shuai Shuai Wang

Associate Professor
Department of Computer Science and Engineering
Hong Kong University of Science and Technology

Office: 3516

E-mail: shuaiw at cse.ust.hk

I am an associate professor with substantiation (tenure) at CSE, HKUST. Prior to that, I was an assistant professor at CSE, HKUST (2019-2024), and was a postdoctoral scholar in the AST lab at ETH Zurich (2018-2019). I received the Ph.D. degree from Penn State University, and the B.S. degree from Peking University. Before that, I attended Henan Experimental High School for both my junior high and high school education.

My research covers Computer Security and Privacy as well as Software Engineering. I study important attributes (security, privacy, satefy, ethics, fairness, etc.) in software, artificial intelligence, systems, and more importantly, their integrations, e.g., exploiting/hardening AI models from system perspectives, studying AI ethics with software testing/verification, supporting privacy computing via software and system infrastructures, and using LLMs for software fuzzing.

I am the recipient of a Google Research Scholar Award (2023), two CCF-Tencent Rhino-Bird Young Faculty Open Research Awards (2022 and 2020), and a HK-UGC Early Career Award (2020).

Teaching

  • CSIT5730: Principles of Cybersecurity (Fall 2024)
  • COMP2011: Programming with C++ (Fall 2024)
  • COMP3632: Principles of Cybersecurity (Spring 2024)
  • COMP3632: Principles of Cybersecurity (Fall 2023)
  • COMP3632: Principles of Cybersecurity (Spring 2023)
  • COMP4971A: Independent Work on Systems Security (Spring 2023)
  • COMP4971B: Independent Work on Systems Security (Spring 2023)
  • COMP3632: Principles of Cybersecurity (Fall 2022)
  • COMP3632: Principles of Cybersecurity (Spring 2022)
  • COMP3632: Principles of Cybersecurity (Fall 2021)
  • COMP3632: Principles of Cybersecurity (Spring 2021)
  • COMP6613C: Topics in Computer Security and Privacy (Spring 2021)
  • COMP3632: Principles of Cybersecurity (Fall 2020)
  • COMP3632: Principles of Cybersecurity (Fall 2019)
  • COMP4971A: Independent Work on Software Fuzz Testing (Fall 2019)

Current Team Members

Postdoc

Ph.D. Students

RA/Intern/UG

  • Zimo Ji (2024 Summer). Co-advised with Prof. Daoyuan Wu
  • Yufan Chen (2024 Summer). Co-advised with Prof. Daoyuan Wu
  • Kaiwen Yang (2024 RA) Co-advised with Prof. Daoyuan Wu
  • LAU Pak Hin (2024 Co-OP)

Former Students

  • Pingchuan Ma (Ph.D.#4) 2020-2024. Thesis: Algorithms, Applications, and Verification of Causal Structure Learning.
  • Yuanyuan Yuan (Ph.D.#3) 2020-2024. Thesis: Side Channel Analysis for AI Infrastructures. CSE Best PhD Dissertation Award (One Per Year).
  • Sen Li (MPhil @ CSE HKUST) 2022-2024. Co-advised with Prof. Minhao Cheng. Thesis: Towards Trustworthy Visual Generative Models: Reliable and Controllable Generation of Diffusion Models.
  • Yichen Li (MPhil @ CSE HKUST) 2022-2024. Thesis: Testing Secure Multi-Party Computation Compilers. Ph.D. student @ SusTech
  • Huaijin Wang (Ph.D.#2) 2019-2023. Thesis: Advanced Binary Similarity Analysis and Its Downstream Applications.
  • Zhibo Liu (Ph.D.#1) 2019-2023. Thesis: Towards Assessing and Enhancing Modern Software Reverse Engineering. CSE Best PhD Dissertation Award - Honorable Mention (Three Per Year).
  • Yuzhou Fang (UG@Sichuan University) 2022-2023. Co-advised with Prof. Daoyuan Wu. Smart Contract Security. Ph.D. student @ USC
  • Zhaoyu Wang (UG@Tongji University) 2022-2023. Co-advised with Pingchuan Ma. Thesis: Program Analysis. Ph.D. student @ HKUST
  • Ao Sun (UG@UIUC) 2023. Co-advised with Pingchuan Ma. Research on LLM Security. Ph.D. student @ HKUST
  • Yiteng Peng (UG@USTC) 2023. Co-advised with Yuanyuan Yuan. Membership Inference Attack. Ph.D. student @ HKUST
  • SINGHAL, Sarthak (2023 Spring UG@HKUST). COMP 4971 (Independent Work) on Intrusion Detection. Security Intern @ Deloitte
  • Qi Wu (UG@HKUST). 2022-2023. Thesis: NFT Security: Rug Pull Detection. MS student @ CMU.
  • Wenbo Li (UG@HKUST). 2022-2023. MS student @ USC.
  • Qihao He (UG@HKUST). 2022-2023. MS student @ TAMU.
  • Qi Pang (MPhil @ CSE HKUST). 2020-2022. Thesis: Testing Models Solving Markov Decision Processes. Ph.D. student @ CMU.
  • Wai Kin WONG (MPhil @ CSE HKUST). 2019-2021. Thesis on software security. Ph.D. student @ HKUST.
  • Kun Hung LUNG (MPhil @ CSE HKUST). Thesis on systems security. 2019-2021. Engineer @ a start-up cybersecurity company.
  • Wei Chen (MPhil @ CSE HKUST). 2019-2021. Thesis on systems security. RA @ HKUST.
  • Wangkai Jin (UG @ CSE UNottingham Ningbo). 2021 Summer intern on AI privacy projects. MSCS student @ Duke University.
  • Yujie Wang (UG @ CSE HKUST). 2020-2021 Thesis: Privacy-Preserving Security Analysis. Ph.D. student @ Washington University in St. Louis.
  • Xirui Nie (UG @ Fudan University). 2020 Summer intern on compiler & OS security projects. Ph.D. student @ CUHK.
  • Reiff Loris (UG @ ETH Zurich, co-advised with Prof. Zhendong Su). Thesis: Context-Aware Obfuscation: A Step Towards Defeating Adversary Symbolic Analysis. Continued Masters study @ ETH Zurich.
  • Nguyen Andy (UG @ ETH Zurich, co-advised with Prof. Zhendong Su). Thesis: Detecting Vulnerabilities in Real-World Software with Fuzz Testing. Information Security Engineer @ Google.

Organization

Program committees

  • 2025: IEEE S&P, USENIX Security
  • 2024: IEEE S&P, USENIX Security, FSE, ISSTA
  • 2023: IEEE S&P, USENIX Security, CCS, FSE, ISSTA, ASE, PoPETs/PETS, PRDC
  • 2022: CCS, ASE, ICSE (SEET), AsiaCCS, NDSS (BAR), DBTest
  • 2021: ICSE (AE), AsiaCCS

Selected Publications

  • Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements.
    Huaijin Wang, Zhibo Liu, Yanbo Dai, Shuai Wang, Qiyi Tang, Sen Nie, and Shi Wu. ICSE 2025
  • Testing and Understanding Deviation Behaviors in FHE-hardened Machine Learning Models.
    Yiteng Peng, Daoyuan Wu, Zhibo Liu, Dongwei Xiao, Zhenlan Ji, Juergen Rahmel, and Shuai Wang. ICSE 2025
  • BitShield: Defending Against Bit-Flip Attacks on DNN Executables.
    Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan, Sihang Hu, Tianxiang Li, and Shuai Wang. NDSS 2025
  • CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels.
    Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, and Zhendong Su. IEEE Security & Privacy 2025
  • MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK) Compilers.
    Dongwei Xiao, Zhibo Liu, Yiteng Peng, and Shuai Wang. NDSS 2025
  • Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables.
    Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan, Sihang Hu, Tianxiang Li, and Shuai Wang. NDSS 2025
  • Your Fix Is My Exploit: Enabling Comprehensive DL Library API Fuzzing with Large Language Models.
    Kunpeng Zhang, Shuai Wang, Jitao Han, Xiaogang Zhu, Xian Li, Shaohua Wang, and Sheng Wen. ICSE 2025
  • The Devil is in the (Micro-) Architectures: Uncovering New Side-Channel and Bit-Flip Attack Surfaces in DNN Executables.
    Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan, Sihang Hu, Tianxiang Li, and Shuai Wang. Black Hat Europe 2024
  • Split and Merge: Aligning Position Biases in LLM-based Evaluators.
    Zongjie Li, Chaozheng Wang, Pingchuan Ma, Daoyuan Wu, Shuai Wang, Cuiyun Gao, and Yang Liu. EMNLP 2024 (main)
  • DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables.
    Zhibo Liu, Yuanyuan Yuan, Yanzuo Chen, Sihang Hu, Tianxiang Li, and Shuai Wang. CCS 2024
  • HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels.
    Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, and Zhendong Su. CCS 2024
  • MOAT: Towards Safe BPF Kernel Extension.
    Hongyi Lu, Shuai Wang, Yechang Wu, Wanning He, and Fengwei Zhang. USENIX Security 2024
  • See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network Testing.
    Yuanyuan Yuan, Shuai Wang and Zhendong Su. ISSTA 2024
  • Scalable Differentiable Causal Discovery in the Presence of Latent Confounders with Skeleton Posterior.
    Pingchuan Ma, Rui Ding, Qiang Fu, Jiaru Zhang, Shuai Wang, Shi Han, and Dongmei Zhang. KDD 2024
  • Are We There Yet? Filling the Gap Between ML-Based Binary Similarity Analysis and Binary Software Composition Analysis.
    Huaijin Wang, Zhibo Liu, Shuai Wang, Ying Wang, Qiyi Tang, Sen Nie, and Shi Wu. IEEE EuroS&P 2024
  • LLM for Mobile: An Initial Roadmap.
    Daihang Chen, Yonghui Liu, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Shuai Wang, Xiao Chen, Tegawende Bissyande, Jacques Klein, and Li Li. 2030 Software Engineering at FSE 2024
  • Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing.
    Yuanyuan Yuan, Qi Pang, and Shuai Wang. TSE 2024
  • PP-CSA: Practical Privacy-Preserving Software Call Stack Analysis.
    Zhaoyu Wang, Pingchuan Ma, Huaijin Wang, and Shuai Wang. OOPSLA 2024
  • Metamorphic Testing of Secure Multi-Party Computation (MPC) Compilers.
    Yichen Li, Dongwei Xiao, Zhibo Liu, Qi Pang, and Shuai Wang. FSE 2024
  • DTD: Comprehensive and Scalable Testing for Debuggers.
    Hongyi Lu, Zhibo Liu, Shuai Wang, and Fengwei Zhang. FSE 2024
  • Strengthening Supply Chain Security with Fine-grained Safe Patch Identification.
    Changhua Luo, Wei Meng, and Shuai Wang. ICSE 2024
  • Testing Graph Database Systems via Graph-Aware Metamorphic Relations.
    Zeyang Zhuang, Penghui Li, Pingchuan Ma, Wei Meng, and Shuai Wang. VLDB 2024
  • Evaluating C/C++ Vulnerability Detectability of Query-Based Static Application Security Testing Tools.
    Zongjie Li, Zhibo Liu, Wai Kin Wong, Pingchuan Ma, and Shuai Wang. TDSC 2024
  • On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study.
    Zongjie Li, Chaozheng Wang, Pingchuan Ma, Chaowei Liu, Shuai Wang, Daoyuan Wu, Cuiyun Gao, Yang Liu. ICSE 2024
  • BinAug: Enhancing Binary Similarity Analysis with Low-Cost Input Repairing.
    Wai Kin Wong, Huaijin Wang, Zongjie Li, and Shuai Wang. ICSE 2024
  • Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning.
    Pingchuan Ma, Zhenlan Ji, Peisen Yao, Shuai Wang, and Kui Ren. ICSE 2024
  • MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models.
    Qi Pang, Yuanyuan Yuan, and Shuai Wang. NDSS 2024
  • InsightPilot: An LLM-Empowered Automated Data Exploration System.
    Pingchuan Ma, Rui Ding, Shuai Wang, Han Shi, and Dongmei Zhang. EMNLP 2023 (Demo Track)
  • Explain Any Concept: Segment Anything Meets Concept-Based Explanation.
    Ao Sun, Pingchuan Ma, Yuanyuan Yuan, and Shuai Wang. NeurIPS 2023
  • Protecting Intellectual Property of Large Language Model-Based Code Generation APIs via Watermarks.
    Zongjie Li, Chaozheng Wang, Shuai Wang, and Cuiyun Gao. CCS 2023
  • REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes.
    Chaozheng Wang, Li Zongjie, Yun Peng, Shuzheng Gao, Sirong Chen, Shuai Wang, Cuiyun Gao, and Michael Lyu. ASE 2023 (Industry Challenge Track) Distinguished Paper Award
  • Causality-Aided Trade-off Analysis for Machine Learning Fairness.
    Zhenlan Ji, Pingchuan Ma, Shuai Wang, and Yanhui Li. ASE 2023
  • PerfCE: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis.
    Zhenlan Ji, Pingchuan Ma and Shuai Wang. ASE 2023
  • PHYFU: Fuzzing Modern Physics Simulation Engines.
    Dongwei Xiao, Zhibo Liu and Shuai Wang. ASE 2023 ACM SIGSOFT Distinguished Paper Award
  • Towards Practical Federated Causal Structure Learning.
    Zhaoyu Wang, Pingchuan Ma, and Shuai Wang. ECML-PKDD 2023
  • Precise and Generalized Robustness Certification for Neural Networks.
    Yuanyuan Yuan, Shuai Wang, and Zhendong Su. USENIX Security 2023 [paper]
  • BTD: Unleashing the Power of Decompilation for x86 Deep Neural Network Executables.
    Zhibo Liu, Yuanyuan Yuan, Xiaofei Xie, Tianxiang Li, Wenqiang Li, and Shuai Wang. Blackhat USA 2023
  • Exploiting Code Reuse Attacks from Obfuscated Programs.
    Naiqian Zhang, Daroc Alden, Dongpeng Xu, Shuai Wang, Trent Jaeger, and Wheeler Ruml. DSN 2023
  • Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts.
    Yuzhou Fang, Daoyuan Wu, Xiao Yi, Shuai Wang, Yufan Chen, Mengjie Chen, Yang Liu, and Lingxiao Jiang. ISSTA 2023
  • Secure Federated Correlation Test and Entropy Estimation.
    Qi Pang, Lun Wang, Shuai Wang, Wenting Zheng, and Dawn Song. ICML 2023
  • ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems.
    Qi Pang, Yuanyuan Yuan, Shuai Wang, and Wenting Zheng. IEEE Security & Privacy 2023 [paper]
  • XInsight: eXplainable Data Analysis Through The Lens of Causality.
    Pingchuan Ma, Rui Ding, Shuai Wang, Shi Han, and Dongmei Zhang. SIGMOD 2023[paper]
  • Byzantine-Robust Federated Learning with Optimal Statistical Rates.
    Banghua Zhu, Lun Wang, Qi Pang, Shuai Wang, Jiantao Jiao, Dawn Song, and Michael Jordan. AISTATS 2023 [paper]
  • Exploring Missed Optimizations in WebAssembly Optimizers.
    Zhibo Liu, Dongwei Xiao, Zongjie Li, Shuai Wang, and Wei Meng. ISSTA 2023
  • OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables.
    Yanzuo Chen, Yuanyuan Yuan, and Shuai Wang. NDSS 2023 [paper]
  • Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion.
    Yuanyuan Yuan, Qi Pang, and Shuai Wang. ICSE 2023 [paper]
  • Metamorphic Shader Fusion for Testing Graphics Shader Compilers.
    Dongwei Xiao, Zhibo Liu, and Shuai Wang. ICSE 2023 [paper]
  • CC: Causality-Aware Coverage Criterion for Deep Neural Networks.
    Zhenlan Ji, Pingchuan Ma, Yuanyuan Yuan, and Shuai Wang. ICSE 2023 [paper]
  • CCTEST: Testing and Repairing Code Completion Systems.
    Zongjie Li, Chaozheng Wang, Zhibo Liu, Haoxuan Wang, Dong Chen, Shuai Wang, and Cuiyun Gao. ICSE 2023 [paper]
  • CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software.
    Yuanyuan Yuan, Zhibo Liu, and Shuai Wang. USENIX Security 2023 [paper]
  • CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations.
    Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, and Yinqian Zhang. USENIX Security 2023 [paper]
  • Decompiling x86 Deep Neural Network Executables.
    Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, and Lei Ma. USENIX Security 2023 [paper]
  • sem2vec: Semantics-Aware Assembly Tracelet Embedding.
    Huaijin Wang, Pingchuan Ma, Shuai Wang, Qiyi Tang, Sen Nie, and Shi Wu. ACM TOSEM 2022 [paper]
  • Unveiling the Hidden Defection of DNN Testing with Decision-Based Metamorphic Oracle.
    Yuanyuan Yuan, Qi Pang, and Shuai Wang. ASE 2022 [paper]
  • Cache Refinement Type for Side-channel Detection of Cryptographic Software.
    Ke Jiang, Yuyan Bao, Shuai Wang, Zhibo Liu, and Tianwei Zhang. CCS 2022 [paper]
  • Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial Programs.
    Wai Kin Wong, Huaijin Wang, Pingchuan Ma, Shuai Wang, Mingyue Jiang, Tsong Yueh Chen, Qiyi Tang, Sen Nie, and Shi Wu. ICSME 2022[paper]
  • NOLEAKS: Differentially Private Causal Discovery Under Functional Causal Model.
    Pingchuan Ma, Zhenlan Ji, Qi Pang, and Shuai Wang. IEEE TIFS 2022 [paper]
  • On the Effectiveness of Testing Sentiment Analysis Systems with Metamorphic Testing.
    Mingyue Jiang, Shuai Wang, and Tsong Yueh Chen. Elsevier IST 2022 [paper]
  • ML4S: Learning Causal Skeleton from Vicinal Graphs.
    Pingchuan Ma, Rui Ding, Haoyue Dai, Yuanyuan Jiang, Shuai Wang, Shi Han, and Dongmei Zhang. KDD 2022 [paper]
  • Unlearnable Examples: Protecting Open-Source Software from Unauthorized Neural Code Learning.
    Zhenlan Ji, Pingchuan Ma, and Shuai Wang. SEKE 2022 [paper]
  • MDPFuzz: Testing Models Solving Markov Decision Processes.
    Qi Pang, Yuanyuan Yuan, and Shuai Wang. ISSTA 2022 [paper]
  • TORPEDO: A Fuzzing Framework for Discovering Adversarial Container Workloads.
    Kent McDonough, Xing Gao, Shuai Wang, and Haining Wang. DSN 2022
  • NeuralD: Detecting Indistinguishability Violations of Oblivious RAM with Neural Distinguishers.
    Pingchuan Ma, Zhibo Liu, Yuanyuan Yuan, and Shuai Wang. IEEE TIFS 2022 [paper]
  • Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking.
    Huaijin Wang, Pingchuan Ma, Yuanyuan Yuan, Zhibo Liu, Shuai Wang, Qiyi Tang, Sen Nie, and Shi Wu. IEEE TSE 2022 [paper]
  • FED-X2: Privacy Preserving Federated Correlation Test.
    Lun Wang*, Qi Pang*, Shuai Wang, Dawn Song. PPAI-22 co-located with AAAI 2022
  • Metamorphic Testing of Deep Learning Compilers.
    Dongwei Xiao, Zhibo Liu, Yuanyuan Yuan, Qi Pang, and Shuai Wang. SIGMETRICS 2022 [paper]
  • Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program Embeddings.
    Zongjie Li, Pingchuan Ma, Huaijin Wang, Shuai Wang, Qiyi Tang, Sen Nie, and Shi Wu. ICSE 2022 [paper]
  • MT-Teql: Evaluating and Augmenting Neural NLIDB on Real-world Linguistic and Schema Variations.
    Pingchuan Ma and Shuai Wang. VLDB 2022 [paper]
  • Automated Side Channel Analysis of Media Software with Manifold Learning.
    Yuanyuan Yuan, Qi Pang, and Shuai Wang. USENIX Security 2022 [paper]
  • SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications.
    Zhibo Liu, Yuanyuan Yuan, Shuai Wang, and Yuyan Bao. IEEE Security & Privacy 2022 [paper]
  • SanRazor: Reducing Redundant Sanitizer Checks in C/C++ Programs.
    Jiang Zhang, Shuai Wang, Manuel Rigger, Pingjia He, and Zhendong Su. OSDI 2021 [paper]
  • Perception Matters: Detecting Perception Failures of VQA Models Using Metamorphic Testing.
    Yuanyuan Yuan, Shuai Wang, Mingyue Jiang, and Tsong Yueh Chen. CVPR 2021 [paper]
  • Private Image Reconstruction from System Side Channels Using Generative Models.
    Yuanyuan Yuan, Shuai Wang, and Junping Zhang. ICLR 2021 [paper]
  • F2ED-Learning: Good Fences Make Good Neighbors.
    Lun Wang, Qi Pang, Shuai Wang, and Dawn Song. SpicyFL 2020 at NeurIPS 2020
  • Generating Effective Software Obfuscation Sequences with Reinforcement Learning.
    Huaijin Wang, Shuai Wang, Dongpeng Xu, Xiangyu Zhang, and Xiao Liu. IEEE TDSC 2020 [preprint]
  • Metamorphic Object Insertion for Testing Object Detection Systems.
    Shuai Wang and Zhendong Su. ASE 2020. [paper]
  • Metamorphic Testing and Certified Mitigation of Fairness Violations in NLP Models.
    Pingchuan Ma, Shuai Wang, and Jin Liu. IJCAI 2020.
  • How Far We Have Come: Testing Decompilation Correctness of C Decompilers.
    Zhibo Liu and Shuai Wang. ISSTA 2020.
  • Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries.
    Pei Wang, Jinquan Zhang, Shuai Wang, and Dinghao Wu. IEEE EuroS&P 2020.
  • Detecting Nondeterministic Payment Bugs in Ethereum Smart Contracts.
    Shuai Wang, Chengyu Zhang, and Zhendong Su. OOPSLA 2019.
  • Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation.
    Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, and Dinghao Wu. USENIX Security 2019. [Extended Version]
  • Automatic Grading of Programming Assignments: A Formal Semantics Based Approach.
    Xiao Liu, Shuai Wang, Pei Wang, and Dinghao Wu. ICSE 2019, SEET Track.
  • Large-Scale Third-party Library Detection in Android Markets.
    Menghao Li, Pei Wang, Wei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo and Wei Zou. IEEE TSE .
  • Software Protection on the Go: A Large-Scale Empirical Study on Mobile App Obfuscation.
    Pei Wang, Qinkun Bao, Li Wang, Shuai Wang, Zhaofeng Chen, Tao Wei and Dinghao Wu. ICSE 2018.
  • RedDroid: Android Application Redundancy Customization Based on Static Analysis.
    Yufei Jiang, Qinkun Bao, Shuai Wang, Xiao Liu and Dinghao Wu. ISSRE 2018.
  • Binary Code Retrofitting and Hardening Using SGX.
    Shuai Wang, Wenhao Wang, Qinkun Bao, Pei Wang, XiaoFeng Wang, and Dinghao Wu. FEAST 2017, co-located with CCS 2017.
  • In-Memory Fuzzing for Binary Code Similarity Analysis.
    Shuai Wang and Dinghao Wu. ASE 2017.
  • Turing Obfuscation.
    Yan Wang, Shuai Wang, Pei Wang, and Dinghao Wu. SecureComm 2017.
  • Lambda Obfuscation.
    Pengwei Lan, Pei Wang, Shuai Wang, and Dinghao Wu. SecureComm 2017.
  • Composite Software Diversification.
    Shuai Wang, Pei Wang, and Dinghao Wu. ICSME 2017.
  • Semantics-Aware Machine Learning for Function Recognition in Binary Code.
    Shuai Wang, Pei Wang, and Dinghao Wu. ICSME 2017.
  • CacheD: Identifying Cache-Based Timing Channels in Production Software.
    Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, and Dinghao Wu. USENIX Security 2017.
  • LibD: Scalable and Precise Third-party Library Detection in Android Markets.
    Menghao Li, Wei Wang, Pei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, and Wei Huo. ICSE 2017.
  • From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
    Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, and Wenke Lee. SenSys 2016.
  • Uroboros: Instrumenting Stripped Binaries with Static Reassembling.
    Shuai Wang, Pei Wang, and Dinghao Wu. SANER 2016.
  • Translingual Obfuscation.
    Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, and Dinghao Wu. EuroS&P 2016. [Extended Version]
  • Reassembleable Disassembling.
    Shuai Wang, Pei Wang, and Dinghao Wu. USENIX Security '15. [Code Release]