Follow
Lannan Lisa Luo
Title
Cited by
Cited by
Year
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014
2292014
Neural machine translation inspired binary code similarity comparison beyond function pairs
F Zuo, X Li, P Young, L Luo, Q Zeng, Z Zhang
Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), 2019
1632019
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
902017
Repackage-proofing Android Apps
L Luo, Y Fu, D Wu, S Zhu, P Liu
Proceedings of the 46th Annual IEEE/IFIP International Conference on …, 2016
412016
Touch well before use: Intuitive and secure authentication for iot devices
X Li, F Yan, F Zuo, Q Zeng, L Luo
The 25th annual international conference on mobile computing and networking …, 2019
402019
A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis
K Redmond, L Luo, Q Zeng
The NDSS Workshop on Binary Analysis Research (BAR), 2019
392019
Resilient decentralized android application repackaging detection using logic bombs
Q Zeng, L Luo, Z Qian, X Du, Z Li
Proceedings of the 2018 International Symposium on Code Generation and …, 2018
342018
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
34*2017
A multiversion programming inspired approach to detecting audio adversarial examples
Q Zeng, J Su, C Fu, G Kayas, L Luo
Proceedings of the 49th IEEE/IFIP International Conference on Dependable …, 2019
332019
Integrating BIMserver and OpenStudio for energy efficient building
N Yu, Y Jiang, L Luo, S Lee, A Jallow, D Wu, JI Messner, RM Leicht, J Yen
Computing in Civil Engineering (2013), 516-523, 2013
312013
T2pair: Secure and usable pairing for heterogeneous iot devices
X Li, Q Zeng, L Luo, T Luo
Proceedings of the 2020 acm sigsac conference on computer and communications …, 2020
302020
Pfirewall: Semantics-aware customizable data flow control for home automation systems
H Chi, Q Zeng, X Du, L Luo
arXiv preprint arXiv:1910.07987, 2019
232019
Solminer: mining distinct solutions in programs
L Luo, Q Zeng
Proceedings of the 38th International Conference on Software Engineering …, 2016
182016
Exploiting the inherent limitation of l0 adversarial examples
F Zuo, B Yang, X Li, L Luo, Q Zeng
The 22nd International Symposium on Research in Attacks, Intrusions and …, 2019
13*2019
Resilient user-side android application repackaging and tampering detection using cryptographically obfuscated logic bombs
Q Zeng, L Luo, Z Qian, X Du, Z Li, CT Huang, C Farkas
IEEE Transactions on Dependable and Secure Computing 18 (6), 2582-2600, 2019
122019
Tainting-assisted and context-migrated symbolic execution of Android framework for vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
IEEE Transactions on Mobile Computing 19 (12), 2946-2964, 2019
92019
PFirewall: Semantics-aware customizable data flow control for smart home privacy protection
H Chi, Q Zeng, X Du, L Luo
arXiv preprint arXiv:2101.10522, 2021
72021
HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding
Q Zeng, G Kayas, E Mohammed, L Luo, X Du, J Rhee
Proceedings of the 49th Annual IEEE/IFIP International Conference on …, 2019
6*2019
Westworld: Fuzzing-assisted remote dynamic symbolic execution of smart apps on iot cloud platforms
L Luo, Q Zeng, B Yang, F Zuo, J Wang
Annual Computer Security Applications Conference, 982-995, 2021
52021
Heap memory snapshot assisted program analysis for android permission specification
L Luo
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20