2024年:
- 贾昂, 范铭, 徐茜, 晋武侠, 王海军, 刘烃. 面向函数内联场景的二进制到源代码函数相似性检测方法. 软件学报 , pp. --, 2024, (CCF-A期刊)
- Yin Wang, Ming Fan, Junfeng Liu, Junjie Tao, Wuxia Jin, Haijun Wang, Qi Xiong, Ting Liu. "Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App". IEEE Transaction on Software Engineering (IEEE TSE) , pp. --, 2024,(CCF A会议)
- Haijun Wang, Hao Wu, Dijun Liu, Chenyang Peng, Yin Wu, Ming Fan, Ting Liu. Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts. the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE 2024), 2024, (CCF A会议)
- Yin Wu, Xiaofei Xie, Chenyang Peng, Dijun Liu, Hao Wu, Ming Fan, Ting Liu, Haijun Wang. AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis. the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE 2024), 2024, (CCF A会议,通讯作者)
- Cong Wu, Jing Chen, Ziming Zhao, Kun He, Guowen Xu, Yueming Wu, Haijun Wang, Hongwei Li, Yang Liu, Yang Xiang. TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning. the 31st ACM Conference on Computer and Communications Security (ACM CCS 2024), (CCF A会议)
- Jingwen Liu, Wuxia Jin, Junhui Zhou, Qiong Feng, Ming Fan, Haijun Wang, Ting Liu. 3Erefactor: Effective, Efficient and Executable Refactoring Recommendation for Software Architectural Consistency. IEEE Transaction on Software Engineering (IEEE TSE) . (CCF A期刊)
- Yin Wang, Ming Fan, Hao Zhou, Haijun Wang, Wuxia Jin,Jiajia Li, Wenbo Chen, Shijie Li, Yu Zhang, Deqiang Han, Ting Liu. MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs. the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE 2024), 2024, (CCF A会议) (Distinguished Paper Award)
- Ming Fan, Jifei Shi, Yin Wang, Le Yu, Xicheng Zhang, Haijun Wang, Wuxia Jin, Ting Liu. Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps. the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE 2024), 2024, (CCF A会议)
-
Han Liu, Daoyuan Wu, Yuqiang Sun, Haijun Wang, Kaixuan Li, Yang Liu, Yixiang Chen. Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts. 33rd USENIX Security Symposium (USENIX Security 2024)(CCF-A会议).
-
Kaixuan Li, Yue Xue , Sen Chen, Han Liu , Kairan Sun, Ming Hu, Haijun Wang, Yang Liu, Yixiang Chen. Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?. ACM International Conference on the Foundations of Software Engineering (FSE 2024). (Distinguished Paper Award)
-
Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Ting Liu. Cross-Inlining Binary Function Similarity Detection. IEEE/ACM 46th International Conference on Software Engineering. (ICSE 2024). (CCF-A会议)
- Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu. GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis. IEEE/ACM 46th International Conference on Software Engineering. (ICSE 2024). (CCF-A会议)
-
Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Zhaohui Zhou, Haijun Wang, and Ting Liu. PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks. IEEE Transactions on Software Engineering. (TSE)(CCF-A期刊,JCR 1区)
-
Maoyi Xie, Ming Hu, Ziqiao Kong, Cen Zhang, Yebo Feng, Haijun Wang, Yue Xue, Hao Zhang, Ye Liu, Yang Liu. DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Application. ACM SIGSOFT International Symposium on Software Testing and Analysis. (ISSTA 2024). (CCF-A会议)
-
Yi Hou, Wuxia Jin, Zhijun Wang, Liuming Wang, Shuguang Chen, Yihan Wang, Lei Sang, Haijun Wang, Ting Liu. ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java. Internetware 2024.
2023年及以前:
- Haijun Wang, Ye Liu, Yi Li, Shang-wei Lin, Cyrille Artho, Lei Ma, Yang Liu. Oracle-Supported Dynamic Exploit Generation for Smart Contracts. IEEE Transactions on Dependable and Secure Computing, 2022, DOI:10.1109/TDSC.2020.3037332(CCF-A期刊,JCR 1区)
- Haijun Wang, Xiaofei Xie, Yi Li, Cheng Wen, Yuekang Li, Yang Liu, Shengchao Qin, Hongxu Chen, Yulei Sui. Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities. ACM/IEEE 42nd International Conference on Software Engineering. 2020,Pages 999–1010.(CCF-A会议)
- Haijun Wang, Yun Lin, Zijiang Yang, Jun Sun, Yang Liu, Jingsong Dong, Qinghua Zheng, Ting Liu. Explaining Regressions via Alignment Slicing and Mending. IEEE Transactions on Software Engineering, 2021, DOI:0.1109/TSE.2019.2949568.(CCF-A期刊,JCR 1区)
- Haijun Wang, Xiaofei Xie, Shang-Wei Lin, Yun Lin, Yuekang Li, Shengchao Qin, Yang Liu and Ting Liu. Locating Vulnerabilities in Binaries via Memory Layout Recovering. 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019, Pages 718-728. (CCF-A会议)
- Haijun Wang, Ting Liu, Xiaohong Guan, Chao Shen, Qinghua Zheng, Zijiang Yang. Dependence Guided Symbolic Execution. IEEE Transaction on Software Engineering, 2017, Pages 252-271. (CCF-A期刊,JCR 1区)
- Jianfei Zhou, Tianxing Jiang, Haijun Wang, Meng Wu, and Ting Chen. DAppHunter: Identifying Inconsistent Behaviors of Blockchain-based Decentralized Applications. IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 2023: 24-35.
- Cheng Wen, Haijun Wang, Yuekang Li, Xiaofei Xie, Hongxu Chen, Shengchao Qin, Yang Liu, Zhiwu Xu and Ting Liu. MemLock: Memory Usage Guided Fuzzing. ACM/IEEE 42nd International Conference on Software Engineering. 2020, Pages 765–777.(CCF-A会议, 通讯作者)
- Xiaofei Xie, Lei Ma, Haijun Wang, Yuekang Li, Yang Liu, Xiaohong Li. DiffChaser: Systematic Disagreement Detection of Deep Neural Networks. Twenty-Eighth International Joint Conference on Artificial Intelligence,2019,Pages 5772-5778(CCF-A会议,通讯作者)
- Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, Jianjun Zhao. xFuzz: Machine Learning Guided Cross-Contract Fuzzing. IEEE Transactions on Dependable and Secure Computing, 2022, Accepted. (CCF-A期刊,JCR 1区)
- Haijun Wang, Yi Li, Shang-wei Lin, Lei Ma, Yang Liu. VULTRON: Catching Vulnerable Smart Contracts Once and for All. IEEE International Conferences on Software Engineering: New Ideas and Emerging Results, 2019.
- Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang and Yang Liu. MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs,29th USENIX Security Symposium,2020,Pages 2325-2342. (CCF-A会议)
- Yuekang Li, Yinxing Xue, Hongxu Chen, Xiuheng Wu, Cen Zhang, Xiaofei Xie, Haijun Wang and Yang Liu. Cerebro: Context-aware Adaptive Fuzzing for Effective Vulnerability Detection,27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019, Pages 533-544. (CCF-A会议)
- Yun Lin, Jun Sun, Lyly Tran, Guangdong Bai, Haijun Wang, and Jinsong Dong. Break the Dead End of Dynamic Slicing: Localizing Data and Control Omission Bug. The 33rd IEEE/ACM International Conference on Automated Software Engineering, 2018,Pages 509-519. (CCF-A会议)
- Yuekang Li, Guozhu Meng, Jun Xu, Cen Zhang, Hongxu Chen, Xiaofei Xie, Haijun Wang and Yang Liu. VALL-NUT: Principled Anti-Greybox-Fuzzing. The 32nd International Symposium on Software Reliability Engineering, 2021. (CCF-B会议)
- Haijun Wang, Xiaohong Guan, Qinghua Zheng, Ting Liu, Xiangyang Li, Lechen Yu, Zijiang Yang. Reducing Test Cases with Causality Partitions. 26th International Conference on Software Engineering and Knowledge Engineering, Vancouver, Canada, 2014,Pages 223-228.
- Haijun Wang, Xiaohong Guan, Qinghua Zheng, Ting Liu, Chao Shen, Zijiang Yang. Directed Test Suite Augmentation via Exploiting Program Dependency. 2014 IEEE International Conference on Software Engineering Workshop on Constraints in Software Testing, Verification, and Analysis, 2014.
- Shen Chao, Haodi Xu, Haijun Wang, and Xiaohong Guan. Handedness recognition through keystroke-typing behavior in computer forensics analysis. In Proceedings of 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communication. 2016, Pages 1054-1060.
- Ting Liu, Zhiwen Wang, Haijun Wang, Ke Lu. An Entropy-based Method for Attack Detection in Large Scale Network. International Journal of Computers Communications & Control. 2012, 7(3): 509-517
- 俞乐晨, 王海军, 郑庆华, 刘烃, 黄小龙, 杨子江, 魏嵬. 基于分支概率引导的回归测试案例生成方法. 中南大学学报(自然科学版), 2013, 44 (S2). 317-322.
- 王志文,黄小龙,王海军,刘烃,俞乐晨. 基于程序切片的测试用例生成系统研究与实现. 计算机科学. 2014. Issue (9): 71-74.
- Zhenzhou Tian, Qinghua Zheng, Ming Fan, Eryue Zhuang, Haijun Wang, Ting Liu. DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool. International Conference on Software Engineering and Knowledge Engineering, Vancouver, Canada, 2014. (Best Demo Award)