Full Papers in Top-tier Venues (132), CCF-A Research Track (119), CSRankings (98), Best/Distinguished Paper Award (7)

(s) the student/RA/postdoc I advised or co-advised during the work


    2025

  1. On the (In)Security of LLM App Stores
    Xinyi Hou(s)#, Yanjie Zhao(s)#, and Haoyu Wang*
    The 46th IEEE Symposium on Security and Privacy (Oakland'25) PDF

  2. Born with a Silver Spoon: On the (In)Security of Native Granted App Privileges in Custom Android ROMs
    Chao Wang(s)#, Yanjie Zhao(s)#, and Haoyu Wang*
    The 46th IEEE Symposium on Security and Privacy (Oakland'25) PDF

  3. A Big Step Forward? A User-Centric Examination of iOS App Privacy Report and Enhancements
    Liu Wang(s), Dong Wang(s), Shidong Pan, Zheng Jiang, Haoyu Wang, Yi Wang
    The 46th IEEE Symposium on Security and Privacy (Oakland'25) PDF

  4. Following Devils' Footprint: Towards Real-time Detection of Price Manipulation Attacks
    Bosi Zhang(s), Ningyu He(s)*, Xiaohui Hu(s), Kai Ma(s), and Haoyu Wang*
    USENIX Security 2025 PDF

  5. VoiceWukong: Benchmarking Deepfake Voice Detection
    Ziwei Yan(s)#, Yanjie Zhao(s)#, and Haoyu Wang*
    USENIX Security 2025 PDF

  6. Parcel Mismatch Demystified: Addressing a Decade-Old Security Challenge in Android
    Sheng Cao(s), Hao Zhou, Songzhou Shi, Yanjie Zhao(s), and Haoyu Wang*
    ACM CCS 2025 PDF

  7. Needle in a Haystack: Automated and Scalable Vulnerability Hunting in the Windows ALPC Sea
    Haoyi Liu(s), Feng Dong, Yunpeng Tian(s), Mu Zhang, Xuefeng Li, Fangming Gu, Zhiniang Peng and Haoyu Wang
    ACM CCS 2025 PDF

  8. Error Messages to Fuzzing: Detecting XPS Parsing Vulnerabilities in Windows Printing Components
    Yunpeng Tian(s), Feng Dong, Junhai Wang(s), Mu Zhang, Zhiniang Peng*, Zesen Ye, Xiapu Luo, and Haoyu Wang*
    ACM CCS 2025 PDF

  9. Be Careful of What You Embed: Demystifying OLE Vulnerabilities
    Yunpeng Tian(s)#, Feng Dong#, Haoyi Liu(s), Meng Xu, Zhiniang Peng, Zesen Ye, Shenghui Li, Xiapu Luo, and Haoyu Wang
    NDSS 2025 PDF

  10. Cybersquatting in Web3: The Case of NFT
    Kai Ma(s), Ningyu He(s), Jintao Huang(s), Bosi Zhang(s), Ping Wu, and and Haoyu Wang*
    The 10th IEEE European Symposium on Security and Privacy (EuroS&P 2025) PDF

  11. AI Model Genome
    Yanjie Zhao(s), and Haoyu Wang*
    The 1st Workshop on Software Genomics (SWGeno'25), co-located with FSE 2025 PDF

  12. TensorGuard: Gradient-Based Model Fingerprinting for LLM Similarity Detection and Family Classification
    Zehao Wu(s)#, Yanjie Zhao(s)#, and Haoyu Wang*
    ASE 2025 PDF

  13. Demystifying Cookie Sharing Risks in WebView-based Mobile App-in-app Ecosystems
    Miao Zhang, Shenao Wang(s), Guilin Zheng, Yanjie Zhao(s), and Haoyu Wang*
    ASE 2025 PDF

  14. Enhancing Semantic Understanding in Pointer Analysis Using Large Language Models
    Baijun Cheng, Kailong Wang, Ling Shi, Haoyu Wang, Yao Guo, Ding Li, Xiangqun Chen
    International Workshop on Language Models and Programming Languages (LMPL) at SPLASH 2025 PDF

  15. DeclarUI: Bridging Design and Development with Automated Declarative UI Code Generation
    Ting Zhou(s)#, Yanjie Zhao(s)#, Xinyi Hou(s), Xiaoyu Sun, Kai Chen*, and Haoyu Wang*
    FSE 2025 PDF

  16. LLMDroid: Enhancing Automated Mobile App GUI Testing Coverage with Large Language Model Guidance
    Chenxu Wang(s)#, Tianming Liu(s)#, Yanjie Zhao(s), Minghui Yang, and Haoyu Wang*
    FSE 2025 PDF

  17. Mitigating Emergent Malware Label Noise in DNN-Based Android Malware Detection
    Haodong Li(s)#, Xiao Cheng#, Guohan Zhang*, Guosheng Xu, Guoai Xu and Haoyu Wang*
    FSE 2025 PDF

  18. LLM App Squatting and Cloning
    Yinglin Xie(s)#, Xinyi Hou(s)#, Yanjie Zhao(s), Kai Chen*, Haoyu Wang*
    FSE 2025, Industry Track PDF

  19. The Promise and Pitfalls of WebAssembly: Perspectives from the Industry
    Ningyu He(s), Shangtong Cao(s), Haoyu Wang, Yao Guo, Xiapu Luo
    FSE 2025, Industry Track PDF

  20. Are iOS Apps Immune to Abusive Advertising Practices?
    Tianming Liu(s), Jiapeng Deng(s), Yanjie Zhao(s), Xiao Chen, Xiaoning Du, Li Li, Haoyu Wang
    FSE 2025, Industry Track PDF

  21. Walls Have Ears: Demystifying Notification Listener Usage in Android Apps
    Jiapeng Deng(s)#, Tianming Liu(s)#, Yanjie Zhao(s), Chao Wang(s), Lin Zhang and Haoyu Wang*
    ISSTA 2025 PDF

  22. Understanding Model Weaknesses: A Path to Strengthening DNN-Based Android Malware Detection
    Haodong Li(s)#, Xiao Cheng*, Yanjie Zhao(s), Guosheng Xu, Guoai Xu, and Haoyu Wang*
    ISSTA 2025 PDF

  23. OpDiffer: LLM-Assisted Opcode-Level Differential Testing of Ethereum Virtual Machine
    Jie Ma(s), Ningyu He(s), Jinwen Xi, Mingzhe Xing, Haoyu Wang, Ying Gao, Yinliang Yue
    ISSTA 2025 PDF

  24. Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain Networks
    Xiaohui Hu(s), Hang Feng, Pengcheng Xia(s), Gareth Tyson, Lei Wu, Yajin Zhou and Haoyu Wang*
    ACM SIGMETRICS 2025 PDF

  25. Beyond App Markets: Demystifying Underground Mobile App Distribution Via Telegram
    Yanhui Guo, Dong Wang(s), Liu Wang(s), Yongsheng Fang, Chao Wang(s), Minghui Yang, Tianming Liu*(s) and Haoyu Wang*
    ACM SIGMETRICS 2025 PDF

  26. TacDroid: Detection of Illicit Apps through Hybrid Analysis of UI-based Transition Graphs
    Yanchen Lu, Hongyu Lin, Zehua He, Haitao Xu, Zhao Li, Shuai Hao, Liu Wang(s), Haoyu Wang, Kui Ren
    ICSE 2025 PDF

  27. Decoding Secret Memorization in Code LLMs Through Token-Level Characterization
    Yuqing Nie, Chong Wang, Kailong Wang, Guoai Xu, Guosheng Xu, and Haoyu Wang
    ICSE 2025 PDF

  28. Understanding the Effectiveness of Coverage Criteria for Large Language Models: A Special Angle from Jailbreak Attacks
    Shide Zhou(s), Tianlin Li, Kailong Wang, Yihao Huang, Ling Shi, Yang Liu and Haoyu Wang
    ICSE 2025 PDF

  29. CKGFuzzer: LLM-Based Fuzz Driver Generation Enhanced By Code Knowledge Graph
    Hanxiang Xu(s)#, Wei Ma#, Ting Zhou(s), Yanjie Zhao(s)*, Kai Chen, Qiang Hu, Yang Liu, Haoyu Wang
    ICSE 2025, Industry Challenge Track Best Paper AWARD PDF

  30. CodeMorph: Mitigating Data Leakage in Large Language Model Assessment
    Hongzhou Rao(s), Yanjie Zhao(s)*, Wenjie Zhu(s), Ling Xiao, Meizhen Wang, Haoyu Wang
    ICSE 2025, Industry Challenge Track PDF

  31. CommitShield: Tracking Vulnerability Introduction and Fix in Version Control Systems
    Zhaonan Wu(s), Yanjie Zhao(s)*, Chen Wei*, Zirui Wan(s), Yue Liu, Haoyu Wang
    ICSE 2025, Industry Challenge Track PDF

  32. ClauseBench: Enhancing Software License Analysis with Clause-Level Benchmarking
    Qiang Ke(s)#, Xinyi Hou(s)#, Yanjie Zhao(s)*, Haoyu Wang
    ICSE 2025, Industry Challenge Track PDF

  33. GPT Store Mining and Analysis
    Dongxun Su(s)#, Yanjie Zhao(s)#, Xinyi Hou(s), Shenao Wang(s), Haoyu Wang*
    InternetWare 2025 PDF

  34. Exploring Typo Squatting Threats in the Hugging Face Ecosystem
    Ningyuan Li(s), Yanjie Zhao(s), Shenao Wang(s), Zehao Wu(s), Haoyu Wang
    InternetWare 2025 PDF

  35. Seeing is (Not) Believing: The Mirage Card Attack Targeting Online Social Networks
    Wangchenlu Huang(s), Shenao Wang(s), Yanjie Zhao(s), Tianxiang Wang, Yuhao Gao, Guosheng Xu, Haoyu Wang
    InternetWare 2025 PDF

  36. Measuring and Explaining the Effects of Android App Transformations in Online Malware Detection
    Guozhu Meng, Zhixiu Guo, Xiaodong Zhang, Haoyu Wang, Kai Chen, Yang Liu
    InternetWare 2025 PDF

  37. Research on WebAssembly Runtimes: A Survey
    Yixuan Zhang(s), Mugeng Liu, Haoyu Wang*, Yun Ma*, Gang Huang, Xuanzhe Liu
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  38. Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey
    Xinyu She(s)#, Yue Liu#, Yanjie Zhao(s), Yiling He, Li Li, Chakkrit Tantithamthavorn, Zhan Qin, Haoyu Wang*
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  39. SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing
    Yi Liu, Guanyu Wang, Xinyi Zheng, Gelei Deng, Kailong Wang, Yang Liu, and Haoyu Wang
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  40. NeuSemSlice: Towards Effective DNN Model Maintenance via Neuron-level Semantic Slicing
    Shide Zhou(s), Tianlin Li, Yihao Huang, Ling Shi, Kailong Wang, Yang Liu, Haoyu Wang
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  41. DrWASI: LLM-assisted Differential Testing for WebAssembly System Interface Implementations
    Yixuan Zhang(s), Ningyu He(s), Jianting Gao(s), Shangtong Cao(s), Kaibo Liu, Haoyu Wang, Yun Ma, Gang Huang, Xuanzhe Liu
    ACM Transactions on Software Engineering and Methodology (TOSEM)
    Selected for FSE 2025 journal-first presentation PDF

  42. MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis
    Shenao Wang(s), Yuekang Li, Kailong Wang*, Yi Liu, Hui Li, Yang Liu, Haoyu Wang*
    ACM Transactions on Software Engineering and Methodology (TOSEM)
    Selected for FSE 2025 journal-first presentation PDF

  43. Uncovering NFT Domain-Specific Defects on Smart Contract Bytecode
    Zuochao Ma, Muhui Jiang, Xiapu Luo, Haoyu Wang, Yaojin Zhou
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  44. Software Engineering for OpenHarmony: A Research Roadmap
    Li Li, Xiang Gao, Hailong Sun, Chunming Hu, Xiaoyu Sun, Haoyu Wang, Haipeng Cai, Ting Su, Xiapu Luo, Tegawendé F. Bissyandé, Jacques Klein, John Grundy, Tao Xie, Haibo Chen, Huaimin Wang
    ACM Computing Surveys PDF


  45. 2024

  46. Large language models for software engineering: A systematic literature review
    Xinyi Hou(s)#, Yanjie Zhao(s)#, Yue Liu, Zhou Yang, Kailong Wang, Li Li, Xiapu Luo, David Lo, John Grundy, Haoyu Wang*
    ACM Transactions on Software Engineering and Methodology (TOSEM)
    Selected for FSE 2025 journal-first presentation PDF

  47. Large Language Model Supply Chain: A Research Agenda
    Shenao Wang(s), Yanjie Zhao(s), Xinyi Hou(s), Haoyu Wang*
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  48. LLM App Store Analysis: A Vision and Roadmap
    Yanjie Zhao(s), Xinyi Hou(s), Shenao Wang(s), Haoyu Wang*
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  49. LLM for Mobile: An Initial Roadmap
    Daihang Chen, Yonghui Liu, Mingyi Zhou, Yanjie Zhao(s), Haoyu Wang, Shuai Wang, Xiao Chen, Tegawendé F. Bissyandé, Jacques Klein, Li Li
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  50. All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts
    Tianle Sun(s), Ningyu He(s), Jiang Xiao, Yinliang Yue, Xiapu Luo, and Haoyu Wang*
    USENIX Security 2024 PDF

  51. Exploring Covert Third-party Identifiers through External Storage in the Android New Era
    Zikan Dong(s)#, Tianming Liu(s)#, Jiapeng Deng(s), Haoyu Wang*, Li Li, Minghui Yang, Meng Wang, Guosheng Xu*, Guoai Xu
    USENIX Security 2024 PDF

  52. Towards Smart Contract Fuzzing on GPU
    Weimin Chen, Xiapu Luo, Haipeng Cai and Haoyu Wang
    The 45th IEEE Symposium on Security and Privacy (Oakland'24) PDF

  53. CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments
    Shenao Wang(s)#, Feng Dong#, Hangfeng Yang, Jingheng Xu*, and Haoyu Wang*
    CCS 2024 PDF

  54. Abusing the Ethereum Smart Contract Verification Services for Fun and Profit
    Pengxiang Ma(s)#, Ningyu He(s)#, Yuhua Huang, Haoyu Wang*, Xiapu Luo
    NDSS 2024 PDF

  55. VETEOS: Statically Vetting EOSIO Contracts for the “Groundhog Day” Vulnerabilities
    Levi Taiji Li, Ningyu He(s), Haoyu Wang, Mu Zhang
    NDSS 2024 PDF

  56. MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots
    Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu
    NDSS 2024 PDF

  57. NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
    Shaofei Li, Feng Dong(s), Ding Li, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen
    NDSS 2024 PDF

  58. WaDec: Decompiling WebAssembly Using Large Language Model
    Xinyu She(s)#, Yanjie Zhao(s)#, and Haoyu Wang*
    ASE 2024 PDF

  59. GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models
    Zhibo Zhang(s), Wuxia Bai(s), Yuxi Li(s), Huasong Meng, Kailong Wang, Ling Shi, Li Li, Jun Wang and Haoyu Wang
    ASE 2024 PDF

  60. Semantic-Enhanced Indirect Call Analysis with Large Language Models
    Baijun Cheng(s), Cen Zhang, Kailong Wang, Ling Shi, Yang Liu, Haoyu Wang, Yao Guo, Xiangqun Chen
    ASE 2024 PDF

  61. GPTZoo: A Large-scale Dataset of GPTs for the Research Community
    Xinyi Hou(s), Yanjie Zhao(s), Shenao Wang(s) and Haoyu Wang
    ASE 2024, The New Ideas and Emerging Results (NIER) Track PDF

  62. Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps
    Zikan Dong(s), Yanjie Zhao(s), Tianming Liu(s), Chao Wang(s), Guosheng Xu, Guoai Xu, Lin Zhang, Haoyu Wang
    ASE 2024 Industry Track PDF

  63. Android Malware Family Labeling: Perspectives from the Industry
    Liu Wang(s), Haoyu Wang, Tao Zhang, Haitao Xu, Guozhu Meng, Peiming Gao, Chen Wei, and Yi Wang
    ASE 2024 Industry Track PDF

  64. Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs
    Jian Zhao(s)#, Shenao Wang(s)#, Yanjie Zhao(s), Xinyi Hou(s), Kailong Wang, Peiming Gao, Yuanchao Zhang, Chen Wei, Haoyu Wang
    ASE 2024 Industry Track PDF

  65. Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments
    Xinyi Zheng(s), Chen Wei, Shenao Wang(s), Yanjie Zhao(s), Peiming Gao, Yuanchao Zhang, Kailong Wang, Haoyu Wang
    ASE 2024 Industry Track PDF

  66. A First Look at LLM-powered Smartphones
    Liangxuan Wu(s), Yanjie Zhao(s), Chao Wang(s), Tianming Liu(s) and Haoyu Wang
    A-Mobile 2024, Co-located with ASE 2024 PDF

  67. Towards Demystifying Android Adware: Dataset and Payload Location
    Chao Wang(s), Tianming Liu(s), Yanjie Zhao(s), Lin Zhang, Xiaoning Du, Li Li and Haoyu Wang
    A-Mobile 2024, Co-located with ASE 2024 PDF

  68. NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps
    Jikai Wang(s), Haoyu Wang*
    The 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024) PDF

  69. WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation
    Shangtong Cao(s), Ningyu He(s), Xinyu She(s), Yixuan Zhang(s), Mu Zhang, and Haoyu Wang*
    The 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024) PDF

  70. Following the "Thread": Toward Finding Manipulatable Bottlenecks In Blockchain Clients
    Shuohan Wu, Zihao Li, Hao Zhou, Xiapu Luo, Jianfeng Li and Haoyu Wang
    The 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024) PDF

  71. SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries
    Ningyu He(s), Zhehao Zhao, Hanqin Guan, Jikai Wang(s), Shuo Peng(s), Ding Li, Haoyu Wang, Xiangqun Chen, and Yao Guo
    ISSTA 2024, Tool Demo Track PDF

  72. Drowzee: Metamorphic Testing for Fact-conflicting Hallucination Detection in Large Language Models
    Ningke Li(s), Yuekang Li, Yi Liu, Ling Shi, Kailong Wang and Haoyu Wang
    OOPSLA 2024 PDF

  73. Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection
    Yuxi Li(s), Yi Liu, Gelei Deng, Ying Zhang, Wenjia Song, Ling Shi, Kailong Wang, Yuekang Li, Yang Liu, and Haoyu Wang
    The 2024 ACM International Conference on the Foundations of Software Engineering (FSE 2024) PDF

  74. WASMixer: Binary Obfuscation for WebAssembly
    Shangtong Cao(s)#, Ningyu He(s)#, Yao Guo, and Haoyu Wang*
    The 29th European Symposium on Research in Computer Security (ESORICS 2024) PDF

  75. MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty
    Haodong Li(s), Guosheng Xu*, Liu Wang(s), Xusheng Xiao, Xiapu Luo, Guoai Xu, and Haoyu Wang*
    ICSE 2024 PDF

  76. Miracle or Mirage? A Measurement Study of NFT Rug Pulls
    Jintao Huang(s), Ningyu He(s), Kai Ma(s), Jiang Xiao, Haoyu Wang*
    SIGMETRICS 2024 PDF

  77. ConFuzz: Towards Large Scale Fuzz Testing of Smart Contracts in Ethereum
    Taiyu Wong, Chao Zhang, Yuandong Ni, Mingsen Luo, Heying Chen, Yufei Yu, Weilin Li, Xiapu Luo, Haoyu Wang
    INFOCOM 2024 PDF

  78. Unveiling the Paradox of NFT Prosperity
    Jintao Huang(s), Pengcheng Xia(s), Jiefeng Li(s), Kai Ma(s), Gareth Tyson, Xiapu Luo, Lei Wu, Yajin Zhou, Wei Cai, Haoyu Wang*
    The Web Conference 2024 (WWW'24) PDF

  79. Is it safe to share your files? An Empirical Security Analysis of Google Workspace
    Liuhuo Wan, Kailong Wang, Haoyu Wang, Guangdong Bai
    The Web Conference 2024 (WWW'24) PDF

  80. Don’t bite off more than you can chew: Investigating Excessive Permission Requests in Trigger-Action Integrations
    Liuhuo Wan, Kailong Wang, Kulani Tharaka Mahadewa, Haoyu Wang, Guangdong Bai
    The Web Conference 2024 (WWW'24) PDF

  81. EVMBT: A Binary Translation Scheme for Upgrading EVM Smart Contracts to WASM
    Weimin Chen, Xiapu Luo, Haoyu Wang, Heming Cui, Shuyu Zheng, Xuanzhe Liu
    The 25th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES 2024) PDF

  82. Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain
    Kai Ma(s)#, Zhuo Wang(s)#, Yanjie Zhao(s), and Haoyu Wang*
    Internetware 2024 PDF

  83. ChatGPT Chats Decoded: Uncovering Prompt Patterns for Superior Solutions in Software Development Lifecycle
    Liangxuan Wu(s), Yanjie Zhao(s), Xinyi Hou(s), Tianming Liu(s), Haoyu Wang*
    The 21st International Conference on Mining Software Repositories (MSR 2024), Mining Challenge PDF

  84. Global Prosperity or Local Monopoly? Understanding the Geography of App Popularity
    Liu Wang(s), Conghui Zheng(s), Haoyu Wang*, Xiapu Luo, Gareth Tyson, Yi Wang*, Shangguang Wang
    The 21st International Conference on Mining Software Repositories (MSR 2024) PDF

  85. MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation
    Guanyu Wang(s), Yuekang Li, Yi Liu, Gelei Deng, Tianlin Li, Guosheng Xu, Yang Liu, Haoyu Wang, Kailong Wang
    The first special event of AI Foundation Models and Software Engineering (FORGE 2024) PDF

  86. Analyzing Excessive Permission Requests in Google Workspace Add-ons
    Liuhuo Wan, Chuan Yan, Mark Huasong Meng, Kailong Wang, and Haoyu Wang
    The 28th International Conference on Engineering of Complex Computer Systems (ICECCS 2024) PDF

  87. SoK: On the Security of Non-Fungible Tokens
    Kai Ma(s)#, Jintao Huang(s)#, Ningyu He(s)#, Zhuo Wang, and Haoyu Wang*
    International Conference on Blockchain Research and Applications (BCRA 2024) Best Paper AWARD PDF

  88. VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts
    Yixuan Zhang(s), Shuyu Zheng(s), Haoyu Wang*, Lei Wu, Gang Huang, Xuanzhe Liu
    ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS) PDF

  89. Unearthing Gas-Wasting Code Smells in Smart Contracts with Large Language Models
    Jinan Jiang, Zihao Li, Haoran Qin, Muhui Jiang, Xiapu Luo, Xiaoming Wu, Haoyu Wang, Yutian Tang, Chenxiong Qian, Ting Chen
    IEEE Transactions on Software Engineering (TSE) PDF

  90. Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors
    Baijun Cheng(s), Shengming Zhao(s), Kailong Wang*, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo*, Lei Ma, Haoyu Wang*
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  91. A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation
    Ningyu He(s), Haoyu Wang*, Lei Wu, Xiapu Luo, Yao Guo*, and Xiangqun Chen
    Frontiers of Computer Science PDF

  92. LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability Types
    Xin-Cheng Wen, Cuiyun Gao, Feng Luo, Haoyu Wang, Ge Li, Qing Liao
    IEEE Transactions on Software Engineering (TSE) PDF

  93. DefiRanger: Detecting DeFi Price Manipulation Attacks
    Siwei Wu, Zhou Yu(s), Dabao Wang, Yajin Zhou, Lei Wu, Haoyu Wang, Xiangliang Yuan
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  94. WalletRadar: Towards Automating the Detection of Vulnerabilities in Browser-based Cryptocurrency Wallets
    Xia. P(s)#, Guo. Y, Lin. Z, Wu. J, Duan. P, He. N, Wang. K, Liu. T, Yue. Y, Xu. G, and Haoyu Wang
    Automated Software Engineering PDF

  95. Characterizing the App Recommendation Relationships in the iOS App Store: A Complex Network's Perspective
    Gang Huang, Fuqin Lin, Yun Ma*, Haoyu Wang*, Qingxiang Wang, Gareth Tyson, and Xuanzhe Liu
    SCIENCE CHINA: Information Sciences PDF


  96. 2023

  97. Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples
    Jingjing Wang(s)#, Liu Wang(s)#, Feng Dong*, Haoyu Wang*
    ACM Internet Measurement Conference 2023 (IMC'23) PDF

  98. TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum
    Bowen He, Yuan Chen, Zhuo chen, Xiaohui Hu(s), Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou
    ACM CCS 2023 PDF

  99. Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
    Feng Dong(s), Shaofei Li, Peng Jiang, Ding Li*, Haoyu Wang*, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen
    ACM CCS 2023 PDF

  100. Characterizing and Detecting WebAssembly Runtime Bugs
    Yixuan Zhang(s), Shangtong Cao(s), Haoyu Wang*, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma*, Gang Huang, Xuanzhe Liu
    ACM Transactions on Software Engineering and Methodology PDF

  101. BREWasm: A General Static Binary Rewriting Framework for WebAssembly
    Shangtong Cao(s)#, Ningyu He(s)#, Yao Guo, and Haoyu Wang*
    The 30th Static Analysis Symposium (SAS 2023) PDF

  102. WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs
    S. Meng (s)#, L. Wang(s)#, S. Wang(s), K. Wang*, X. Xiao, G. Bai, and Haoyu Wang*
    The 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023) PDF

  103. WADIFF: A Differential Testing Framework for WebAssembly Runtimes
    Shiyao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang, Xiapu Luo
    The 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023) PDF

  104. MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains
    Ningke Li(s), Shenao Wang(s), Mingxi Feng(s), Kailong Wang*, Meizhen Wang, Haoyu Wang*
    The 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023), Industry Challenge Track (full paper) PDF

  105. Ransomware as a Service: Demystifying Android Ransomware Generators
    Can Tu(s), Liu Wang(s), Yang Xu, Yiping Zhao(s), Haitao Xu, Haoyu Wang*
    SecureComm 2023 PDF

  106. DISTDET: A Cost-Effective Distributed Cyber Threat Detection System
    Feng Dong(s), Liu Wang(s), Xu Nie(s), Fei Shao, Haoyu Wang*, Ding Li, Xiapu Luo and Xusheng Xiao
    USENIX Security 2023 PDF

  107. MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries
    Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang
    USENIX Security 2023 PDF

  108. Understanding and Tackling Label Errors in Deep Learning-based Vulnerability Detection
    Xu Nie(s)#, Ningke Li(s)#, Kailong Wang*, Shangguang Wang, Xiapu Luo, Haoyu Wang*
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023) PDF

  109. Eunomia: Enabling User-specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries
    Ningyu He, Zhehao Zhao, Jikai Wang(s), Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, and Yao Guo
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023) PDF ACM SIGSOFT Distinguished Paper AWARD

  110. CydiOS: a model-based testing framework for iOS apps
    Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang(s), Kaifa Zhao, Haoyu Wang, Chenxiong Qian, Xiapu Luo
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023) PDF

  111. ScamRadar: Identifying Blockchain Scams When They are Promoting
    Xinzhe Zheng(s), Pengcheng Xia(s), Kailong Wang and Haoyu Wang*
    BlockSys 2023 PDF Best Student Paper AWARD

  112. A Deep Dive into the Featured iOS Apps
    Liu Wang(s), Haoyu Wang*, Huiyi Wang, Li Li, and Yi Wang*
    The 14th Asia-Pacific Symposium on Internetware (Internetware 2023) PDF

  113. Characterizing Cryptocurrency-themed Malicious Browser Extensions
    Kailong Wang, Yuxi Ling, Yanjun Zhang, Zhou Yu(s), Haoyu Wang*, Guangdong Bai*, Beng Chin Ooi, Jin Song Dong
    ACM SIGMETRICS 2023 PDF

  114. Are Mobile Advertisements in Compliance with App’s Age Group?
    Yanjie Zhao, Tianming Liu, Haoyu Wang, Yepang Liu, John Grundy, and Li Li
    The Web Conference 2023 (WWW 2023) PDF

  115. FaaSLite: Application-Level FaaS Optimization for Cold Start Latency in Serverless Computing
    Xuanzhe Liu, Jinfeng Wen, Zhenpeng Chen, Ding Li, Junkai Chen, Yi Liu, Haoyu Wang, Xin Jin
    ACM Transactions on Software Engineering and Methodology
    Selected for ASE 2023 journal-first presentation PDF

  116. Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective
    Xuanzhe Liu, Diandian Gu, Zhenpeng Chen, Jinfeng Wen, Zili Zhang, Yun Ma, Haoyu Wang, Xin Jin
    ACM Transactions on Software Engineering and Methodology
    Selected for ASE 2023 journal-first presentation PDF

  117. On the Usage-scenario-based Data Minimization in Mini Programs
    Shenao Wang(s), Yanjie Zhao(s), Kailong Wang, Haoyu Wang
    The 2023 ACM Workshop on Secure and Trustworthy Superapps (SaTS'23), co-located with CCS'23 PDF

  118. Potential Risks Arising from the Absence of Signature Verification in Miniapp Plugins
    Yanjie Zhao(s), Yue Zhang, Haoyu Wang
    The 2023 ACM Workshop on Secure and Trustworthy Superapps (SaTS'23), co-located with CCS'23 PDF


  119. 2022

  120. Challenges in Decentralized Name Management: The Case of ENS
    Pengcheng Xia(s), Haoyu Wang*, Zhou Yu(s), Xinyu Liu(s), Xiapu Luo, Guoai Xu, and Gareth Tyson
    The 2022 ACM Internet Measurement Conference (IMC'22) PDF

  121. MalWhiteout: Reducing Label Errors in Android Malware Detection
    Liu Wang(s), Haoyu Wang*, Xiapu Luo, and Yulei Sui
    The 37th IEEE/ACM International Conference on Automated Software Engineering (ASE 2022) PDF

  122. Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions
    Yuxi Ling, Kailong Wang, Guangdong Bai*, Haoyu Wang*, and Jin Song Dong
    The 37th IEEE/ACM International Conference on Automated Software Engineering (ASE 2022) PDF

  123. Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade Era
    Zikan Dong(s), Liu Wang(s), Hao Xie(s), Guoai Xu and Haoyu Wang*
    A-Mobile Workshop, co-located with ASE'22 PDF

  124. What Did You Pack in My App? A Systematic Analysis of Commercial Android Packers
    Zikan Dong(s), Hongxuan Liu(s), Liu Wang(s), Xiapu Luo, Yao Guo,Guoai Xu, Xusheng Xiao, and Haoyu Wang*
    ESEC/FSE 2022 (Industry Track) PDF

  125. Demystifying "Removed Reviews" in iOS App Store
    Liu Wang(s), Haoyu Wang*, Xiapu Luo, Tao Zhang, Shangguang Wang, and Xuanzhe Liu
    ESEC/FSE 2022 (Industry Track) PDF

  126. Uncovering Intent based Leak of Sensitive Data in Android Framework
    Hao Zhou, Xiapu Luo, Haoyu Wang, Haipeng Cai
    The 29th ACM Conference on Computer and Communications Security (CCS 2022) PDF

  127. MalRadar: Demystifying Android Malware in the New Era
    Liu Wang(s), Haoyu Wang*, Ren He(s), Ran Tao(s), Guozhu Meng, Xiapu Luo, Xuanzhe Liu
    ACM SIGMETRICS 2022 (Acceptance Rate = 11%, Winter Deadline) PDF

  128. Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection
    Xiao Cheng, Guanqin Zhang, Haoyu Wang, Yulei Sui
    The 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA '22) PDF

  129. WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts
    Weimin Chen(s), Zihan Sun(s), Haoyu Wang*, Xiapu Luo*, Haipeng Cai, Lei Wu
    The 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA '22) PDF

  130. A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity
    Liu Wang(s), Haoyu Wang*, Yi Wang, Gareth Tyson, Fei Lyu
    The 9th IEEE/ACM International Conference on Mobile Software Engineering and Systems 2022 (MobileSoft 2022) PDF

  131. Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit
    Guosheng Xu, Siyi Li(s), Hao Zhou, Shucen Liu, Yutian Tang, Li Li, Xiapu Luo, Xusheng Xiao, Guoai Xu* and Haoyu Wang*
    The ACM Web Conference 2022 (WWW '22) PDF

  132. How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors
    Xiao Cheng, Xu Nie(s), Ningke Li(s), Haoyu Wang, Zheng Zheng, Yulei Sui
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  133. APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps
    Yanjie Zhao, Li Li, Haoyu Wang, Qiang He, John Grundy
    IEEE Transactions on Software Engineering (TSE) PDF


  134. ===================================================================================================

    ↑ ↑ ↑ ↑ ↑ Publications after Joining HUST ↑ ↑ ↑ ↑ ↑

    ===================================================================================================

  135. Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange
    Pengcheng Xia(s), Haoyu Wang*, Bingyu Gao(s), Weihang Su(s), Zhou Yu(s), Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu
    ACM SIGMETRICS 2022 (Acceptance Rate = 16%, Summer Deadline) PDF

  136. Uncovering Cross-Context Inconsistent Access Control Enforcement in Android
    Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang
    The Network and Distributed System Security Symposium (NDSS 2022) PDF

  137. DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps
    Shao Yang, Yuehan Wang, Yuan Yao, Haoyu Wang, Yanfang Ye, Xusheng Xiao
    The 44th International Conference on Software Engineering (ICSE 2022) PDF

  138. Promal: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning
    Changlin Liu, Hanlin Wang, Tianming Liu(s), Diandian Gu, Yun Ma, Haoyu Wang, Xusheng Xiao
    The 44th International Conference on Software Engineering (ICSE 2022) PDF

  139. Towards Automatically Localizing Function Errors in Mobile Apps with User Reviews
    Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao
    IEEE Transactions on Software Engineering (TSE) PDF

  140. BATscope: Demystifying Malicious Addresses and Mixing Transactions in Bitcoin (In Chinese)
    WONG Taiyu, YIN Tingting, LI Yun, QIN Siliang, REN Xin, LUO Xiapu, WANG Haoyu, YIN Xia, ZHANG Chao
    Journal of Cyber Security PDF


  141. 2021

  142. Finding the Missing Piece: Permission Specification Analysis for Android NDK
    Hao Zhou, Haoyu Wang, Shuohan Wu, Xiapu Luo, Yajin Zhou, Ting Chen, Ting Wang
    The 36th IEEE/ACM International Conference on Automated Software Engineering (ASE 2021) PDF

  143. SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts
    Weimin Chen(s), Xinran Li(s), Yuting Sui(s), Ningyu He(s), Haoyu Wang*, Lei Wu, and Xiapu Luo.
    ACM SIGMETRICS 2021 (Acceptance Rate: 12%, winter deadline), published in ACM POMACS PDF

  144. Tracking Counterfeit Cryptocurrency End-to-end
    Bingyu Gao(s), Haoyu Wang*, Pengcheng Xia(s), Siwei Wu, Yajin Zhou, Xiapu Luo, and Gareth Tyson.
    ACM SIGMETRICS 2021 (Acceptance Rate: 16%, summer deadline), published in ACM POMACS PDF

  145. EOSafe: Security analysis of EOSIO smart contracts
    Ningyu He(s), Ruiyi Zhang, Haoyu Wang*, Lei Wu*, Xiapu Luo, Yao Guo*, Ting Yu, and Xuxian Jiang.
    Proceedings of The 30th USENIX Security Symposium (USENIX Security 2021) PDF

  146. CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies
    Yangyu Hu(s)#, Haoyu Wang*#, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao and Yao Guo.
    Proceedings of the 43rd ACM/IEEE International Conference on Software Engineering (ICSE 2021) PDF

  147. DeepBackdoor: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection
    Yuanchun Li, Jiayi Hua(s), Haoyu Wang*, Chunyang Chen and Yunxin Liu.
    Proceedings of the 43rd ACM/IEEE International Conference on Software Engineering (ICSE 2021) PDF

  148. An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications
    Zhenpeng Chen, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, and Xuanzhe Liu*.
    Proceedings of the 43rd ACM/IEEE International Conference on Software Engineering (ICSE 2021) PDF

  149. Demystifying Illegal Mobile Gambling Apps
    Yuhao Gao(s), Haoyu Wang*, Li Li, Xiapu Luo, Xuanzhe Liu and Guoai Xu*.
    Proceedings of the 30th The Web Conference (WWW 2021), acceptance rate = 20.6% PDF

  150. A Longitudinal Study of Removed Apps in iOS App Store
    Fuqi Lin(s)#, Haoyu Wang*#, Liu Wang(s) and Xuanzhe Liu*.
    Proceedings of the 30th The Web Conference (WWW 2021), acceptance rate = 20.6% PDF

  151. Towards Understanding and Demystifying Bitcoin Mixing Services
    Lei Wu, Yufeng Hu, Yajin Zhou*, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang and Kui Ren.
    Proceedings of the 30th The Web Conference (WWW 2021), acceptance rate = 20.6% PDF

  152. Beyond the Virus: A First Look at Coronavirus-themed Android Malware
    Liu Wang(s)#, Ren He(s)#, Haoyu Wang*, Pengcheng Xia(s), Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yulei Sui, Yao Guo, Guoai Xu.
    Empirical Software Engineering (EMSE) PDF Github Zenodo

  153. DeepWukong: Statically Detecting Software Vulnerabilities using Deep Graph Neural Network
    Xiao Cheng(s), Haoyu Wang*, Jiayi Hua(s), Guoai Xu* and Yulei Sui.
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  154. On the Impact of Sample Duplication in Machine Learning based Android Malware Detection
    Yanjie Zhao, Li Li, Haoyu Wang, Haipeng Cai, Tegawende F. Bissyande, Jacques Klein, John Grundy.
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  155. XDebloat: Towards Automated Feature-Oriented App Debloating
    Yutian Tang, Hao Zhou, Xiapu Luo, Ting Chen, Haoyu Wang, Zhou Xu, and Yan Cai
    IEEE Transactions on Software Engineering (TSE) PDF

  156. A Systematic Assessment on Android Third-party Library Detection Tools
    Xian Zhan, Tianming Liu(s), Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo
    IEEE Transactions on Software Engineering (TSE) PDF

  157. A Systematical Study on Application Performance Management Libraries for Apps
    Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung.
    IEEE Transactions on Software Engineering (TSE) PDF

  158. Make Web3.0 Connected
    Zhuotao Liu, Yangxi Xiang(s), Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, Yih-Chun Hu.
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  159. Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns
    Pengcheng Xia(s), Mohamed Nabeel, Issa Khalil, Haoyu Wang and Ting Yu.
    Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (CODASPY 2021) PDF

  160. MMGuard: Automatically Protecting On-Device Deep Learning Models in Android Apps
    Jiayi Hua(s), Yuanchun Li, Haoyu Wang*.
    Proceedings of the 4th Deep Learning and Security Workshop (DLS 2021), Co-located with S&P 2021 PDF Github

  161. On the Effectiveness of Deep Vulnerability Detectors to Simple Stupid Bug Detection
    Jiayi Hua(s), Haoyu Wang*.
    Proceedings of the 2021 Mining Software Repositories Conference (MSR'21), Mining Challenge Track PDF

  162. Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem
    Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang and Kui Ren.
    Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, co-located with ASIACCS'21 PDF

  163. Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms
    Yixue Zhao, Siwei Yin(s), Adriana Sejfia, Marcelo Schmitt Laser, Haoyu Wang and Nenad Medvidovic.
    MobileSoft'21, co-located with ICSE'21 PDF

  164. Towards Understanding iOS App Store Search Advertising: An Explorative Study
    Siming Su(s), Haoyu Wang* and Guoai Xu.
    MobileSoft'21, co-located with ICSE'21 PDF

  165. A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories
    Liu Wang(s), Ruiqing Li, Jiaxin Zhu, Guangdong Bai and Haoyu Wang*.
    IEEE Computer Society Signature Conference on Computers, Software and Applications (COMPSAC 2021) PDF

  166. Understanding the Impact of COVID-19 on Github Developers: A Preliminary Study
    Liu Wang(s), Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Weihang Su(s) and Haoyu Wang*.
    The 33rd International Conference on Software Engineering & Knowledge Engineering (SEKE'21) PDF



  167. 2020

  168. Understanding (Mis)Behavior on the EOSIO Blockchain
    Yuheng Huang(s), Haoyu Wang*, Lei Wu*, Gareth Tyson, Xiapu Luo, Run Zhang(s), Xuanzhe Liu, Gang Huang and Xuxian Jiang.
    ACM SIGMETRICS 2020 (Acceptance Rate: 15%), published in ACM POMACS PDF

  169. Flow2Vec: Value-Flow-Based Precise Code Embedding
    Yulei Sui, Xiao Cheng(s), Guanqin Zhang, and Haoyu Wang.
    Proceedings of ACM OOPSLA 2020 PDF ACM SIGPLAN Distinguished Paper AWARD

  170. Mobile App Squatting
    Yangyu Hu(s), Haoyu Wang*, Ren He(s), Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu and Guoai Xu*.
    Proceedings of the Web Conference 2020 (WWW'20), acceptance rate = 19%, Full paper, Oral.
    PDF BEST STUDENT PAPER AWARD (the first award in China)

  171. MadDroid: Characterising and Detecting Devious Ad Content for Android Apps
    Tianming Liu#(s), Haoyu Wang#*, Li Li, Xiapu Luo, Feng Dong(s), Yao Guo, Liu Wang(s), Tegawende F. Bissyande and Jacques Klein
    Proceedings of the Web Conference 2020 (WWW'20), acceptance rate = 19%, Full paper, Oral. PDF

  172. DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts
    Ru Ji(s)#, Ningyu He(s)#, Lei Wu, Haoyu Wang*, Guangdong Bai and Yao Guo.
    Proceedings of the 25th International Conference on Engineering of Complex Computer Systems (ICECCS 2020)
    Media Coverage: CoinDesk, Yahoo Finance, Coin Geek, Publish0x, nasdaq.com, Cryptonews, CoinGenius PDF

  173. Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams
    Pengcheng Xia(s), Haoyu Wang*, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu.
    Proceedings of APWG Symposium on Electronic Crime Research (eCrime 2020) PDF Dataset

  174. Demystifying Diehard Android Apps
    Hao Zhou, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue and Ting Wang.
    The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), acceptance rate = 22.5%. PDF

  175. Automated Third-party Library Detection for Android Applications: Are We There Yet?
    Xian Zhan, Lingling Fan, Tianming Liu(s), Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo and Yang Liu.
    The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), acceptance rate = 22.5%. PDF

  176. UI Obfuscation and its Effects on Automated UI Analysis for Android Apps
    Hao Zhou, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang and Wei Zhang.
    The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), acceptance rate = 22.5%. PDF

  177. All Your App Links are Belong to Us: Understanding the Threats of Instant Apps based Attacks
    Yutian Tang, Yulei Sui, Haoyu Wang, Xiapu Luo, Hao Zhou and Zhou Xu.
    ESEC/FSE 2020. PDF

  178. A Comprehensive Study on Challenges in Deploying Deep Learning Based Software
    Zhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie and Xuanzhe Liu*.
    ESEC/FSE 2020. PDF

  179. Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
    Ningyu He(s), Lei Wu, Haoyu Wang*, Yao Guo*, and Xuxian Jiang.
    The 24th International Conference on Financial Cryptography and Data Security 2020 (FC'20), acceptance rate = 22%. PDF

  180. A3IDENT: A Two-phased Approach to Identify the Leading Authors of Android Apps
    Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge and Xiaohong Li.
    IEEE International Conference on Software Maintenance and Evolution (ICSME 2020) PDF

  181. Characterizing Cryptocurrency Exchange Scams
    Pengcheng Xia(s), Haoyu Wang*, Bowen Zhang(s), Ru Ji(s), Bingyu Gao(s), Lei Wu, Xiapu Luo, and Guoai Xu.
    Elsevier Computers & Security (COSE, IF=3.579) PDF

  182. Market-level Analysis of Government-backed COVID-19 Contact Tracing Apps
    Huiyi Wang(s), Liu Wang(s), and Haoyu Wang*.
    The International Workshop on Advances in Mobile App Analysis (A-Mobile 2020), co-located with ASE 2020 PDF

  183. KnowledgeZooClient: Constructing Knowledge Graph for Android
    Li Li, Jun Gao, Pingfan Kong, Haoyu Wang, Mengyu Huang, Yuan-Fang Li and Tegawende F. Bissyande
    The International Workshop on Advances in Mobile App Analysis (A-Mobile 2020), co-located with ASE 2020 PDF

  184. Dissecting Mobile Offerwall Advertisements: An Explorative Study
    Guosheng Xu, Yangyu Hu(s), Qian Guo(s), Ren He(s), Li Li, Guoai Xu, Zhihui Han, Haoyu Wang
    The 20th IEEE International Conference on Software Quality, Reliability, and Security (QRS'20) PDF

  185. Does the Presence of Privacy Relevant Information Affect App Market Choice?
    Maria K Wolters, Shuobing Li, Haoyu Wang, Xinyu Yang(s), and Yao Guo
    The ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'20), Late-Breaking Work. PDF

  186. Same origin based fine-grained privacy protection for mobile applications
    Wenxiong Lu(s), Haoyu Wang*
    Invited Paper, BIG DATA RESEARCH (in Chinese). PDF



  187. 2019

  188. Automated Deobfuscation of Android Native Binary Code
    Zeliang Kan(s), Haoyu Wang, Lei Wu, Yao Guo, and Xiapu Luo. PDF Tool (Github)

  189. EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level
    Lijin Quan(s), Lei Wu, and Haoyu Wang*. PDF Tool (Github) Demo

  190. DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps
    Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lv.
    The 26th ACM Conference on Computer and Communications Security (ACM CCS 2019) PDF

  191. HyperService: Interoperability and Programmability across Heterogeneous Blockchains
    Zhuotao Liu*, Yangxi Xiang(s), Jian Shi, Peng Gao, Haoyu Wang*, Xusheng Xiao, Bihan Wen, Yih-Chun Hu.
    The 26th ACM Conference on Computer and Communications Security (ACM CCS 2019) PDF

  192. Characterizing Android App Signing Issues
    Haoyu Wang, Hongxuan Liu(s), Xusheng Xiao, Guozhu Meng, and Yao Guo.
    The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), full paper. PDF

  193. DaPanda: Detecting Aggressive Push Notification in Android Apps
    Tianming Liu#(s), Haoyu Wang#*, Li Li, Guangdong Bai, Yao Guo and Guoai Xu.
    The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), full paper. PDF

  194. Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications
    Yangyu Hu(s), Haoyu Wang*, Yajin Zhou*, Yao Guo, Li Li, Bingxuan Luo(s), Fangren Xu(s).
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  195. Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play
    Haoyu Wang, Hao Li and Yao Guo.
    THE WEB CONFERENCE 2019 (WWW 2019), acceptance rate = 18% , full paper. PDF

  196. Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding
    Xiao Cheng(s), Haoyu Wang*, Jiayi Hua(s), Miao Zhang, Guoai Xu, Li Yi* and Yulei Sui.
    The 24th International Conference on Engineering of Complex Computer Systems (ICECCS 2019) PDF

  197. AppNet: Understanding App Recommendation in Google Play
    Qian Guo(s), Haoyu Wang, Chenwei Zhang, Yao Guo and Guoai Xu.
    The 3rd International Workshop on App Market Analytics (WAMA 2019), co-located with ESEC/FSE 2019. PDF

  198. LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking
    Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong and Haoyu Wang.
    The 22nd Information Security Conference (ISC 2019) PDF

  199. Deobfuscating Android Native Binary Code
    Zeliang Kan(s), Haoyu Wang, Lei Wu, Yao Guo and Guoai Xu.
    The 41st ACM/IEEE International Conference on Software Engineering (ICSE 2019), Poster Track (Invitation). PDF

  200. Revisiting the Impact of Common Libraries for Android-related Investigations
    Li Li, Timothee Riom, Tegawende F. Bissyande, Haoyu Wang, Jacques Klein, and Yves Le Traonb.
    Journal of Systems and Software (JSS) PDF

  201. Characterizing the Global Mobile App Developers: A Large-scale Empirical Study
    Haoyu Wang, Xupu Wang(s) and Yao Guo.
    IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2019) PDF

  202. RmvDroid: Towards A Reliable Android Malware Dataset with App Metadata
    Haoyu Wang, Junjun Si, Hao Li and Yao Guo.
    The 16th International Conference on Mining Software Repositories (MSR 2019), Data Showcase. PDF

  203. Want to Earn a Few Extra Bucks? A First Look at Money-making Apps
    Yangyu Hu(s), Haoyu Wang*, Li Li, Yao Guo, Guoai Xu* and Ren He(s)
    IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2019) PDF

  204. Knowledge Graphing Git Repositories: A Preliminary Study
    Yanjie Zhao(s), Haoyu Wang*, Lei Ma, Yuxin Liu, Li Li and John Grundy.
    IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2019), ERA Track. PDF

  205. On Identifying and Explaining Similarities in Android Apps
    Li Li, Tegawende F. Bissyande, Haoyu Wang and Jacques Klein.
    Journal of Computer Science and Technology (JCST) PDF

  206. AppAuth: Authorship Attribution for Android App Clones
    Guoai Xu, Chengpeng Zhang(s), Bowen Sun(s), Xinyu Yang(s), Yanhui Guo, Chengze Li(s), Haoyu Wang. PDF

  207. Mobile Device Security
    Miao Zhang, Shuai Shao, Haoyu Wang.
    BOOK (textbook for undergraduate student), BUPT Press

  208. Mobile Application Security
    Haoyu Wang, Guoai Xu, Yao Guo.
    BOOK (textbook for graduate student), BUPT Press



  209. 2018

  210. Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets
    Haoyu Wang, Zhe Liu(s), Jingyue Liang(s), Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu.
    ACM Internet Measurement Conference (IMC 2018), our paper is the only one coming from Asia. PDF

  211. FraudDroid: Automated Ad Fraud Detection for Android Apps
    Feng Dong(s), Haoyu Wang*#, Li Li, Yao Guo, Tegawende F. Bissyande, Tianming Liu(s), Guoai Xu and Jacques Klein
    ESEC/FSE 2018 (acceptance rate of 19%) PDF

  212. CiD: Automating the Detection of API-related Compatibility Issues in Android Apps
    Li Li, Tegawende F. Bissyande, Haoyu Wang, Jacques Klein.
    The 27th International Symposium on Software Testing and Analysis (ISSTA 2018) PDF

  213. How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries?
    Feng Dong(s), Haoyu Wang*, Li Li, Yao Guo, Guoai Xu, Shaodong Zhang.
    The 19th Workshop on Mobile Computing Systems and Applications (HotMobile 2018) PDF

  214. Why are Android Apps Removed From Google Play? A Large-scale Empirical Study
    Haoyu Wang, Hao Li, Li Li, Yao Guo, Guoai Xu.
    The 15th International Conference on Mining Software Repositories (MSR 2018) PDF

  215. Towards Light-weight Deep Learning based Malware Detection
    Zeliang Kan(s), Haoyu Wang*, Guoai Xu*, Yao Guo, Xiangqun Chen.
    The 42nd IEEE International Conference on Computers, Software & Applications (COMPSAC 2018) PDF

  216. Re-checking App Behavior against App Description in the Context of Third-party Libraries
    Chengpeng Zhang(s), Haoyu Wang*, Ran Wang(s), Yao Guo, Guoai Xu*.
    The 30th International Conference on Software Engineering & Knowledge Engineering (SEKE 2018) PDF



  217. 2017

  218. An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective
    Haoyu Wang, Zhe Liu(s), Yao Guo, Xiangqun Chen, Miao Zhang, Guoai Xu and Jason Hong.
    Proceedings of the 26th International World Wide Web Conference (WWW 2017) PDF

  219. Understanding the Purpose of Permission Use in Mobile Apps
    Haoyu Wang, Yuanchun Li, Yao Guo, Yuvraj Agarwal, Jason Hong.
    ACM Transactions on Information Systems (TOIS) PDF

  220. Understanding Third-party Libraries in Mobile App Analysis
    Haoyu Wang and Yao Guo.
    ICSE 2017, Technical Briefings PDF

  221. Purpose-based Access Control for Android
    Haoyu Wang
    2017 USENIX Summit on Hot Topics in Security (HotSec '17) PDF

  222. CRSPR: PageRank for Android Apps
    Chengze Li(s), Haoyu Wang, Junfeng Wang, Qi Li, Jianbo Yu, Jingyi Guo, Guoai Xu and Yanhui Guo.
    IEEE ACCESS 14(8), 2017 PDF

  223. Automated Detection and Classification of Third-party Libraries in Large Scale Android Apps
    Haoyu Wang, Yao Guo, Ziang Ma and Xiangqun Chen.
    Journal of Software (in Chinese) PDF

  224. Privacy Rating for Mobile Apps based on Crowdsourcing and Machine-learning Techniques
    ZHANG Xianxian(s), WANG Haoyu, GUO Yao and XU Guoai.
    NASAC 2017 (in Chinese) PDF Best Paper Award

  225. Automated Detection of the Inconsistence between App Behavior and Privacy Policy of Android Apps
    WANG Jingyu(s), XU Mingkun, WANG Haoyu and XU Guoai.
    NASAC 2017 (in Chinese) PDF



  226. 2016 and Earlier

  227. Security Analytics for Mobile Apps: Achievements and Challenges
    Wei Yang, Xusheng Xiao, Dengfeng Li, Huoran Li, Xuanzhe Liu, Haoyu Wang, Yao Guo, and Tao Xie.
    Journal of Cyber Security (in Chinese), 1(2), pages 1-14, April 2016. PDF

  228. LibRadar: Detecting Third-party Libraries in Android Apps
    Ziang Ma, Haoyu Wang, Yao Guo and Xiangqun Chen.
    ICSE 2016 (Demo Track) PDF Tool Website

  229. Identifying and Analyzing the Privacy of Apps for Kids
    Minxing Liu, Haoyu Wang, Yao Guo and Jason Hong.
    The 17th International Workshop on Mobile Computing Systems and Applications (HotMobile 2016) PDF

  230. Using Text Mining to Infer the Purpose of Permission Use in Mobile Apps
    Haoyu Wang, Jason Hong and Yao Guo.
    The 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2015) PDF

  231. Reevaluating Android Permission Gaps with Static and Dynamic Analysis
    Haoyu Wang, Yao Guo, Zihao Tang, Guangdong Bai and Xiangqun Chen.
    IEEE GLOBECOM 2015 PDF

  232. WuKong: A Scalable and Accurate Two-Phase Approach to Android App Clone Detection
    Haoyu Wang, Yao Guo, Ziang Ma and Xiangqun Chen.
    International Symposium on Software Testing and Analysis (ISSTA 2015), Baltimore, MD, pp. 71-82. PDF

  233. Similarity-based Web Browser Optimization
    Haoyu Wang, Mengxin Liu, Yao Guo and Xiangqun Chen.
    The 23rd International World Wide Web Conference (WWW 2014), Seoul, Korea, pp 575-584, 2014. (acceptance rate: 12.9%) PDF

  234. Detecting repackaged Android applications based on code clone detection technique
    Haoyu Wang, Zhongyu Wang, Yao Guo and Xiangqun Chen.
    SCIENCE CHINA Information Sciences, 2014, 44 (1): 142-157. (in Chinese) PDF

  235. Mobile Web Browser Optimization in the Cloud Era: A Survey
    Haoyu Wang, Junjun Kong, Yao Guo and Xiangqun Chen.
    IEEE MobileCloud 2013 PDF