Follow
Lannan Lisa Luo
Title
Cited by
Cited by
Year
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014
2752014
Neural machine translation inspired binary code similarity comparison beyond function pairs
F Zuo, X Li, P Young, L Luo, Q Zeng, Z Zhang
Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), 2019
2602019
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
1322017
A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis
K Redmond, L Luo, Q Zeng
The NDSS Workshop on Binary Analysis Research (BAR), 2019
702019
Touch well before use: Intuitive and secure authentication for iot devices
X Li, F Yan, F Zuo, Q Zeng, L Luo
The 25th annual international conference on mobile computing and networking …, 2019
622019
T2pair: Secure and usable pairing for heterogeneous iot devices
X Li, Q Zeng, L Luo, T Luo
Proceedings of the 2020 acm sigsac conference on computer and communications …, 2020
552020
Repackage-proofing Android Apps
L Luo, Y Fu, D Wu, S Zhu, P Liu
Proceedings of the 46th Annual IEEE/IFIP International Conference on …, 2016
492016
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
46*2017
A multiversion programming inspired approach to detecting audio adversarial examples
Q Zeng, J Su, C Fu, G Kayas, L Luo
Proceedings of the 49th IEEE/IFIP International Conference on Dependable …, 2019
442019
Resilient decentralized android application repackaging detection using logic bombs
Q Zeng, L Luo, Z Qian, X Du, Z Li
Proceedings of the 2018 international symposium on code generation and …, 2018
422018
Integrating BIMserver and OpenStudio for energy efficient building
N Yu, Y Jiang, L Luo, S Lee, A Jallow, D Wu, JI Messner, RM Leicht, J Yen
Computing in Civil Engineering (2013), 516-523, 2013
342013
Pfirewall: Semantics-aware customizable data flow control for home automation systems
H Chi, Q Zeng, X Du, L Luo
arXiv preprint arXiv:1910.07987, 2019
322019
PFirewall: Semantics-aware customizable data flow control for smart home privacy protection
H Chi, Q Zeng, X Du, L Luo
arXiv preprint arXiv:2101.10522, 2021
272021
Solminer: mining distinct solutions in programs
L Luo, Q Zeng
Proceedings of the 38th International Conference on Software Engineering …, 2016
242016
Resilient user-side android application repackaging and tampering detection using cryptographically obfuscated logic bombs
Q Zeng, L Luo, Z Qian, X Du, Z Li, CT Huang, C Farkas
IEEE Transactions on Dependable and Secure Computing 18 (6), 2582-2600, 2019
222019
Westworld: Fuzzing-assisted remote dynamic symbolic execution of smart apps on iot cloud platforms
L Luo, Q Zeng, B Yang, F Zuo, J Wang
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
192021
Exploiting the inherent limitation of l0 adversarial examples
F Zuo, B Yang, X Li, Q Zeng
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
17*2019
Tainting-assisted and context-migrated symbolic execution of android framework for vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
IEEE Transactions on Mobile Computing 19 (12), 2946-2964, 2019
152019
No more companion apps hacking but one dongle: Hub-based blackbox fuzzing of iot firmware
X Ma, Q Zeng, H Chi, L Luo
Proceedings of the 21st Annual International Conference on Mobile Systems …, 2023
122023
G2Auth: secure mutual authentication for drone delivery without special user-side hardware
C Wu, X Li, L Luo, Q Zeng
Proceedings of the 20th Annual International Conference on Mobile Systems …, 2022
122022
The system can't perform the operation now. Try again later.
Articles 1–20