(1) How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack, ISC 2017, 3027, 第 2 作者
(2) System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation, ACM MobiSys 2017, 2017, 第 6 作者
(3) WrapDroid: Flexible and Fine-Grained Policy Enforcement for Android Applications, the 17th Annual International Conference on Information Security and Cryptology(ICISC), 2014, 第 3 作者
(4) Implementing a Covert Timing Channel, The 10th International Conference on Information Security Practice and Experience (ISPEC), 2014, 第 3 作者
(5) Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels, ICICS2013, 2013, 第 3 作者
(6) From Mini House Game to Hobby-driven Behavioral Biometrics-based Password, the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), 2013, 第 3 作者
(7) Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables, the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), 2011, 第 1 作者
(8) On Challenges in Evaluating Malware Clustering, the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), 2010, 第 2 作者
(9) Denial-of-Service Attacks on Host-Based Generic Unpackers, the 11th International Conference on Information and Communications Security (ICICS 2009), 2009, 第 1 作者