.07551 (2017) - 2016
- [j4]Lina Wang, Weijie Liu, Neeraj Kumar, Debiao He, Cheng Tan, Debin Gao:
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm. Secur. Commun. Networks 9(16): 3543-3557 (2016) - [j3]Haoyu Ma, Ruiqi Li, Xiaoxu Yu, Chunfu Jia, Debin Gao:
Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation. IEEE Trans. Inf. Forensics Secur. 11(10): 2322-2337 (2016) - [c42]Marco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, Mustaque Ahamad:
MobiPot: Understanding Mobile Telephony Threats with Honeycards. AsiaCCS 2016: 723-734 - [c41]Xiaoxiao Tang, Yu Liang, Xinjie Ma, Yan Lin, Debin Gao:
On the Effectiveness of Code-Reuse-Based Android Application Obfuscation. ICISC 2016: 333-349 - [c40]Yan Lin, Xiaoxiao Tang, Debin Gao, Jianming Fu:
Control Flow Integrity Enforcement with Dynamic Code Optimization. ISC 2016: 366-385 - [i2]Daoyuan Wu, Debin Gao, Yingjiu Li, Robert H. Deng:
SecComp: Towards Practically Defending Against Component Hijacking in Android Applications. CoRR abs/1609.03322 (2016) - [i1]Daoyuan Wu, Weichao Li, Rocky K. C. Chang, Debin Gao:
MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic. CoRR abs/1610.01282 (2016) - 2015
- [c39]Haoyu Ma, Kangjie Lu, Xinjie Ma, Haining Zhang, Chunfu Jia, Debin Gao:
Software Watermarking using Return-Oriented Programming. AsiaCCS 2015: 369-380 - [c38]Peng Li, Debin Gao, Michael K. Reiter:
Replica Placement for Availability in the Worst Case. ICDCS 2015: 599-608 - [c37]Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang:
Stack Layout Randomization with Minimal Rewriting of Android Binaries. ICISC 2015: 229-245 - 2014
- [j2]Peng Li, Debin Gao, Michael K. Reiter:
StopWatch: A Cloud Architecture for Timing Channel Mitigation. ACM Trans. Inf. Syst. Secur. 17(2): 8:1-8:28 (2014) - [c36]Kangjie Lu, Siyang Xiong, Debin Gao:
RopSteg: program steganography with return oriented programming. CODASPY 2014: 265-272 - [c35]Chee Meng Tey, Payas Gupta, Kartik Muralidharan, Debin Gao:
Keystroke biometrics: the user perspective. CODASPY 2014: 289-296 - [c34]Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin Gao, Chunfu Jia:
Control Flow Obfuscation Using Neural Network to Fight Concolic Testing. SecureComm (1) 2014: 287-304 - 2013
- [c33]Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou:
Launching Generic Attacks on iOS with Approved Third-Party Applications. ACNS 2013: 272-289 - [c32]Chee Meng Tey, Payas Gupta, Debin Gao, Yan Zhang:
Keystroke Timing Analysis of on-the-fly Web Apps. ACNS 2013: 405-413 - [c31]Payas Gupta, Swapna Gottipati, Jing Jiang, Debin Gao:
Your love is public now: questioning the use of personal information in authentication. AsiaCCS 2013: 49-60 - [c30]Peng Li, Debin Gao, Michael K. Reiter:
Mitigating access-driven timing channels in clouds using StopWatch. DSN 2013: 1-12 - [c29]Chee Meng Tey, Debin Gao:
Defending against Heap Overflow by Using Randomization in Nested Virtual Clusters. ICICS 2013: 1-16 - [c28]Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, Robert H. Deng:
Comparing Mobile Privacy Protection through Cross-Platform Applications. NDSS 2013 - [c27]Chee Meng Tey, Payas Gupta, Debin Gao:
I can be You: Questioning the use of Keystroke Dynamics as Biometrics. NDSS 2013 - 2012
- [c26]Simon Andrew Williamson, Pradeep Varakantham, Ong Chen Hui, Debin Gao:
Active malware analysis using stochastic games. AAMAS 2012: 29-36 - [c25]Payas Gupta, Xuhua Ding, Debin Gao:
Coercion resistance in authentication responsibility shifting. AsiaCCS 2012: 97-98 - [c24]Tiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason I. Hong, Adrian Perrig, Debin Gao:
OTO: online trust oracle for user-centric trust establishment. CCS 2012: 391-403 - [c23]Jiang Ming, Meng Pan, Debin Gao:
iBinHunt: Binary Hunting with Inter-procedural Control Flow. ICISC 2012: 92-109 - [c22]Lei Zhao, Debin Gao, Lina Wang:
Learning Fine-Grained Structured Input for Memory Corruption Detection. ISC 2012: 151-167 - [c21]Payas Gupta, Tan Kiat Wee, Narayan Ramasubbu, David Lo, Debin Gao, Rajesh Krishna Balan:
HuMan: Creating memorable fingerprints of mobile users. PerCom Workshops 2012: 479-482 - 2011
- [c20]Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao:
deRop: removing return-oriented programming from malware. ACSAC 2011: 363-372 - [c19]Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao:
Linear Obfuscation to Combat Symbolic Execution. ESORICS 2011: 210-226 - [c18]Jiang Ming, Haibin Zhang, Debin Gao:
Towards ground truthing observations in gray-box anomaly detection. NSS 2011: 25-32 - [c17]Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao:
Packed, Printable, and Polymorphic Return-Oriented Programming. RAID 2011: 101-120 - [c16]Jin Han, Qiang Yan, Robert H. Deng, Debin Gao:
On Detection of Erratic Arguments. SecureComm 2011: 172-189 - [c15]Limin Liu, Jin Han, Debin Gao, Jiwu Jing, Daren Zha:
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables. TrustCom 2011: 37-44 - 2010
- [c14]Jin Han, Meng Pan, Debin Gao, HweeHwa Pang:
A multi-user steganographic file system on untrusted shared storage. ACSAC 2010: 317-326 - [c13]Zhi Wang, Renquan Cheng, Debin Gao:
Revisiting Address Space Randomization. ICISC 2010: 207-221 - [c12]Peng Li, Limin Liu, Debin Gao, Michael K. Reiter:
On Challenges in Evaluating Malware Clustering. RAID 2010: 238-255 - [c11]Payas Gupta, Debin Gao:
Fighting Coercion Attacks in Key Generation using Skin Conductance. USENIX Security Symposium 2010: 469-484
2000 – 2009
- 2009
- [j1]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song:
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. IEEE Trans. Dependable Secur. Comput. 6(2): 96-110 (2009) - [c10]Jin Han, Debin Gao, Robert H. Deng:
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. DIMVA 2009: 127-146 - [c9]Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia:
Denial-of-Service Attacks on Host-Based Generic Unpackers. ICICS 2009: 241-253 - [c8]Peng Li, Debin Gao, Michael K. Reiter:
Automatically Adapting a Trained Anomaly Detector to Software Patches. RAID 2009: 142-160 - 2008
- [c7]Peng Li, Hyundo Park, Debin Gao, Jianming Fu:
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection. ACSAC 2008: 392-401 - [c6]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song:
BinHunt: Automatically Finding Semantic Differences in Binary Programs. ICICS 2008: 238-255 - [c5]Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng:
Distinguishing between FE and DDoS Using Randomness Check. ISC 2008: 131-145 - 2006
- [c4]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song:
Behavioral Distance Measurement Using Hidden Markov Models. RAID 2006: 19-40 - 2005
- [c3]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song:
Behavioral Distance for Intrusion Detection. RAID 2005: 63-81 - 2004
- [c2]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song:
Gray-box extraction of execution graphs for anomaly detection. CCS 2004: 318-329 - [c1]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song:
On Gray-Box Program Tracking for Anomaly Detection. USENIX Security Symposium 2004: 103-118
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint