Follow
Daoyuan Wu
Daoyuan Wu
HKUST; NTU; CUHK; SMU; PolyU
Verified email at cse.ust.hk - Homepage
Title
Cited by
Cited by
Year
Gptscan: Detecting logic vulnerabilities in smart contracts by combining gpt with program analysis
Y Sun, D Wu, Y Xue, H Liu, H Wang, Z Xu, X Xie, Y Liu
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
722024
On the accuracy of smartphone-based mobile network measurement
W Li, RKP Mok, D Wu, RKC Chang
2015 IEEE Conference on Computer Communications (INFOCOM), 370-378, 2015
452015
Analyzing Android Browser Apps for file:// Vulnerabilities
D Wu, RKC Chang
Information Security Conference (ISC), 345-363, 2014
382014
LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning
Y Sun, D Wu, Y Xue, H Liu, W Ma, L Zhang, M Shi, Y Liu
arXiv preprint arXiv:2401.16185, 2024
342024
On extracting specialized code abilities from large language models: A feasibility study
Z Li, C Wang, P Ma, C Liu, S Wang, D Wu, C Gao, Y Liu
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
33*2024
MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance
D Wu, RKC Chang, W Li, EKT Cheng, D Gao
2017 USENIX Annual Technical Conference (ATC 17), 445-457, 2017
33*2017
Understanding open ports in Android applications: Discovery, diagnosis, and security assessment
D Wu, D Gao, RKC Chang, E He, EKT Cheng, RH Deng
NDSS, 2019
322019
Measuring the declared SDK versions and their consistency with API calls in Android apps
D Wu, X Liu, J Xu, D Lo, D Gao
Wireless Algorithms, Systems, and Applications: 12th International …, 2017
272017
SCLib: A practical and lightweight defense against component hijacking in Android applications
D Wu, Y Cheng, D Gao, Y Li, RH Deng
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
25*2018
Towards understanding Android system vulnerabilities: techniques and insights
D Wu, D Gao, EKT Cheng, Y Cao, J Jiang, RH Deng
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
242019
Indirect File Leaks in Mobile Applications
D Wu, RKC Chang
IEEE Mobile Security Technologies (MoST), in conjunction with S&P (Oakland) 2015, 2015
242015
Split and merge: Aligning position biases in large language model based evaluators
Z Li, C Wang, P Ma, D Wu, S Wang, C Gao, Y Liu
arXiv preprint arXiv:2310.01432, 2023
232023
Deep-learning–based app sensitive behavior surveillance for Android powered cyber–physical systems
H Ma, J Tian, K Qiu, D Lo, D Gao, D Wu, C Jia, T Baker
IEEE Transactions on Industrial Informatics 17 (8), 5840-5850, 2020
182020
A sink-driven approach to detecting exposed component vulnerabilities in android apps
D Wu, X Luo, RKC Chang
arXiv preprint arXiv:1405.6282, 2014
182014
Towards dynamically monitoring android applications on non-rooted devices in the wild
X Tang, Y Lin, D Wu, D Gao
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
172018
When program analysis meets bytecode search: Targeted and efficient inter-procedural analysis of modern Android apps in BackDroid
D Wu, D Gao, RH Deng, CR KC
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
162021
Stack layout randomization with minimal rewriting of Android binaries
Y Liang, X Ma, D Wu, X Tang, D Gao, G Peng, C Jia, H Zhang
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
162016
Toward accurate network delay measurement on android phones
W Li, D Wu, RKC Chang, RKP Mok
IEEE Transactions on Mobile Computing 17 (3), 717-732, 2017
142017
On the usability (in) security of in-app browsing interfaces in mobile apps
Z Zhang, D Wu, L Li, D Gao
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
132021
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects
X Yi, Y Fang, D Wu, L Jiang
NDSS, 2023
122023
The system can't perform the operation now. Try again later.
Articles 1–20