-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
344 lines (322 loc) · 14.8 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1">
<title>Wei You</title>
<link href="./bootstrap.min.css" rel="stylesheet">
</head>
<body>
<div class="container">
<div class="row">
<div class="col-md-8 col-md-offset-2">
<div class="page-header">
<table>
<tr>
<td><img src="images/youwei.jpg" width="150" /></td>
<td> </td>
<td>
<h1>Wei You</h1>
Associate Professor <br />
<a href="http://info.ruc.edu.cn/">School of Information</a> <br />
<a href="http://info.ruc.edu.cn/">Renmin University of China</a> <br />
<br />
Email: <img src="images/email.jpg" height="18" /> <br />
Office: Room 301B, Ligongpei Building <br />
</td>
<td><img src="images/stamp.png" height="125" /></td>
</tr>
</table>
</div>
<div class="page-header">
<h2>About</h2>
</div>
<div>
<p>
I am currently an associate professor in <a href="http://info.ruc.edu.cn/">School of Information</a>, <a href="http://info.ruc.edu.cn/">Renmin University of China</a>. Before joining RUC, I did two-year postdoctoral researcher in
<a href="http://www.cs.purdue.edu/">Department of Computer Science</a> at
<a href="https://www.purdue.edu/">Purdue University</a> (2017-2019), under the supervision of
<a href="https://www.cs.purdue.edu/homes/xyzhang/">Professor Xiangyu Zhang</a>; and one-year postdoctoral researcher in
<a href="https://www.sice.indiana.edu/">School of Informatics, Computing, and Engineering</a> at
<a href="https://www.iu.edu/">Indiana University</a> (2016-2017), under the supervison of
<a href="https://www.informatics.indiana.edu/xw7/">Professor XiaoFeng Wang</a>.
I obtained my Ph.D. from
<a href="http://info.ruc.edu.cn/">Renmin University of China</a>
in 2016.
</p>
</div>
<div class="page-header">
<h2>Research Interests</h2>
</div>
<div>
<ul><b>
<li>Vulnerability Detection</li>
<li>Vulnerability Exploitation</li>
<li>Malware Analysis</li>
</b></ul>
</div>
<div class="page-header">
<h2>Awards and Honors</h2>
</div>
<div>
<ul><b>
<li> Excellent Scholar of Renmin University of China</li>
<li> National Scholarship for Ph.D. Students</li>
<li> Google Excellent Scholarship </li>
</b></ul>
</div>
<!-- <div class="page-header"> -->
<!-- <h2>Publications</h2> -->
<!-- </div> -->
<div class="page-header">
<h2>Publications</h2>
</div>
<ul>
<li>
<b>
<a>PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning</a>
</b>
<br>
<b><i>Wei You</i></b>,
Zhuo Zhang,
Yonghwi Kwon,
Yousra Aafer,
Fei Peng,
Yu Shi,
Carson Harmon,
Xiangyu Zhang
<br>
Proceedings of the 41st IEEE Symposiums on Security and Privacy (<b>S&P 2020</b>)
<br>
(CCF A)
</li>
<br>
<li>
<b>
<a href="papers/OOPSLA2019.pdf">BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation</a>
</b>
<br>
Zhuo Zhang,
<b><i>Wei You *</i></b>,
Guanhong Tao,
Guannan Wei,
Yonghwi Kwon,
Xiangyu Zhang
<br>
Proceedings of the 34th ACM Conference on Object-Oriented Programming Systems, Languages and Applications (<b>OOPSLA 2019</b>)
<br>
(CCF A, Acceptance Rate: 36%)
</li>
<br>
<li>
<b>
<a href="papers/SP2019.pdf">ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery</a>
</b>
<br>
<b><i>Wei You</i></b>,
Xueqiang Wang,
Shiqing Ma,
Jianjun Huang,
Xiangyu Zhang,
XiaoFeng Wang,
Bin Liang
<br>
Proceedings of the 40th IEEE Symposiums on Security and Privacy (<b>S&P 2019</b>)
<br>
(CCF A, Acceptance Rate: 11%)
</li>
<br>
<li>
<b>
<a href="papers/ICSE2019.pdf">SLF: Fuzzing without Valid Seed Inputs</a>
</b>
<br>
<b><i>Wei You</i></b>,
Xuwei Liu,
Shiqing Ma,
David Perry,
Xiangyu Zhang,
Bin Liang
<br>
Proceedings of the 41st ACM/IEEE Internatinoal Conference on Software Engineering (<b>ICSE 2019</b>)
<br>
(CCF A, Acceptance Rate: 21%)
</li>
<br>
<li>
<b>
<a href="papers/TDSC2017.pdf">TaintMan: An ART-compatible Dynamic Taint Analysis Framework on Unmodified and Non-rooted Android Devices</a>
</b>
<br>
<b><i>Wei You</i></b>,
Bin Liang,
Wenchang Shi,
Peng Wang,
Xiangyu Zhang
<br>
IEEE Transactions on Dependable and Secure Computing (TDSC 2017) <br>
(CCF A)
</li>
<br>
<li>
<b>
<a href="papers/CCS2017a.pdf">SemFuzz: Semantics-based Automatic Generation of Proof-of-concept Exploits</a>
</b>
<br>
<b><i>Wei You</i></b>,
Peiyuan Zong,
Kai Chen,
XiaoFeng Wang,
Xiaojing Liao,
Pan Bian,
Bin Liang
<br>
Proceedings of the 24th ACM Conference on Computer and Communications Security (<b>CCS 2017</b>)
<br>
(CCF A, Acceptance Rate: 18%)
</li>
<br>
<li>
<b>
<a href="papers/CCS2017b.pdf">Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution</a>
</b>
<br>
Yi Chen,
<b><i>Wei You</i></b>,
Yeonjoon Lee,
Kai Chen,
XiaoFeng Wang,
Wei Zou
<br>
Proceedings of the 24th ACM Conference on Computer and Communications Security (<b>CCS 2017</b>)
<br>
(CCF A, Acceptance Rate: 18%)
</li>
<br>
<li>
<b>
<a href="papers/ICSE2016a.pdf">Reference Hijacking: Patching, Protecting and Analyzing on Unmodified and Non-Rooted Android Devices</a>
</b>
<br>
<b><i>Wei You</i></b>,
Bin Liang,
Wenchang Shi,
Shuyang Zhu,
Peng Wang,
Sikefu Xie,
Xiangyu Zhang
<br>
Proceedings of the 38th International Conference on Software Engineering (<b>ICSE 2016</b>)
</li>
<br>
<li>
<b>
<a href="papers/ICSE2016b.pdf">AntMiner: Mining More Bugs by Reducing Noise Interference</a>
</b>
<br>
Bin Liang,
Pan Bian,
Yan Zhang,
Wenchang Shi,
<b><i>Wei You</i></b>,
Yan Cai
<br>
Proceedings of the 38th International Conference on Software Engineering (<b>ICSE 2016</b>)
</li>
<br>
<li>
<b>
<a href="papers/WWW2016.pdf">Cracking Classifiers for Evasion: A Case Study on the Google’s Phishing Pages Filter</a>
</b>
<br>
Bin Liang,
Miaoqiang Su,
<b><i>Wei You</i></b>,
Wenchang Shi,
Gang Yang
<br>
Proceedings of the 25th International World Wide Web Conference (<b>WWW 2016</b>)
</li>
<br>
<li>
<b>
<a href="papers/ASIACCS2015.pdf">Android Implicit Information Flow Demystified</a>
</b>
<br>
<b><i>Wei You</i></b>,
Bin Liang,
Jingzhe Li,
Wenchang Shi,
Xiangyu Zhang
<br>
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (<b>ASIACCS 2015</b>)
</li>
<br>
<li>
<b>
<a href="papers/DSN2014.pdf">Scriptless Timing Attacks on Web Browser Privacy</a>
</b>
<br>
Bin Liang,
<b><i>Wei You</i></b>,
Liangkun Liu,
Wenchang Shi,
Mario Heiderich.
<br>
Proceedings of the 44th International Conference on Dependable Systems and Networks (<b>DSN 2014</b>)
</li>
<br>
<li>
<b>
<a href="papers/ASIACCS2011.pdf">Detecting Stealthy Malware with Inter-Structure and Imported Signatures</a>
</b>
<br>
Bin Liang,
<b><i>Wei You</i></b>,
Wenchang Shi,
Zhaohui Liang
<br>
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (<b>ASIACCS 2011</b>)
</li>
<br>
</ul>
<div class="page-header">
<h2>Professional Activities</h2>
</div>
<h4>Reviewer</h4>
<ul>
<li>
IEEE Transactions on Dependable and Secure Computing (TDSC)
</li>
<li>
IEEE Transactions on Software Engineering (TSE)
</li>
<li>
Journal of Computer & Security (JSC)
</li>
</ul>
<h4>Sub-reviewer</h4>
<ul>
<li>
25th and 26th ACM Conference on Computer and Communications Security (CCS 2018, 2019)
</li>
<li>
24th and 25th Annual Network and Distributed System Security Symposium (NDSS 2017, 2018)
</li>
<li>
40th and 41st IEEE/ACM International Conference on Software Engineering (ICSE 2018, 2019)
</li>
<li>
26th and 27th ACM Conference on the Foundations of Software Engineering (FSE 2018, 2019)
</li>
<li>
33rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2018)
</li>
<li>
40th ACM Conference on Programming Language Design and Implementation (PLDI 2019)
</li>
</ul>
<!-- /.main -->
</div><!-- /.row -->
</div><!-- /.container -->
<br>
<br>
</body></html>