Summary: Full Papers in Top-tier Venues (91), CCF A (80), CSRankings (72), Best/Distinguished Paper Award (5)

* the corresponding author, # co-first authors

(s) the student/RA/postdoc I advised or co-advised during the work


    2024

  1. All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts
    Tianle Sun(s), Ningyu He(s), Jiang Xiao, Yinliang Yue, Xiapu Luo, and Haoyu Wang*
    USENIX Security 2024 PDF

  2. Exploring Covert Third-party Identifiers through External Storage in the Android New Era
    Zikan Dong(s)#, Tianming Liu(s)#, Jiapeng Deng(s), Haoyu Wang*, Li Li, Minghui Yang, Meng Wang, Guosheng Xu*, Guoai Xu
    USENIX Security 2024 PDF

  3. Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection
    Yuxi Li(s), Yi Liu, Gelei Deng, Ying Zhang, Wenjia Song, Ling Shi, Kailong Wang, Yuekang Li, Yang Liu, and Haoyu Wang
    The 2024 ACM International Conference on the Foundations of Software Engineering (FSE 2024) PDF

  4. WASMixer: Binary Obfuscation for WebAssembly
    Shangtong Cao(s)#, Ningyu He(s)#, Yao Guo, and Haoyu Wang*
    The 29th European Symposium on Research in Computer Security (ESORICS 2024) PDF

  5. Towards Smart Contract Fuzzing on GPU
    Weimin Chen, Xiapu Luo, Haipeng Cai and Haoyu Wang
    The 45th IEEE Symposium on Security and Privacy (Oakland'24) PDF

  6. MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty
    Haodong Li(s), Guosheng Xu*, Liu Wang(s), Xusheng Xiao, Xiapu Luo, Guoai Xu, and Haoyu Wang*
    ICSE 2024 PDF

  7. Miracle or Mirage? A Measurement Study of NFT Rug Pulls
    Jintao Huang(s), Ningyu He(s), Kai Ma(s), Jiang Xiao, Haoyu Wang*
    SIGMETRICS 2024 PDF

  8. Abusing the Ethereum Smart Contract Verification Services for Fun and Profit
    Pengxiang Ma(s)#, Ningyu He(s)#, Yuhua Huang, Haoyu Wang*, Xiapu Luo
    NDSS 2024 PDF

  9. VETEOS: Statically Vetting EOSIO Contracts for the “Groundhog Day” Vulnerabilities
    Levi Taiji Li, Ningyu He(s), Haoyu Wang, Mu Zhang
    NDSS 2024 PDF

  10. MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots
    Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu
    NDSS 2024 PDF

  11. NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
    Shaofei Li, Feng Dong(s), Ding Li, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen
    NDSS 2024 PDF

  12. ConFuzz: Towards Large Scale Fuzz Testing of Smart Contracts in Ethereum
    Taiyu Wong, Chao Zhang, Yuandong Ni, Mingsen Luo, Heying Chen, Yufei Yu, Weilin Li, Xiapu Luo, Haoyu Wang
    INFOCOM 2024 PDF

  13. Unveiling the Paradox of NFT Prosperity
    Jintao Huang(s), Pengcheng Xia(s), Jiefeng Li(s), Kai Ma(s), Gareth Tyson, Xiapu Luo, Lei Wu, Yajin Zhou, Wei Cai, Haoyu Wang*
    The Web Conference 2024 (WWW'24) PDF

  14. Is it safe to share your files? An Empirical Security Analysis of Google Workspace
    Liuhuo Wan, Kailong Wang, Haoyu Wang, Guangdong Bai
    The Web Conference 2024 (WWW'24) PDF

  15. Don’t bite off more than you can chew: Investigating Excessive Permission Requests in Trigger-Action Integrations
    Liuhuo Wan, Kailong Wang, Kulani Tharaka Mahadewa, Haoyu Wang, Guangdong Bai
    The Web Conference 2024 (WWW'24) PDF

  16. EVMBT: A Binary Translation Scheme for Upgrading EVM Smart Contracts to WASM
    Weimin Chen, Xiapu Luo, Haoyu Wang, Heming Cui, Shuyu Zheng, Xuanzhe Liu
    The 25th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES 2024) PDF

  17. ChatGPT Chats Decoded: Uncovering Prompt Patterns for Superior Solutions in Software Development Lifecycle
    Liangxuan Wu(s), Yanjie Zhao(s), Xinyi Hou(s), Tianming Liu(s), Haoyu Wang*
    The 21st International Conference on Mining Software Repositories (MSR 2024), Mining Challenge PDF

  18. Global Prosperity or Local Monopoly? Understanding the Geography of App Popularity
    Liu Wang(s), Conghui Zheng(s), Haoyu Wang*, Xiapu Luo, Gareth Tyson, Yi Wang*, Shangguang Wang
    The 21st International Conference on Mining Software Repositories (MSR 2024) PDF

  19. MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation
    Guanyu Wang(s), Yuekang Li, Yi Liu, Gelei Deng, Tianlin Li, Guosheng Xu, Yang Liu, Haoyu Wang, Kailong Wang
    The first special event of AI Foundation Models and Software Engineering (FORGE 2024) PDF

  20. Analyzing Excessive Permission Requests in Google Workspace Add-ons
    Liuhuo Wan, Chuan Yan, Mark Huasong Meng, Kailong Wang, and Haoyu Wang
    The 28th International Conference on Engineering of Complex Computer Systems (ICECCS 2024) PDF

  21. VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts
    Yixuan Zhang(s), Shuyu Zheng(s), Haoyu Wang*, Lei Wu, Gang Huang, Xuanzhe Liu
    ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS) PDF

  22. Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors
    Baijun Cheng(s), Shengming Zhao(s), Kailong Wang*, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo*, Lei Ma, Haoyu Wang*
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  23. A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation
    Ningyu He(s), Haoyu Wang*, Lei Wu, Xiapu Luo, Yao Guo*, and Xiangqun Chen
    Frontiers of Computer Science PDF

  24. LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability Types
    Xin-Cheng Wen, Cuiyun Gao, Feng Luo, Haoyu Wang, Ge Li, Qing Liao
    IEEE Transactions on Software Engineering (TSE) PDF

  25. DefiRanger: Detecting DeFi Price Manipulation Attacks
    Siwei Wu, Zhou Yu(s), Dabao Wang, Yajin Zhou, Lei Wu, Haoyu Wang, Xiangliang Yuan
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  26. WalletRadar: Towards Automating the Detection of Vulnerabilities in Browser-based Cryptocurrency Wallets
    Xia. P(s)#, Guo. Y, Lin. Z, Wu. J, Duan. P, He. N, Wang. K, Liu. T, Yue. Y, Xu. G, and Haoyu Wang
    Automated Software Engineering PDF

  27. Characterizing the App Recommendation Relationships in the iOS App Store: A Complex Network's Perspective
    Gang Huang, Fuqin Lin, Yun Ma*, Haoyu Wang*, Qingxiang Wang, Gareth Tyson, and Xuanzhe Liu
    SCIENCE CHINA: Information Sciences PDF


  28. 2023

  29. Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples
    Jingjing Wang(s)#, Liu Wang(s)#, Feng Dong*, Haoyu Wang*
    ACM Internet Measurement Conference 2023 (IMC'23) PDF

  30. TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum
    Bowen He, Yuan Chen, Zhuo chen, Xiaohui Hu(s), Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou
    ACM CCS 2023 PDF

  31. Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
    Feng Dong(s), Shaofei Li, Peng Jiang, Ding Li*, Haoyu Wang*, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen
    ACM CCS 2023 PDF

  32. Characterizing and Detecting WebAssembly Runtime Bugs
    Yixuan Zhang(s), Shangtong Cao(s), Haoyu Wang*, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma*, Gang Huang, Xuanzhe Liu
    ACM Transactions on Software Engineering and Methodology PDF

  33. BREWasm: A General Static Binary Rewriting Framework for WebAssembly
    Shangtong Cao(s)#, Ningyu He(s)#, Yao Guo, and Haoyu Wang*
    The 30th Static Analysis Symposium (SAS 2023) PDF

  34. WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs
    S. Meng (s)#, L. Wang(s)#, S. Wang(s), K. Wang*, X. Xiao, G. Bai, and Haoyu Wang*
    The 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023) PDF

  35. WADIFF: A Differential Testing Framework for WebAssembly Runtimes
    Shiyao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang, Xiapu Luo
    The 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023) PDF

  36. MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains
    Ningke Li(s), Shenao Wang(s), Mingxi Feng(s), Kailong Wang*, Meizhen Wang, Haoyu Wang*
    The 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023), Industry Challenge Track (full paper) PDF

  37. Ransomware as a Service: Demystifying Android Ransomware Generators
    Can Tu(s), Liu Wang(s), Yang Xu, Yiping Zhao(s), Haitao Xu, Haoyu Wang*
    SecureComm 2023 PDF

  38. DISTDET: A Cost-Effective Distributed Cyber Threat Detection System
    Feng Dong(s), Liu Wang(s), Xu Nie(s), Fei Shao, Haoyu Wang*, Ding Li, Xiapu Luo and Xusheng Xiao
    USENIX Security 2023 PDF

  39. MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries
    Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang
    USENIX Security 2023 PDF

  40. Understanding and Tackling Label Errors in Deep Learning-based Vulnerability Detection
    Xu Nie(s)#, Ningke Li(s)#, Kailong Wang*, Shangguang Wang, Xiapu Luo, Haoyu Wang*
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023) PDF

  41. Eunomia: Enabling User-specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries
    Ningyu He, Zhehao Zhao, Jikai Wang(s), Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, and Yao Guo
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023) PDF ACM SIGSOFT Distinguished Paper AWARD

  42. CydiOS: a model-based testing framework for iOS apps
    Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang(s), Kaifa Zhao, Haoyu Wang, Chenxiong Qian, Xiapu Luo
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023) PDF

  43. ScamRadar: Identifying Blockchain Scams When They are Promoting
    Xinzhe Zheng(s), Pengcheng Xia(s), Kailong Wang and Haoyu Wang*
    BlockSys 2023 PDF Best Student Paper AWARD

  44. A Deep Dive into the Featured iOS Apps
    Liu Wang(s), Haoyu Wang*, Huiyi Wang, Li Li, and Yi Wang*
    The 14th Asia-Pacific Symposium on Internetware (Internetware 2023) PDF

  45. Characterizing Cryptocurrency-themed Malicious Browser Extensions
    Kailong Wang, Yuxi Ling, Yanjun Zhang, Zhou Yu(s), Haoyu Wang*, Guangdong Bai*, Beng Chin Ooi, Jin Song Dong
    ACM SIGMETRICS 2023 PDF

  46. Are Mobile Advertisements in Compliance with App’s Age Group?
    Yanjie Zhao, Tianming Liu, Haoyu Wang, Yepang Liu, John Grundy, and Li Li
    The Web Conference 2023 (WWW 2023) PDF

  47. FaaSLite: Application-Level FaaS Optimization for Cold Start Latency in Serverless Computing
    Xuanzhe Liu, Jinfeng Wen, Zhenpeng Chen, Ding Li, Junkai Chen, Yi Liu, Haoyu Wang, Xin Jin
    ACM Transactions on Software Engineering and Methodology
    Selected for ASE 2023 journal-first presentation PDF

  48. Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective
    Xuanzhe Liu, Diandian Gu, Zhenpeng Chen, Jinfeng Wen, Zili Zhang, Yun Ma, Haoyu Wang, Xin Jin
    ACM Transactions on Software Engineering and Methodology
    Selected for ASE 2023 journal-first presentation PDF

  49. On the Usage-scenario-based Data Minimization in Mini Programs
    Shenao Wang(s), Yanjie Zhao(s), Kailong Wang, Haoyu Wang
    The 2023 ACM Workshop on Secure and Trustworthy Superapps (SaTS'23), co-located with CCS'23 PDF

  50. Potential Risks Arising from the Absence of Signature Verification in Miniapp Plugins
    Yanjie Zhao(s), Yue Zhang, Haoyu Wang
    The 2023 ACM Workshop on Secure and Trustworthy Superapps (SaTS'23), co-located with CCS'23 PDF


  51. 2022

  52. Challenges in Decentralized Name Management: The Case of ENS
    Pengcheng Xia(s), Haoyu Wang*, Zhou Yu(s), Xinyu Liu(s), Xiapu Luo, Guoai Xu, and Gareth Tyson
    The 2022 ACM Internet Measurement Conference (IMC'22) PDF

  53. MalWhiteout: Reducing Label Errors in Android Malware Detection
    Liu Wang(s), Haoyu Wang*, Xiapu Luo, and Yulei Sui
    The 37th IEEE/ACM International Conference on Automated Software Engineering (ASE 2022) PDF

  54. Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions
    Yuxi Ling, Kailong Wang, Guangdong Bai*, Haoyu Wang*, and Jin Song Dong
    The 37th IEEE/ACM International Conference on Automated Software Engineering (ASE 2022) PDF

  55. Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade Era
    Zikan Dong(s), Liu Wang(s), Hao Xie(s), Guoai Xu and Haoyu Wang*
    A-Mobile Workshop, co-located with ASE'22 PDF

  56. What Did You Pack in My App? A Systematic Analysis of Commercial Android Packers
    Zikan Dong(s), Hongxuan Liu(s), Liu Wang(s), Xiapu Luo, Yao Guo,Guoai Xu, Xusheng Xiao, and Haoyu Wang*
    ESEC/FSE 2022 (Industry Track) PDF

  57. Demystifying "Removed Reviews" in iOS App Store
    Liu Wang(s), Haoyu Wang*, Xiapu Luo, Tao Zhang, Shangguang Wang, and Xuanzhe Liu
    ESEC/FSE 2022 (Industry Track) PDF

  58. Uncovering Intent based Leak of Sensitive Data in Android Framework
    Hao Zhou, Xiapu Luo, Haoyu Wang, Haipeng Cai
    The 29th ACM Conference on Computer and Communications Security (CCS 2022) PDF

  59. MalRadar: Demystifying Android Malware in the New Era
    Liu Wang(s), Haoyu Wang*, Ren He(s), Ran Tao(s), Guozhu Meng, Xiapu Luo, Xuanzhe Liu
    ACM SIGMETRICS 2022 (Acceptance Rate = 11%, Winter Deadline) PDF

  60. Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection
    Xiao Cheng, Guanqin Zhang, Haoyu Wang, Yulei Sui
    The 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA '22) PDF

  61. WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts
    Weimin Chen(s), Zihan Sun(s), Haoyu Wang*, Xiapu Luo*, Haipeng Cai, Lei Wu
    The 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA '22) PDF

  62. A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity
    Liu Wang(s), Haoyu Wang*, Yi Wang, Gareth Tyson, Fei Lyu
    The 9th IEEE/ACM International Conference on Mobile Software Engineering and Systems 2022 (MobileSoft 2022) PDF

  63. Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit
    Guosheng Xu, Siyi Li(s), Hao Zhou, Shucen Liu, Yutian Tang, Li Li, Xiapu Luo, Xusheng Xiao, Guoai Xu* and Haoyu Wang*
    The ACM Web Conference 2022 (WWW '22) PDF

  64. How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors
    Xiao Cheng, Xu Nie(s), Ningke Li(s), Haoyu Wang, Zheng Zheng, Yulei Sui
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  65. APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps
    Yanjie Zhao, Li Li, Haoyu Wang, Qiang He, John Grundy
    IEEE Transactions on Software Engineering (TSE) PDF


  66. ===================================================================================================

    ↑ ↑ ↑ ↑ ↑ Publications after Joining HUST ↑ ↑ ↑ ↑ ↑

    ===================================================================================================

  67. Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange
    Pengcheng Xia(s), Haoyu Wang*, Bingyu Gao(s), Weihang Su(s), Zhou Yu(s), Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu
    ACM SIGMETRICS 2022 (Acceptance Rate = 16%, Summer Deadline) PDF

  68. Uncovering Cross-Context Inconsistent Access Control Enforcement in Android
    Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang
    The Network and Distributed System Security Symposium (NDSS 2022) PDF

  69. DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps
    Shao Yang, Yuehan Wang, Yuan Yao, Haoyu Wang, Yanfang Ye, Xusheng Xiao
    The 44th International Conference on Software Engineering (ICSE 2022) PDF

  70. Promal: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning
    Changlin Liu, Hanlin Wang, Tianming Liu(s), Diandian Gu, Yun Ma, Haoyu Wang, Xusheng Xiao
    The 44th International Conference on Software Engineering (ICSE 2022) PDF

  71. Towards Automatically Localizing Function Errors in Mobile Apps with User Reviews
    Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao
    IEEE Transactions on Software Engineering (TSE) PDF

  72. BATscope: Demystifying Malicious Addresses and Mixing Transactions in Bitcoin (In Chinese)
    WONG Taiyu, YIN Tingting, LI Yun, QIN Siliang, REN Xin, LUO Xiapu, WANG Haoyu, YIN Xia, ZHANG Chao
    Journal of Cyber Security PDF


  73. 2021

  74. Finding the Missing Piece: Permission Specification Analysis for Android NDK
    Hao Zhou, Haoyu Wang, Shuohan Wu, Xiapu Luo, Yajin Zhou, Ting Chen, Ting Wang
    The 36th IEEE/ACM International Conference on Automated Software Engineering (ASE 2021) PDF

  75. SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts
    Weimin Chen(s), Xinran Li(s), Yuting Sui(s), Ningyu He(s), Haoyu Wang*, Lei Wu, and Xiapu Luo.
    ACM SIGMETRICS 2021 (Acceptance Rate: 12%, winter deadline), published in ACM POMACS PDF

  76. Tracking Counterfeit Cryptocurrency End-to-end
    Bingyu Gao(s), Haoyu Wang*, Pengcheng Xia(s), Siwei Wu, Yajin Zhou, Xiapu Luo, and Gareth Tyson.
    ACM SIGMETRICS 2021 (Acceptance Rate: 16%, summer deadline), published in ACM POMACS PDF

  77. EOSafe: Security analysis of EOSIO smart contracts
    Ningyu He(s), Ruiyi Zhang, Haoyu Wang*, Lei Wu*, Xiapu Luo, Yao Guo*, Ting Yu, and Xuxian Jiang.
    Proceedings of The 30th USENIX Security Symposium (USENIX Security 2021) PDF

  78. CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies
    Yangyu Hu(s)#, Haoyu Wang*#, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao and Yao Guo.
    Proceedings of the 43rd ACM/IEEE International Conference on Software Engineering (ICSE 2021) PDF

  79. DeepBackdoor: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection
    Yuanchun Li, Jiayi Hua(s), Haoyu Wang*, Chunyang Chen and Yunxin Liu.
    Proceedings of the 43rd ACM/IEEE International Conference on Software Engineering (ICSE 2021) PDF

  80. An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications
    Zhenpeng Chen, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, and Xuanzhe Liu*.
    Proceedings of the 43rd ACM/IEEE International Conference on Software Engineering (ICSE 2021) PDF

  81. Demystifying Illegal Mobile Gambling Apps
    Yuhao Gao(s), Haoyu Wang*, Li Li, Xiapu Luo, Xuanzhe Liu and Guoai Xu*.
    Proceedings of the 30th The Web Conference (WWW 2021), acceptance rate = 20.6% PDF

  82. A Longitudinal Study of Removed Apps in iOS App Store
    Fuqi Lin(s)#, Haoyu Wang*#, Liu Wang(s) and Xuanzhe Liu*.
    Proceedings of the 30th The Web Conference (WWW 2021), acceptance rate = 20.6% PDF

  83. Towards Understanding and Demystifying Bitcoin Mixing Services
    Lei Wu, Yufeng Hu, Yajin Zhou*, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang and Kui Ren.
    Proceedings of the 30th The Web Conference (WWW 2021), acceptance rate = 20.6% PDF

  84. Beyond the Virus: A First Look at Coronavirus-themed Android Malware
    Liu Wang(s)#, Ren He(s)#, Haoyu Wang*, Pengcheng Xia(s), Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yulei Sui, Yao Guo, Guoai Xu.
    Empirical Software Engineering (EMSE) PDF Github Zenodo

  85. DeepWukong: Statically Detecting Software Vulnerabilities using Deep Graph Neural Network
    Xiao Cheng(s), Haoyu Wang*, Jiayi Hua(s), Guoai Xu* and Yulei Sui.
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  86. On the Impact of Sample Duplication in Machine Learning based Android Malware Detection
    Yanjie Zhao, Li Li, Haoyu Wang, Haipeng Cai, Tegawende F. Bissyande, Jacques Klein, John Grundy.
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  87. XDebloat: Towards Automated Feature-Oriented App Debloating
    Yutian Tang, Hao Zhou, Xiapu Luo, Ting Chen, Haoyu Wang, Zhou Xu, and Yan Cai
    IEEE Transactions on Software Engineering (TSE) PDF

  88. A Systematic Assessment on Android Third-party Library Detection Tools
    Xian Zhan, Tianming Liu(s), Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo
    IEEE Transactions on Software Engineering (TSE) PDF

  89. A Systematical Study on Application Performance Management Libraries for Apps
    Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung.
    IEEE Transactions on Software Engineering (TSE) PDF

  90. Make Web3.0 Connected
    Zhuotao Liu, Yangxi Xiang(s), Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, Yih-Chun Hu.
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  91. Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns
    Pengcheng Xia(s), Mohamed Nabeel, Issa Khalil, Haoyu Wang and Ting Yu.
    Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (CODASPY 2021) PDF

  92. MMGuard: Automatically Protecting On-Device Deep Learning Models in Android Apps
    Jiayi Hua(s), Yuanchun Li, Haoyu Wang*.
    Proceedings of the 4th Deep Learning and Security Workshop (DLS 2021), Co-located with S&P 2021 PDF Github

  93. On the Effectiveness of Deep Vulnerability Detectors to Simple Stupid Bug Detection
    Jiayi Hua(s), Haoyu Wang*.
    Proceedings of the 2021 Mining Software Repositories Conference (MSR'21), Mining Challenge Track PDF

  94. Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem
    Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang and Kui Ren.
    Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, co-located with ASIACCS'21 PDF

  95. Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms
    Yixue Zhao, Siwei Yin(s), Adriana Sejfia, Marcelo Schmitt Laser, Haoyu Wang and Nenad Medvidovic.
    MobileSoft'21, co-located with ICSE'21 PDF

  96. Towards Understanding iOS App Store Search Advertising: An Explorative Study
    Siming Su(s), Haoyu Wang* and Guoai Xu.
    MobileSoft'21, co-located with ICSE'21 PDF

  97. A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories
    Liu Wang(s), Ruiqing Li, Jiaxin Zhu, Guangdong Bai and Haoyu Wang*.
    IEEE Computer Society Signature Conference on Computers, Software and Applications (COMPSAC 2021) PDF

  98. Understanding the Impact of COVID-19 on Github Developers: A Preliminary Study
    Liu Wang(s), Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Weihang Su(s) and Haoyu Wang*.
    The 33rd International Conference on Software Engineering & Knowledge Engineering (SEKE'21) PDF



  99. 2020

  100. Understanding (Mis)Behavior on the EOSIO Blockchain
    Yuheng Huang(s), Haoyu Wang*, Lei Wu*, Gareth Tyson, Xiapu Luo, Run Zhang(s), Xuanzhe Liu, Gang Huang and Xuxian Jiang.
    ACM SIGMETRICS 2020 (Acceptance Rate: 15%), published in ACM POMACS PDF

  101. Flow2Vec: Value-Flow-Based Precise Code Embedding
    Yulei Sui, Xiao Cheng(s), Guanqin Zhang, and Haoyu Wang.
    Proceedings of ACM OOPSLA 2020 PDF ACM SIGPLAN Distinguished Paper AWARD

  102. Mobile App Squatting
    Yangyu Hu(s), Haoyu Wang*, Ren He(s), Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu and Guoai Xu*.
    Proceedings of the Web Conference 2020 (WWW'20), acceptance rate = 19%, Full paper, Oral.
    PDF BEST STUDENT PAPER AWARD (the first award in China)

  103. MadDroid: Characterising and Detecting Devious Ad Content for Android Apps
    Tianming Liu#(s), Haoyu Wang#*, Li Li, Xiapu Luo, Feng Dong(s), Yao Guo, Liu Wang(s), Tegawende F. Bissyande and Jacques Klein
    Proceedings of the Web Conference 2020 (WWW'20), acceptance rate = 19%, Full paper, Oral. PDF

  104. DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts
    Ru Ji(s)#, Ningyu He(s)#, Lei Wu, Haoyu Wang*, Guangdong Bai and Yao Guo.
    Proceedings of the 25th International Conference on Engineering of Complex Computer Systems (ICECCS 2020)
    Media Coverage: CoinDesk, Yahoo Finance, Coin Geek, Publish0x, nasdaq.com, Cryptonews, CoinGenius PDF

  105. Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams
    Pengcheng Xia(s), Haoyu Wang*, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu.
    Proceedings of APWG Symposium on Electronic Crime Research (eCrime 2020) PDF Dataset

  106. Demystifying Diehard Android Apps
    Hao Zhou, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue and Ting Wang.
    The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), acceptance rate = 22.5%. PDF

  107. Automated Third-party Library Detection for Android Applications: Are We There Yet?
    Xian Zhan, Lingling Fan, Tianming Liu(s), Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo and Yang Liu.
    The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), acceptance rate = 22.5%. PDF

  108. UI Obfuscation and its Effects on Automated UI Analysis for Android Apps
    Hao Zhou, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang and Wei Zhang.
    The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), acceptance rate = 22.5%. PDF

  109. All Your App Links are Belong to Us: Understanding the Threats of Instant Apps based Attacks
    Yutian Tang, Yulei Sui, Haoyu Wang, Xiapu Luo, Hao Zhou and Zhou Xu.
    ESEC/FSE 2020. PDF

  110. A Comprehensive Study on Challenges in Deploying Deep Learning Based Software
    Zhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie and Xuanzhe Liu*.
    ESEC/FSE 2020. PDF

  111. Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
    Ningyu He(s), Lei Wu, Haoyu Wang*, Yao Guo*, and Xuxian Jiang.
    The 24th International Conference on Financial Cryptography and Data Security 2020 (FC'20), acceptance rate = 22%. PDF

  112. A3IDENT: A Two-phased Approach to Identify the Leading Authors of Android Apps
    Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge and Xiaohong Li.
    IEEE International Conference on Software Maintenance and Evolution (ICSME 2020) PDF

  113. Characterizing Cryptocurrency Exchange Scams
    Pengcheng Xia(s), Haoyu Wang*, Bowen Zhang(s), Ru Ji(s), Bingyu Gao(s), Lei Wu, Xiapu Luo, and Guoai Xu.
    Elsevier Computers & Security (COSE, IF=3.579) PDF

  114. Market-level Analysis of Government-backed COVID-19 Contact Tracing Apps
    Huiyi Wang(s), Liu Wang(s), and Haoyu Wang*.
    The International Workshop on Advances in Mobile App Analysis (A-Mobile 2020), co-located with ASE 2020 PDF

  115. KnowledgeZooClient: Constructing Knowledge Graph for Android
    Li Li, Jun Gao, Pingfan Kong, Haoyu Wang, Mengyu Huang, Yuan-Fang Li and Tegawende F. Bissyande
    The International Workshop on Advances in Mobile App Analysis (A-Mobile 2020), co-located with ASE 2020 PDF

  116. Dissecting Mobile Offerwall Advertisements: An Explorative Study
    Guosheng Xu, Yangyu Hu(s), Qian Guo(s), Ren He(s), Li Li, Guoai Xu, Zhihui Han, Haoyu Wang
    The 20th IEEE International Conference on Software Quality, Reliability, and Security (QRS'20) PDF

  117. Does the Presence of Privacy Relevant Information Affect App Market Choice?
    Maria K Wolters, Shuobing Li, Haoyu Wang, Xinyu Yang(s), and Yao Guo
    The ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'20), Late-Breaking Work. PDF

  118. Same origin based fine-grained privacy protection for mobile applications
    Wenxiong Lu(s), Haoyu Wang*
    Invited Paper, BIG DATA RESEARCH (in Chinese). PDF



  119. 2019

  120. Automated Deobfuscation of Android Native Binary Code
    Zeliang Kan(s), Haoyu Wang, Lei Wu, Yao Guo, and Xiapu Luo. PDF Tool (Github)

  121. EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level
    Lijin Quan(s), Lei Wu, and Haoyu Wang*. PDF Tool (Github) Demo

  122. DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps
    Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lv.
    The 26th ACM Conference on Computer and Communications Security (ACM CCS 2019) PDF

  123. HyperService: Interoperability and Programmability across Heterogeneous Blockchains
    Zhuotao Liu*, Yangxi Xiang(s), Jian Shi, Peng Gao, Haoyu Wang*, Xusheng Xiao, Bihan Wen, Yih-Chun Hu.
    The 26th ACM Conference on Computer and Communications Security (ACM CCS 2019) PDF

  124. Characterizing Android App Signing Issues
    Haoyu Wang, Hongxuan Liu(s), Xusheng Xiao, Guozhu Meng, and Yao Guo.
    The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), full paper. PDF

  125. DaPanda: Detecting Aggressive Push Notification in Android Apps
    Tianming Liu#(s), Haoyu Wang#*, Li Li, Guangdong Bai, Yao Guo and Guoai Xu.
    The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), full paper. PDF

  126. Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications
    Yangyu Hu(s), Haoyu Wang*, Yajin Zhou*, Yao Guo, Li Li, Bingxuan Luo(s), Fangren Xu(s).
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  127. Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play
    Haoyu Wang, Hao Li and Yao Guo.
    THE WEB CONFERENCE 2019 (WWW 2019), acceptance rate = 18% , full paper. PDF

  128. Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding
    Xiao Cheng(s), Haoyu Wang*, Jiayi Hua(s), Miao Zhang, Guoai Xu, Li Yi* and Yulei Sui.
    The 24th International Conference on Engineering of Complex Computer Systems (ICECCS 2019) PDF

  129. AppNet: Understanding App Recommendation in Google Play
    Qian Guo(s), Haoyu Wang, Chenwei Zhang, Yao Guo and Guoai Xu.
    The 3rd International Workshop on App Market Analytics (WAMA 2019), co-located with ESEC/FSE 2019. PDF

  130. LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking
    Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong and Haoyu Wang.
    The 22nd Information Security Conference (ISC 2019) PDF

  131. Deobfuscating Android Native Binary Code
    Zeliang Kan(s), Haoyu Wang, Lei Wu, Yao Guo and Guoai Xu.
    The 41st ACM/IEEE International Conference on Software Engineering (ICSE 2019), Poster Track (Invitation). PDF

  132. Revisiting the Impact of Common Libraries for Android-related Investigations
    Li Li, Timothee Riom, Tegawende F. Bissyande, Haoyu Wang, Jacques Klein, and Yves Le Traonb.
    Journal of Systems and Software (JSS) PDF

  133. Characterizing the Global Mobile App Developers: A Large-scale Empirical Study
    Haoyu Wang, Xupu Wang(s) and Yao Guo.
    IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2019) PDF

  134. RmvDroid: Towards A Reliable Android Malware Dataset with App Metadata
    Haoyu Wang, Junjun Si, Hao Li and Yao Guo.
    The 16th International Conference on Mining Software Repositories (MSR 2019), Data Showcase. PDF

  135. Want to Earn a Few Extra Bucks? A First Look at Money-making Apps
    Yangyu Hu(s), Haoyu Wang*, Li Li, Yao Guo, Guoai Xu* and Ren He(s)
    IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2019) PDF

  136. Knowledge Graphing Git Repositories: A Preliminary Study
    Yanjie Zhao(s), Haoyu Wang*, Lei Ma, Yuxin Liu, Li Li and John Grundy.
    IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2019), ERA Track. PDF

  137. On Identifying and Explaining Similarities in Android Apps
    Li Li, Tegawende F. Bissyande, Haoyu Wang and Jacques Klein.
    Journal of Computer Science and Technology (JCST) PDF

  138. AppAuth: Authorship Attribution for Android App Clones
    Guoai Xu, Chengpeng Zhang(s), Bowen Sun(s), Xinyu Yang(s), Yanhui Guo, Chengze Li(s), Haoyu Wang. PDF

  139. Mobile Device Security
    Miao Zhang, Shuai Shao, Haoyu Wang.
    BOOK (textbook for undergraduate student), BUPT Press

  140. Mobile Application Security
    Haoyu Wang, Guoai Xu, Yao Guo.
    BOOK (textbook for graduate student), BUPT Press



  141. 2018

  142. Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets
    Haoyu Wang, Zhe Liu(s), Jingyue Liang(s), Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu.
    ACM Internet Measurement Conference (IMC 2018), our paper is the only one coming from Asia. PDF

  143. FraudDroid: Automated Ad Fraud Detection for Android Apps
    Feng Dong(s), Haoyu Wang*#, Li Li, Yao Guo, Tegawende F. Bissyande, Tianming Liu(s), Guoai Xu and Jacques Klein
    ESEC/FSE 2018 (acceptance rate of 19%) PDF

  144. CiD: Automating the Detection of API-related Compatibility Issues in Android Apps
    Li Li, Tegawende F. Bissyande, Haoyu Wang, Jacques Klein.
    The 27th International Symposium on Software Testing and Analysis (ISSTA 2018) PDF

  145. How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries?
    Feng Dong(s), Haoyu Wang*, Li Li, Yao Guo, Guoai Xu, Shaodong Zhang.
    The 19th Workshop on Mobile Computing Systems and Applications (HotMobile 2018) PDF

  146. Why are Android Apps Removed From Google Play? A Large-scale Empirical Study
    Haoyu Wang, Hao Li, Li Li, Yao Guo, Guoai Xu.
    The 15th International Conference on Mining Software Repositories (MSR 2018) PDF

  147. Towards Light-weight Deep Learning based Malware Detection
    Zeliang Kan(s), Haoyu Wang*, Guoai Xu*, Yao Guo, Xiangqun Chen.
    The 42nd IEEE International Conference on Computers, Software & Applications (COMPSAC 2018) PDF

  148. Re-checking App Behavior against App Description in the Context of Third-party Libraries
    Chengpeng Zhang(s), Haoyu Wang*, Ran Wang(s), Yao Guo, Guoai Xu*.
    The 30th International Conference on Software Engineering & Knowledge Engineering (SEKE 2018) PDF



  149. 2017

  150. An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective
    Haoyu Wang, Zhe Liu(s), Yao Guo, Xiangqun Chen, Miao Zhang, Guoai Xu and Jason Hong.
    Proceedings of the 26th International World Wide Web Conference (WWW 2017) PDF

  151. Understanding the Purpose of Permission Use in Mobile Apps
    Haoyu Wang, Yuanchun Li, Yao Guo, Yuvraj Agarwal, Jason Hong.
    ACM Transactions on Information Systems (TOIS) PDF

  152. Understanding Third-party Libraries in Mobile App Analysis
    Haoyu Wang and Yao Guo.
    ICSE 2017, Technical Briefings PDF

  153. Purpose-based Access Control for Android
    Haoyu Wang
    2017 USENIX Summit on Hot Topics in Security (HotSec '17) PDF

  154. CRSPR: PageRank for Android Apps
    Chengze Li(s), Haoyu Wang, Junfeng Wang, Qi Li, Jianbo Yu, Jingyi Guo, Guoai Xu and Yanhui Guo.
    IEEE ACCESS 14(8), 2017 PDF

  155. Automated Detection and Classification of Third-party Libraries in Large Scale Android Apps
    Haoyu Wang, Yao Guo, Ziang Ma and Xiangqun Chen.
    Journal of Software (in Chinese) PDF

  156. Privacy Rating for Mobile Apps based on Crowdsourcing and Machine-learning Techniques
    ZHANG Xianxian(s), WANG Haoyu, GUO Yao and XU Guoai.
    NASAC 2017 (in Chinese) PDF Best Paper Award

  157. Automated Detection of the Inconsistence between App Behavior and Privacy Policy of Android Apps
    WANG Jingyu(s), XU Mingkun, WANG Haoyu and XU Guoai.
    NASAC 2017 (in Chinese) PDF



  158. 2016 and Earlier

  159. Security Analytics for Mobile Apps: Achievements and Challenges
    Wei Yang, Xusheng Xiao, Dengfeng Li, Huoran Li, Xuanzhe Liu, Haoyu Wang, Yao Guo, and Tao Xie.
    Journal of Cyber Security (in Chinese), 1(2), pages 1-14, April 2016. PDF

  160. LibRadar: Detecting Third-party Libraries in Android Apps
    Ziang Ma, Haoyu Wang, Yao Guo and Xiangqun Chen.
    ICSE 2016 (Demo Track) PDF Tool Website

  161. Identifying and Analyzing the Privacy of Apps for Kids
    Minxing Liu, Haoyu Wang, Yao Guo and Jason Hong.
    The 17th International Workshop on Mobile Computing Systems and Applications (HotMobile 2016) PDF

  162. Using Text Mining to Infer the Purpose of Permission Use in Mobile Apps
    Haoyu Wang, Jason Hong and Yao Guo.
    The 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2015) PDF

  163. Reevaluating Android Permission Gaps with Static and Dynamic Analysis
    Haoyu Wang, Yao Guo, Zihao Tang, Guangdong Bai and Xiangqun Chen.
    IEEE GLOBECOM 2015 PDF

  164. WuKong: A Scalable and Accurate Two-Phase Approach to Android App Clone Detection
    Haoyu Wang, Yao Guo, Ziang Ma and Xiangqun Chen.
    International Symposium on Software Testing and Analysis (ISSTA 2015), Baltimore, MD, pp. 71-82. PDF

  165. Similarity-based Web Browser Optimization
    Haoyu Wang, Mengxin Liu, Yao Guo and Xiangqun Chen.
    The 23rd International World Wide Web Conference (WWW 2014), Seoul, Korea, pp 575-584, 2014. (acceptance rate: 12.9%) PDF

  166. Detecting repackaged Android applications based on code clone detection technique
    Haoyu Wang, Zhongyu Wang, Yao Guo and Xiangqun Chen.
    SCIENCE CHINA Information Sciences, 2014, 44 (1): 142-157. (in Chinese) PDF

  167. Mobile Web Browser Optimization in the Cloud Era: A Survey
    Haoyu Wang, Junjun Kong, Yao Guo and Xiangqun Chen.
    IEEE MobileCloud 2013 PDF