Recent years have witnessed explosive growth in blockchain smart contrac...
Despite the success in various scenarios, blockchain systems, especially...
This paper focuses on mobile apps serving the underground economy by
pro...
Vetting security impacts introduced by third-party libraries in iOS apps...
The prosperity of decentralized finance motivates many investors to prof...
Android allows apps to communicate with its system services via system
s...
Mobile apps are extensively involved in cyber-crimes. Some apps are malw...
Embedded devices are becoming popular. Meanwhile, researchers are active...
Dynamic analysis based on the full-system emulator QEMU is widely used f...
Emulator is widely used to build dynamic analysis frameworks due to its
...
Selective data protection is a promising technique to defend against the...
The rapid growth of Decentralized Finance (DeFi) boosts the Ethereum
eco...
Being able to automatically detect the performance issues in apps can
si...
The production of counterfeit money has a long history. It refers to the...
The popularity of Bitcoin benefits a lot from its anonymity. However, th...
Since its debut, SGX has been used in many applications, e.g., secure da...
Flash Loan, as an emerging service in the decentralized finance ecosyste...
As COVID-19 has been spreading across the world since early 2020, a grow...
As the COVID-19 pandemic emerges in early 2020, a number of campaigns ha...
As one of the representative blockchain platforms, Ethereum has attracte...
Code reuse attacks are still big threats to software and system security...
We performed the first systematic study of a new attack on Ethereum to s...
Rowhammer is a hardware-based bug that allows the attacker to modify the...
In this work, we are focusing on a new and yet uncovered way for malicio...