Author of the publication

The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors.

, , , , , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeepInfer: Deep Type Inference from Smart Contract Bytecode., , , , , and . ESEC/SIGSOFT FSE, page 745-757. ACM, (2023)Detecting concurrency vulnerabilities based on partial orders of memory and thread events., , , , and . ESEC/SIGSOFT FSE, page 280-291. ACM, (2021)What did you pack in my app? a systematic analysis of commercial Android packers., , , , , , , and . ESEC/SIGSOFT FSE, page 1430-1440. ACM, (2022)DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2286-2303 (2022)Boros: Secure and Efficient Off-Blockchain Transactions via Payment Channel Hub., , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 407-421 (2023)A survey of Intel SGX and its applications., , , , , , and . Frontiers Comput. Sci., 15 (3): 153808 (2021)SOTER: Guarding Black-box Inference for General Neural Networks at the Edge., , , , , , , , , and 2 other author(s). USENIX Annual Technical Conference, page 723-738. USENIX Association, (2022)Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features., , , , , , and . ISSTA, page 917-928. ACM, (2023)SelfAPR: Self-supervised Program Repair with Test Execution Diagnostics., , , , and . ASE, page 92:1-92:13. ACM, (2022)Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps., , , , , , , and . ICSE, page 1583-1595. IEEE, (2023)