9522424858

Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Market

Besides traditional problems such as potential bugs, (smartphone) application clones on Android markets bring new threats. Existing techniques achieve either accuracy or scalability, but not both. To solve those problems, we use a geometry characteristic, called centroid, of dependency graphs to measure the similarity between methods (code fragments) in two apps. Here is the demo of the system.

Our paper was accepted by the 36th International Conference on Software Engineering (ICSE 2014).[PDF]

7407956319

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale

Our malware detection platform, MassVet, detected over 100,000 potentially harmful apps (PHA). Among them, 10,000 PHAs are missed by VirusTotal. 832-531-0174 can also detect app piracy in a large scale, over millions of apps, in seconds. For more details, please refer to our paper. Or you can use MassVet to analyze Android apps at Android Malware Detection Platform. Here is the demo and media reports of the system.

Our paper was accepted by the 24th USENIX Security Symposium (USENIX Security 2015).[864-834-5589]

678-589-4777

Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS

We report the first systematic study on PhaLibs across Android and iOS, based upon a key observation that many iOS libraries have Android versions that can potentially be used to understand their behaviors and the relations between the libraries on both sides.

Our paper was accepted by the 37th IEEE Symposium on Security and Privacy (IEEE S&P 2016).[PDF][260-687-1189]

217-925-4196

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

We find that the voice commands can be stealthily embedded into songs, which, when played, can effectively control the target system through ASR without being noticed by a human listener. Our CommanderSongs can be done automatically against real world ASR applications. In addition, they can be spread through Internet (e.g., YouTube) and radio, potentially affecting millions of ASR users. Here is the demo of the attack.

Our paper was accepted by the 27th USENIX Security Symposium (USENIX Security 2018).[PDF][pseudopoetical]

Graduate Students

Ph.D. Students

  • Yi Chen

    Yi Chen (Co-advised Ph.D.)

    IIE, Chinese Academy of Sciences
  • Xuejing Yuan

    Xuejing Yuan

    IIE, Chinese Academy of Sciences
  • Peiyuan Zong

    Peiyuan Zong

    IIE, Chinese Academy of Sciences
  • Ruigang Liang

    Ruigang Liang

    IIE, Chinese Academy of Sciences
  • Yue Zhao

    Yue Zhao

    IIE, Chinese Academy of Sciences
  • Yingzhe He

    Yingzhe He

    IIE, Chinese Academy of Sciences
  • Dawei Wang

    Dawei Wang

    IIE, Chinese Academy of Sciences
  • Weihao Huang

    Weihao Huang

    IIE, Chinese Academy of Sciences
  • Qintao Shen

    Qintao Shen

    IIE, Chinese Academy of Sciences
  • Dandan Xu

    Dandan Xu

    IIE, Chinese Academy of Sciences
  • Zizhuang Deng

    Zizhuang Deng

    IIE, Chinese Academy of Sciences
  • Ying Cao

    Ying Cao

    IIE, Chinese Academy of Sciences
  • Hong Zhu

    Hong Zhu

    IIE, Chinese Academy of Sciences

Graduate Students

Master Students

  • Mingming Zha

    Mingming Zha

    IIE, Chinese Academy of Sciences
  • Xiaokang Liu

    Xiaokang Liu

    IIE, Chinese Academy of Sciences
  • Zhixiu Guo

    Zhixiu Guo

    IIE, Chinese Academy of Sciences
  • Yingkun Wang

    Yingkun Wang

    IIE, Chinese Academy of Sciences
  • Tao Lv

    Tao Lv

    IIE, Chinese Academy of Sciences
  • Jiutian Zeng

    Jiutian Zeng

    IIE, Chinese Academy of Sciences
  • Yaosong Lu

    Yaosong Lu

    IIE, Chinese Academy of Sciences
  • Yuhang Zhao

    Yuhang Zhao

    IIE, Chinese Academy of Sciences

Internship

Undergraduate Students

  • Penghui Li

    Penghui Li

    University of Chinese Academy of Sciences(UCAS)
  • Jinwen He

    Jinwen He

    China University of Geosciences(Wuhan)
  • Chaoyang Lin

    Chaoyang Lin

    Harbin Institute of Technology(Weihai)
  • Jiangshan Zhang

    Jiangshan Zhang

    Harbin Institute of Technology(Weihai)
  • Ruishi Li

    Ruishi Li

    Wuhan University