


Остановите войну!
for scientists:


default search action
Purui Su
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Yi He, Yacong Gu, Purui Su
, Kun Sun
, Yajin Zhou
, Zhi Wang, Qi Li
:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. IEEE Trans. Dependable Secur. Comput. 20(2): 1609-1623 (2023) - 2022
- [c39]Jia Yan
, Ming Wan
, Xiangkun Jia
, Lingyun Ying
, Purui Su
, Zhanyi Wang
:
DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection. ACSAC 2022: 227-239 - [c38]Yuanping Yu
, Xiangkun Jia
, Yuwei Liu
, Yanhao Wang
, Qian Sang
, Chao Zhang, Purui Su
:
HTFuzz: Heap Operation Sequence Sensitive Fuzzing. ASE 2022: 53:1-53:13 - [c37]Peng Xu, Yanhao Wang, Hong Hu, Purui Su:
COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation. NDSS 2022 - [c36]Jia Yan, Xiangkun Jia, Lingyun Ying, Purui Su:
Understanding and Mitigating Label Bias in Malware Classification: An Empirical Study. QRS 2022: 492-503 - [c35]Liang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang:
FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries. USENIX Security Symposium 2022: 2497-2512 - [i1]Yi He, Yacong Gu, Purui Su, Kun Sun, Yajin Zhou, Zhi Wang, Qi Li:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. CoRR abs/2203.09374 (2022) - 2021
- [c34]Yuwei Liu
, Yanhao Wang, Purui Su, Yuanping Yu, Xiangkun Jia:
InstruGuard: Find and Fix Instrumentation Errors for Coverage-based Greybox Fuzzing. ASE 2021: 568-580 - 2020
- [j5]Jia Yan, Lei Shi
, Jun Tao
, Xiaolong Yu
, Zhou Zhuang, Congcong Huang, Rulei Yu, Purui Su, Chaoli Wang
, Yang Chen
:
Visual Analysis of Collective Anomalies Using Faceted High-Order Correlation Graphs. IEEE Trans. Vis. Comput. Graph. 26(7): 2517-2534 (2020) - [c33]Yanhao Wang, Xiangkun Jia, Yuwei Liu, Kyle Zeng, Tiffany Bao, Dinghao Wu, Purui Su:
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization. NDSS 2020 - [c32]Yan Cai, Yutian Tang, Haicheng Li, Le Yu, Hao Zhou, Xiapu Luo, Liang He, Purui Su:
Resource Race Attacks on Android. SANER 2020: 47-58
2010 – 2019
- 2019
- [c31]Zheng Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, Purui Su:
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics. NDSS 2019 - [c30]Yan Cai, Biyun Zhu, Ruijie Meng, Hao Yun, Liang He, Purui Su, Bin Liang:
Detecting concurrency memory corruption vulnerabilities. ESEC/SIGSOFT FSE 2019: 706-717 - [c29]Yanhao Wang, Zheng Leong Chua, Yuwei Liu
, Purui Su, Zhenkai Liang:
Fuzzing Program Logic Deeply Hidden in Binary Program Stages. SANER 2019: 105-116 - 2018
- [c28]Jun Tao, Lei Shi, Zhou Zhuang, Congcong Huang, Rulei Yu, Purui Su, Chaoli Wang, Yang Chen:
Visual Analysis of Collective Anomalies Through High-Order Correlation Graph. PacificVis 2018: 150-159 - [c27]Wenbo Guo
, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing:
LEMNA: Explaining Deep Learning based Security Applications. CCS 2018: 364-379 - [c26]Yemian Lu, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, Wei Guo:
A Comprehensive Study of Permission Usage on Android. NSS 2018: 64-79 - 2017
- [j4]Qi Li
, Patrick P. C. Lee
, Peng Zhang, Purui Su, Liang He, Kui Ren:
Capability-Based Security Enforcement in Named Data Networking. IEEE/ACM Trans. Netw. 25(5): 2719-2730 (2017) - [c25]Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng:
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. DSN 2017: 427-438 - [c24]Lang Liu, Yacong Gu, Qi Li, Purui Su:
RealDroid: Large-Scale Evasive Malware Detection on "Real Devices". ICCCN 2017: 1-8 - [c23]Liang He, Yan Cai, Hong Hu, Purui Su, Zhenkai Liang
, Yi Yang, Huafeng Huang, Jia Yan, Xiangkun Jia, Dengguo Feng:
Automatically assessing crashes from heap overflows. ASE 2017: 274-279 - [c22]Xiangkun Jia, Chao Zhang, Purui Su, Yi Yang, Huafeng Huang, Dengguo Feng:
Towards Efficient Heap Overflow Discovery. USENIX Security Symposium 2017: 989-1006 - 2016
- [j3]Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng:
Direct Resource Hijacking in Android. IEEE Internet Comput. 20(5): 46-56 (2016) - [c21]Lingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, Dengguo Feng:
Attacks and Defence on Android Free Floating Windows. AsiaCCS 2016: 759-770 - [c20]Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, Purui Su:
Exploiting Android System Services Through Bypassing Service Helpers. SecureComm 2016: 44-62 - 2015
- [j2]Qi Li, Xinwen Zhang, Xin Zhang, Purui Su:
Invalidating Idealized BGP Security Proposals and Countermeasures. IEEE Trans. Dependable Secur. Comput. 12(3): 298-311 (2015) - [c19]Minghua Wang, Heng Yin
, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng:
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries. ACSAC 2015: 331-340 - [c18]Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, Dengguo Feng:
A Rapid and Scalable Method for Android Application Repackaging Detection. ISPEC 2015: 349-364 - [c17]Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng:
Xede: Practical Exploit Early Detection. RAID 2015: 198-221 - 2014
- [c16]Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong, Dengguo Feng:
Revisiting Node Injection of P2P Botnet. NSS 2014: 124-137 - [c15]Yao Cheng, Chang Xu, Yi Yang, Lingyun Ying, Purui Su, Dengguo Feng:
Automated User Profiling in Location-Based Mobile Messaging Applications. TrustCom 2014: 18-26 - [c14]Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Dengguo Feng:
Long Term Tracking and Characterization of P2P Botnet. TrustCom 2014: 244-251 - 2013
- [c13]Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, Dengguo Feng:
Bind your phone number with caution: automated user profiling through address book matching on smartphone. AsiaCCS 2013: 335-340 - [c12]Liang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang, Huafeng Huang, Huipeng Fang:
OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks. ICICS 2013: 59-74 - [c11]Jun Jiang, Meining Nie, Purui Su, Dengguo Feng:
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing. SecureComm 2013: 122-139 - [c10]Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng:
Automatic Polymorphic Exploit Generation for Software Vulnerabilities. SecureComm 2013: 216-233 - 2012
- [j1]Kai Chen, Dengguo Feng, Purui Su, Yingjun Zhang:
Black-box testing based on colorful taint analysis. Sci. China Inf. Sci. 55(1): 171-183 (2012) - 2010
- [c9]Yi Yang, Lingyun Ying, Rui Wang, Purui Su, Dengguo Feng:
DepSim: A Dependency-Based Malware Similarity Comparison System. Inscrypt 2010: 503-522 - [c8]Jia Xu, Jia Yan, Liang He, Purui Su, Dengguo Feng:
CloudSEC: A Cloud Architecture for Composing Collaborative Security Services. CloudCom 2010: 703-711
2000 – 2009
- 2009
- [c7]Xianggen Wang, Dengguo Feng, Purui Su:
Reconstructing a Packed DLL Binary for Static Analysis. ISPEC 2009: 71-82 - [c6]Lingyun Ying, Purui Su, Dengguo Feng, Xianggen Wang, Yi Yang, Yu Liu:
ReconBin: Reconstructing Binary File from Execution for Software Analysis. SSIRI 2009: 222-229 - 2008
- [c5]Purui Su, Lingyun Ying, Dengguo Feng:
Exploring Malware Behaviors Based on Environment Constitution. CIS (1) 2008: 320-325 - 2007
- [c4]Kai Chen, Purui Su, Yingjun Zhang, Dengguo Feng:
SEPCOM: customizable zero copy model. VALUETOOLS 2007: 37 - 2006
- [c3]Purui Su, Dengguo Feng:
The Design of an Artificial Immune System. ICN/ICONS/MCL 2006: 195 - 2005
- [c2]Haipeng Qu, Purui Su, Dongdai Lin, Dengguo Feng:
A Packet Marking Scheme for IP Traceback. ICN (2) 2005: 964-971 - [c1]Purui Su, Dequan Li, Haipeng Qu, Dengguo Feng:
Detecting the Deviations of Privileged Process Execution. ICN (2) 2005: 980-988
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-09-27 22:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint