Publication

publications by categories in reversed chronological order. generated by jekyll-scholar.

Big-four security conf papers:
Top-tier SE conf papers:

2026

  1. OOPSLA
    LLM-Powered Silent Bug Fuzzing in Deep Learning Libraries via Versatile and Controlled Bug Transfer
    Kunpeng Zhang, Dongwei Xiao, Daoyuan Wu, Shuai Wang, Jiali Zhao, Yuanyi Lin, Tongtong Xu, and Shaohua Wang
    Proceedings of the ACM on Programming Languages (OOPSLA), 2026
  2. EuroSys
    No More Translation at Runtime: LLM-Empowered Static Binary Translation
    Zhibo Liu, Huaijin Wang, Wai Kin Wong, Daoyuan Wu, and Shuai Wang
    In Proc. ACM SIGOPS European Conference on Computer Systems (EuroSys), 2026
  3. ICLR
    GuidedBench: Measuring and Mitigating the Evaluation Discrepancies of In-the-wild LLM Jailbreak Methods
    Ruixuan Huang, Xunguang Wang, Zongjie Li, Daoyuan Wu, and Shuai Wang
    In Proc. International Conference on Learning Representations (ICLR), 2026
  4. USENIX Security
    Lost in Blockchain Address Misuse: Hidden Cross-Platform Risks and Their Security Impact
    Zhenzhe Shao, Jiashuo Zhang, Zihao Li, Daoyuan Wu, Chong Chen, Yiming Shen, Lingfeng Bao, Yanlin Wang, and Jiachi Chen
    In Proc. USENIX Security Symposium, 2026
  5. USENIX Security
    Revealing the Dark Side of Smart Accounts: An Empirical Study of EIP-7702 Incurred Risks in Blockchain Ecosystem
    Mingyuan Huang, Han Liu, Shuo Yang, Daoyuan Wu, and Shuai Wang
    In Proc. USENIX Security Symposium, 2026
  6. USENIX Security
    MASLeak: Investigating and Exposing Intellectual Property Leakage Vulnerabilities in Multi-Agent Systems
    Liwen Wang, Wenxuan Wang, Shuai Wang, Zongjie Li, Zhenlan Ji, Zongyi Lyu, Daoyuan Wu, and Shing-Chi Cheung
    In Proc. USENIX Security Symposium, 2026
  7. S&P
    SoK: Evaluating Jailbreak Guardrails for Large Language Models
    Xunguang Wang, Zhenlan Ji, Wenxuan Wang, Zongjie Li, Daoyuan Wu, and Shuai Wang
    In Proc. IEEE Symposium on Security and Privacy (S&P), 2026

2025

  1. ASE
    Learning from the Past: Real-World Exploit Migration for Smart Contract PoC Generation
    Kairan Sun, Zhengzi Xu, Kaixuan Li, Lyuye Zhang, Yebo Feng, Daoyuan Wu, and Yang Liu
    In Proc. IEEE/ACM Automated Software Engineering (ASE), 2025
  2. ASE
    Detecting Various DeFi Price Manipulations with LLM Reasoning
    Juantao Zhong, Daoyuan Wu, Ye Liu, Maoyi Xie, Yang Liu, Yi Li, and Ning Liu
    In Proc. IEEE/ACM Automated Software Engineering (ASE), 2025
  3. ASE
    Demystifying OpenZeppelin’s Own Vulnerabilities and Analyzing Their Propagation in Smart Contracts
    Han Liu, Daoyuan Wu, Yuqiang Sun, Shuai Wang, Yang Liu, and Yixiang Chen
    In Proc. IEEE/ACM Automated Software Engineering (ASE), 2025
  4. ASE
    Have We Solved Access Control Vulnerability Detection in Smart Contracts? A Benchmark Study
    Han Liu, Daoyuan Wu, Yuqiang Sun, Shuai Wang, and Yang Liu
    In Proc. IEEE/ACM Automated Software Engineering (ASE), 2025
  5. TSE
    ACFix: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts
    Lyuye Zhang, Kaixuan Li, Kairan Sun, Daoyuan Wu, Ye Liu, Haoye Tian, and Yang Liu
    IEEE Transactions on Software Engineering (TSE), 2025
  6. TSE
    Advanced Smart Contract Vulnerability Detection via LLM-Powered Multi-Agent Systems
    Zhiyuan Wei, Jing Sun, Yuqiang Sun, Ye Liu, Daoyuan Wu, Zijian Zhang, Xianhao Zhang, Meng Li, Yang Liu, Chunmiao Li, Mingchao Wan, Jin Dong, and Liehuang Zhu
    IEEE Transactions on Software Engineering (TSE), 2025
  7. TOSEM
    Pre-trained Model-based Actionable Warning Identification: A Feasibility Study
    Xiuting Ge, Chunrong Fang, Quanjun Zhang, Daoyuan Wu, Bowen Yu, Qirui Zheng, An Guo, Shangwei Lin, Zhihong Zhao, Yang Liu, and Zhenyu Chen
    ACM Transactions on Software Engineering and Methodology (TOSEM), 2025
  8. TOSEM
    MANDO-LLM: Heterogeneous Graph Transformers with Large Language Models for Smart Contract Vulnerability Detection
    Nhat-Minh Nguyen, Hoang H Nguyen, Long Le Thanh, Zahra Ahmadi, Thanh-Nam Doan, Daoyuan Wu, and Lingxiao Jiang
    ACM Transactions on Software Engineering and Methodology (TOSEM), 2025
  9. CCS
    The Phantom Menace in Crypto-Based PET-Hardened Deep Learning Models: Invisible Configuration-Induced Attacks
    Yiteng Peng, Dongwei Xiao, Zhibo Liu, Zhenlan Ji, Daoyuan Wu, Shuai Wang, and Juergen Rahmel
    In Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS), 2025
  10. CCS
    Measuring and Augmenting Large Language Models for Solving Capture-the-Flag Challenges
    Zimo Ji, Daoyuan Wu, Wenyuan Jiang, Pingchuan Ma, Zongjie Li, and Shuai Wang
    In Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS), 2025
  11. CCS
    Differentiation-Based Extraction of Proprietary Data from Fine-tuned LLMs
    Zongjie Li, Daoyuan Wu, Shuai Wang, and Zhendong Su
    In Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS), 2025
  12. OOPSLA
    Extraction and Mutation at a High Level: Template-Based Fuzzing for JavaScript Engines
    Wai Kin Wong, Dongwei Xiao, Cheuk Tung Lai, Yiteng Peng, Daoyuan Wu, and Shuai Wang
    Proceedings of the ACM on Programming Languages (OOPSLA), 2025
  13. OOPSLA
    API-guided Dataset Synthesis to Finetune Large Code Models
    Zongjie Li, Daoyuan Wu, Shuai Wang, and Zhendong Su
    Proceedings of the ACM on Programming Languages (OOPSLA), 2025
  14. USENIX Security
    SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner
    Xunguang Wang, Daoyuan Wu, Zhenlan Ji, Zongjie Li, Pingchuan Ma, Shuai Wang, Yingjiu Li, Yang Liu, Ning Liu, and Juergen Rahmel
    In Proc. USENIX Security Symposium, 2025
  15. USENIX Security
    Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators
    Kunpeng Zhang, Zongjie Li, Daoyuan Wu, Shuai Wang, and Xin Xia
    In Proc. USENIX Security Symposium, 2025
  16. SACMAT
    Leakage-Resilient Easily Deployable and Efficiently Searchable Encryption (EDESE)
    Jiaming Yuan, Yingjiu Li, Jun Li, Daoyuan Wu, Jianting Ning, Yangguang Tian, and Robert H Deng
    In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), 2025
  17. ISSTA
    DecLLM: LLM-Augmented Recompilable Decompilation for Enabling Programmatic Use of Decompiled Code
    Wai Kin Wong, Daoyuan Wu, Huaijin Wang, Zongjie Li, Zhibo Liu, Shuai Wang, Qiyi Tang, Sen Nie, and Shi Wu
    Proceedings of the ACM on Software Engineering (ISSTA), 2025
  18. PLDI
    Divergence-Aware Testing of Graphics Shader Compiler Back-Ends
    Dongwei Xiao, Shuai Wang, Zhibo Liu, Yiteng Peng, Daoyuan Wu, and Zhendong Su
    Proceedings of the ACM on Programming Languages (PLDI), 2025
  19. ICSE
    Testing and Understanding Deviation Behaviors in FHE-hardened Machine Learning Models
    Yiteng Peng, Daoyuan Wu, Zhibo Liu, Dongwei Xiao, Zhenlan Ji, Juergen Rahmel, and Shuai Wang
    In Proc. IEEE/ACM Conference on Software Engineering (ICSE), 2025
  20. ICSE
    Combining Fine-Tuning and LLM-Based Agents for Intuitive Smart Contract Auditing with Justifications
    Wei Ma, Daoyuan Wu, Yuqiang Sun, Tianwen Wang, Shangqing Liu, Jian Zhang, Yue Xue, and Yang Liu
    In Proc. IEEE/ACM Conference on Software Engineering (ICSE), 2025
  21. NDSS
    PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation
    Ye Liu, Yue Xue, Daoyuan Wu, Yuqiang Sun, Yi Li, Miaolei Shi, and Yang Liu
    In Proc. ISOC Network and Distributed System Security Symposium (NDSS), 2025

2024

  1. DLT
    AGChain: A Blockchain-based Gateway for Trustworthy App Delegation from Mobile App Markets
    Mengjie Chen, Xiao Yi, Daoyuan Wu, Jianliang Xu, Yingjiu Li, and Debin Gao
    ACM Distributed Ledger Technologies: Research and Practice (DLT), 2024
  2. EMNLP
    Split and Merge: Aligning Position Biases in LLM-based Evaluators
    Zongjie Li, Chaozheng Wang, Pingchuan Ma, Daoyuan Wu, Shuai Wang, Cuiyun Gao, and Yang Liu
    In Proc. Conference on Empirical Methods in Natural Language Processing (EMNLP), 2024
  3. CSUR
    Machine Learning for Actionable Warning Identification: A Comprehensive Survey
    Xiuting Ge, Chunrong Fang, Xuanye Li, Weisong Sun, Daoyuan Wu, Juan Zhai, Shang-wei Lin, Zhihong Zhao, Yang Liu, and Zhenyu Chen
    ACM Computing Surveys (CSUR), 2024
  4. USENIX Security
    Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts
    Han Liu, Daoyuan Wu, Yuqiang Sun, Haijun Wang, Kaixuan Li, Yang Liu, and Yixiang Chen
    In Proc. USENIX Security Symposium, 2024
  5. EuroS&P
    MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search
    Zicheng Zhang, Haoyu Ma, Daoyuan Wu, Debin Gao, Xiao Yi, Yufan Chen, Yan Wu, and Lingxiao Jiang
    In Proc. IEEE European Symposium on Security and Privacy (EuroS&P), 2024
  6. ICSE
    GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis
    Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, and Yang Liu
    In Proc. IEEE/ACM Conference on Software Engineering (ICSE), 2024
  7. ICSE
    On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study
    Zongjie Li, Chaozheng Wang, Pingchuan Ma, Chaowei Liu, Shuai Wang, Daoyuan Wu, Cuiyun Gao, and Yang Liu
    In Proc. IEEE/ACM Conference on Software Engineering (ICSE), 2024

2023

  1. ISSTA
    Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts
    Yuzhou Fang, Daoyuan Wu, Xiao Yi, Shuai Wang, Yufan Chen, Mengjie Chen, Yang Liu, and Lingxiao Jiang
    In Proc. ACM International Symposium on Software Testing and Analysis (ISSTA), 2023
  2. NDSS
    BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects
    Xiao Yi, Yuzhou Fang, Daoyuan Wu, and Lingxiao Jiang
    In Proc. ISOC Network and Distributed System Security Symposium (NDSS), 2023

2022

  1. FSE
    An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns
    Xiao Yi, Daoyuan Wu, Lingxiao Jiang, Yuzhou Fang, Kehuan Zhang, and Wei Zhang
    In Proc. ACM Symposium on the Foundations of Software Engineering (FSE), 2022
  2. RAID
    LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework
    Menghan Sun, Zirui Song, Xiaoxi Ren, Daoyuan Wu, and Kehuan Zhang
    In Proc. International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2022

2021

  1. RAID
    On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps
    Zicheng Zhang, Daoyuan Wu, Lixiang Li, and Debin Gao
    In Proc. International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2021
  2. DSN
    When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid
    Daoyuan Wu, Debin Gao, Robert H Deng, and Chang Rocky KC
    In Proc. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2021
  3. TDSC
    Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing
    Haoyu Ma, Shijia Li, Debin Gao, Daoyuan Wu, Qiaowen Jia, and Chunfu Jia
    IEEE Transactions on Dependable and Secure Computing (TDSC), 2021
  4. EMSE
    Scalable Online Vetting of Android Apps for Measuring Declared SDK Versions and Their Consistency with API Calls
    Daoyuan Wu, Debin Gao, and David Lo
    Springer Empirical Software Engineering (EMSE), 2021

2020

  1. TII
    Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems
    Haoyu Ma, Jianwen Tian, Kefan Qiu, David Lo, Debin Gao, Daoyuan Wu, Chunfu Jia, and Thar Baker
    IEEE Transactions on Industrial Informatics (TII), 2020
  2. DIMVA
    Understanding Android VoIP Security: A System-Level Vulnerability Assessment
    En He, Daoyuan Wu, and Robert H Deng
    In Springer International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2020

2019

  1. AsiaCCS
    Towards Understanding Android System Vulnerabilities: Techniques and Insights
    Daoyuan Wu, Debin Gao, Eric KT Cheng, Yichen Cao, Jintao Jiang, and Robert H Deng
    In Proc. ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2019
  2. IWQoS
    An Empirical Study of Mobile Network Behavior and Application Performance in the Wild
    Shiwei Zhang, Weichao Li, Daoyuan Wu, Bo Jin, Rocky KC Chang, Debin Gao, Yi Wang, and Ricky KP Mok
    In Proc. International Symposium on Quality of Service (IWQoS), 2019
  3. NDSS
    Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment
    Daoyuan Wu, Debin Gao, Rocky KC Chang, En He, Eric KT Cheng, and Robert H Deng
    In Proc. ISOC Network and Distributed System Security Symposium (NDSS), 2019

2018

  1. WiSec
    Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild
    Xiaoxiao Tang, Yan Lin, Daoyuan Wu, and Debin Gao
    In Proc. ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), 2018
  2. CODASPY
    SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications
    Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, and Robert H Deng
    In Proc. ACM Conference on Data and Applications Security and Privacy (CODASPY), 2018

2017

  1. USENIX ATC
    MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance
    Daoyuan Wu, Rocky KC Chang, Weichao Li, Eric KT Cheng, and Debin Gao
    In Proc. USENIX Annual Technical Conference (ATC), 2017
  2. TMC
    Toward Accurate Network Delay Measurement on Android Phones
    Weichao Li, Daoyuan Wu, Rocky KC Chang, and Ricky KP Mok
    IEEE Transactions on Mobile Computing (TMC), 2017
  3. WASA
    Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps
    Daoyuan Wu, Ximing Liu, Jiayun Xu, David Lo, and Debin Gao
    In Proc. Springer International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2017

2016

  1. CoNEXT
    Demystifying and Puncturing the Inflated Delay in Smartphone-based WiFi Network Measurement
    Weichao Li, Daoyuan Wu, Rocky KC Chang, and Ricky KP Mok
    In Proc. International on Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2016

2015

  1. ICISC
    Stack Layout Randomization with Minimal Rewriting of Android Binaries
    Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, and Huanguo Zhang
    In Proc. Springer International Conference on Information Security and Cryptology (ICISC), 2015
  2. INFOCOM
    On the Accuracy of Smartphone-based Mobile Network Measurement
    Weichao Li, Ricky KP Mok, Daoyuan Wu, and Rocky KC Chang
    In Proc. IEEE Conference on Computer Communications (INFOCOM), 2015
  3. MoST
    Indirect File Leaks in Mobile Applications
    Daoyuan Wu and Rocky KC Chang
    In Proc. IEEE Mobile Security Technologies (MoST), in conjunction with S&P, 2015

2014

  1. ISC
    Analyzing Android Browser Apps for file:// Vulnerabilities
    Daoyuan Wu and Rocky KC Chang
    In Proc. Springer Information Security Conference (ISC), 2014