Publications

Understanding Security Issues in the NFT Ecosystem. Proceedings of the ACM Conference on Computer and Communications Security (CCS),  2022.

PDF Cite

Sailfish: Vetting Smart Contract State-Inconsistency Bugs in Seconds. Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P),  2022.

PDF Cite Code Slides Teaser

Hybrid Pruning: Towards Precise Pointer and Taint Analysis. Proceedings of the Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA),  2022.

PDF Cite

Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices. Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P),  2021.

PDF Cite Code Slides Teaser Video

PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary. Proceedings of the Network and Distributed System Security Symposium (NDSS),  2019.

PDF Cite Code Slides Video

PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary. BlackHat USA,  2019.

Cite Video

BootStomp: On the Security of Bootloaders in Mobile Devices. Proceedings of the USENIX Security Symposium (USENIX),  2017.

PDF Cite Code Slides Video

BootStomp: On the Security of Bootloaders in Mobile Devices. Chaos Communication Congress (CCC),  2017.

Cite Video

Constant Size Ring Signature Without Random Oracle. Proceedings of the Australasian Conference on Information Security and Privacy (ACISP),  2015.

PDF Cite Slides

An example conference paper. In ICW.

PDF Cite Project Slides