Software
- Detecting and Explaining Malware Promotion via App Promotion Graph [Link]
- CTIKG: LLM-Powered Knowledge Graph Construction from Cyber Threat Intelligence: [Link]
- iSyn: Semi-Automated Smart Contract Synthesis from Legal Financial Agreements: [Link]
- vFix: Facilitating Software Maintenance of Smart Contracts via Automatically Fixing Vulnerabilities: [Link]
- DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps [Link]
- Promal: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning [Link]
- DepComm: Graph Summarization on System Audit Logs for Attack Investigation [Link]
- DepImpact: Back-Propagating System Dependency Impact for Attack Investigation [Link]
- CHAMP(UBCFinder): Characterizing Undesired App Behaviors from User Comments based on Market Policies [Link]
- WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Change [Link]
- DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps [Link]
- HyperService: Interoperability and Programmability across Heterogeneous Blockchains [Link]
- AppContext: Differentiating Malicious and Benign Mobile App Behavior using Contexts [Link]
- WHYPER: Towards Automating Risk Assessment of Mobile Applications [Link]
- Inferring Method Specifications from Natural Language API Descriptions [Link]
- Covana: Precise Identification of Problems for Structural Test Generation [Link]