Su, Purui
33  results:
Search for persons X
?
2

One Simple API Can Cause Hundreds of Bugs An Analysis of Re..:

, In: Proceedings of the 29th Symposium on Operating Systems Principles,
He, Liang ; Su, Purui ; Zhang, Chao.. - p. 52-65 , 2023
 
?
3

A Systematic Study of Android Non-SDK (Hidden) Service API ..:

He, Yi ; Gu, Yacong ; Su, Purui...
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  2 - p. 1609-1623 , 2023
 
?
4

VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device:

, In: 2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE),
Liu, Yuwei ; Chen, Siqi ; Xie, Yuchong... - p. 1676-1687 , 2023
 
?
5

DitDetector: Bimodal Learning based on Deceptive Image and ..:

, In: Proceedings of the 38th Annual Computer Security Applications Conference,
Yan, Jia ; Wan, Ming ; Jia, Xiangkun... - p. 227-239 , 2022
 
?
6

Understanding and Mitigating Label Bias in Malware Classifi..:

, In: 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS),
Yan, Jia ; Jia, Xiangkun ; Ying, Lingyun.. - p. 492-503 , 2022
 
?
7

HTFuzz: Heap Operation Sequence Sensitive Fuzzing:

, In: Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering,
Yu, Yuanping ; Jia, Xiangkun ; Liu, Yuwei... - p. 1-13 , 2022
 
?
8

InstruGuard : find and fix instrumentation errors for co..:

, In: Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering,
Liu, Yuwei ; Wang, Yanhao ; Su, Purui.. - p. 568-580 , 2021
 
?
9

Resource Race Attacks on Android:

, In: 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER),
Cai, Yan ; Tang, Yutian ; Li, Haicheng... - p. 47-58 , 2020
 
?
10

Visual Analysis of Collective Anomalies Using Faceted High-..:

Yan, Jia ; Shi, Lei ; Tao, Jun...
IEEE Transactions on Visualization and Computer Graphics.  26 (2020)  7 - p. 2517-2534 , 2020
 
?
11

Detecting concurrency memory corruption vulnerabilities:

, In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering,
Cai, Yan ; Zhu, Biyun ; Meng, Ruijie... - p. 706-717 , 2019
 
?
12

LEMNA : Explaining Deep Learning based Security Applicat..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
Guo, Wenbo ; Mu, Dongliang ; Xu, Jun... - p. 364-379 , 2018
 
?
13

A Comprehensive Study of Permission Usage on Android:

, In: Network and System Security; Lecture Notes in Computer Science,
Lu, Yemian ; Li, Qi ; Su, Purui... - p. 64-79 , 2018
 
?
14

Capability-Based Security Enforcement in Named Data Network..:

Li, Qi ; Lee, Patrick P. C. ; Zhang, Peng...
IEEE/ACM Transactions on Networking.  25 (2017)  5 - p. 2719-2730 , 2017
 
?
15

Automatically assessing crashes from heap overflows:

, In: Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering,
He, Liang ; Cai, Yan ; Hu, Hong... - p. 274-279 , 2017
 
1-15