Min Yang 杨 珉

Professor, Executive Dean, AICS, Fudan University

Office: A6011, Interdisciplinary Building No.2, Jiangwan Campus, Fudan University

Email: m_yang at fudan.edu.cn

I am a Professor and the Executive Dean of the Computation and Artificial Intelligence Innovative College (AICS) at Fudan University. I lead the System Software and Security Lab at Fudan University, which is ranked the 12th worldwide according to the CSRankings based on our research outcomes in the past decade. I received my Bachelor and PhD degree from Fudan University.

I have published over 100 papers as the corresponding author on top-tier cybersecurity and AI venues (TPAMI, NeurIPS, CVPR, AAAI, ACL), including over 40 papers on the big-four cybersecurity conferences (S&P, CCS, USENIX Security, and NDSS). My work has generated far-reaching real-world impact, which made substantial contributions to the cybersecurity research and developement of large IT corporations including Alibaba, Huawei, Baidu and many others. I'm fortunate to have received a couple of best paper awards at top-tier international conferences.

Research Interests: AI System Security/Safety, OS Security, Mobile Security, Cybercrime, Vulnerability Analysis and Mining

Prospective PhD/Master/Undergraduate students: If you are interested in joining my group, please email me with your CV and a short research statement.


Awards and Honors


Professional Service

Publications

Google Scholar Profile

   

OpenDeception: Benchmarking and Investigating AI Deceptive Behaviors via Open-ended Interaction Simulation
Y Wu, X Pan, G Hong, M Yang
arXiv preprint arXiv:2504.13707, 2025

   

Large language model-powered AI systems achieve self-replication with no human intervention
X Pan, J Dai, Y Fan, M Luo, C Li, M Yang
arXiv preprint arXiv:2503.17378, 2025

   

Exposing the Hidden Layer: Software Repositories in the Service of SEO Manipulation
M Wu, G Hong, W Mai, X Wu, L Zhang, Y Pu, H Chai, L Ying, H Duan, M Yang
2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE), 2025

   

Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration
M Wu, G Hong, J Chen, Q Liu, S Tang, Y Li, B Liu, H Duan, M Yang
arXiv preprint arXiv:2412.15696, 2024

   

Frontier AI systems have surpassed the self-replicating red line
X Pan, J Dai, Y Fan, M Yang
arXiv preprint arXiv:2412.12140, 2024

   

Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps
S Li, Z Yang, Y Nan, S Yu, Q Zhu, M Yang
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS), 2024

   

Rag-thief: Scalable extraction of private data from retrieval-augmented generation applications with agent-based attacks
C Jiang, X Pan, G Hong, C Bao, M Yang
arXiv preprint arXiv:2411.14110, 2024

   

Matryoshka: Exploiting the Over-Parametrization of Deep Learning Models for Covert Data Transmission
X Pan, M Zhang, Y Yan, S Zhang, M Yang
IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2024

   

A proactive trust evaluation system for secure data collection based on sequence extraction
M Huang, Z Li, A Liu, X Zhang, Z Yang, M Yang
IEEE Transactions on Dependable and Secure Computing (TDSC), 2024

   

Efficient detection of java deserialization gadget chains via bottom-up gadget search and dataflow-aided payload construction
B Chen, L Zhang, X Huang, Y Cao, K Lian, Y Zhang, M Yang
2024 IEEE Symposium on Security and Privacy (S&P), 2024

   

BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting
H Qiu, J Sun, M Zhang, X Pan, M Yang
2024 IEEE Symposium on Security and Privacy (S&P), 2024

   

Withdrawing is believing? Detecting inconsistencies between withdrawal choices and third-party data collections in mobile apps
X Du, Z Yang, J Lin, Y Cao, M Yang
2024 IEEE Symposium on Security and Privacy (S&P), 2024

   

Rrl: Recommendation reverse learning
X You, J Xu, M Zhang, Z Gao, M Yang
Proceedings of the AAAI Conference on Artificial Intelligence 38 (8), 2024

   

Sctrans: Constructing a large public scenario dataset for simulation testing of autonomous driving systems
J Dai, B Gao, M Luo, Z Huang, Z Li, Y Zhang, M Yang
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering (ICSE), 2024

   

Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale
S Li, Z Yang, Y Yang, D Liu, M Yang
IEEE Transactions on Information Forensics and Security (TIFS) 19, 2024

   

Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem
J Wu, Y Nan, L Xing, J Cheng, Z Lin, Z Zheng, M Yang
Network and Distributed System Security Symposium (NDSS), 2024

   

No-Skim: Towards Efficiency Robustness Evaluation on Skimming-based Language Models
S Zhang, M Zhang, X Pan, M Yang
arXiv preprint arXiv:2312.09494, 2023

   

Trusteddomain compromise attack in app-in-app ecosystems
Z Zhang, Z Zhang, K Lian, G Yang, L Zhang, Y Zhang, M Yang
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

   

Under the dark: a systematical study of stealthy mining pools (ab)use in the wild
Z Zhang, G Hong, X Li, Z Fu, J Zhang, M Liu, C Wang, J Chen, B Liu, H Duan, C Zhang, M Yang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2023

   

Syzdirect: Directed greybox fuzzing for linux kernel
X Tan, Y Zhang, J Lu, X Xiong, Z Liu, M Yang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2023

   

Nestfuzz: Enhancing fuzzing with comprehensive understanding of input processing logic
P Deng, Z Yang, L Zhang, G Yang, W Hong, Y Zhang, M Yang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2023

   

Jade: A linguistics-based safety evaluation platform for large language models
M Zhang, X Pan, M Yang
arXiv preprint arXiv:2311.00286, 2023

   

Cracking white-box dnn watermarks via invariant neuron transforms
X Pan, M Zhang, Y Yan, Y Wang, M Yang
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

   

DARPA: Combating asymmetric dark ui patterns on android with run-time view decorator
Z Cai, Y Nan, X Wang, M Long, Q Ou, M Yang, Z Zheng
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2023

   

Black-box adversarial attack on time series classification
D Ding, M Zhang, F Feng, Y Huang, E Jiang, M Yang
Proceedings of the AAAI Conference on Artificial Intelligence 37 (6), 2023

   

Understanding privacy over-collection in wechat sub-app ecosystem
X Zhang, Y Wang, X Zhang, Z Huang, L Zhang, M Yang
arXiv preprint arXiv:2306.08391, 2023

   

AEM: Facilitating cross-version exploitability assessment of linux kernel vulnerabilities
Z Jiang, Y Zhang, J Xu, X Sun, Z Liu, M Yang
2023 IEEE Symposium on Security and Privacy (S&P), 2023

   

Recovering call graphs for binaries with transfer and contrastive learning
W Zhu, Z Feng, Z Zhang, J Chen, Z Ou, M Yang, C Zhang
2023 IEEE Symposium on Security and Privacy (S&P), 2357-2374

   

Understanding the (in) security of cross-side face verification systems in mobile apps: A system perspective
X Zhang, H Ye, Z Huang, X Ye, Y Cao, Y Zhang, M Yang
2023 IEEE Symposium on Security and Privacy (S&P), 934-950

   

MASS: Model-agnostic, semantic and stealthy data poisoning attack on knowledge graph embedding
X You, B Sheng, D Ding, M Zhang, X Pan, M Yang, F Feng
Proceedings of the ACM Web Conference 2023, 2000-2010

   

Anti-FakeU: Defending shilling attacks on graph neural network based recommender model
X You, C Li, D Ding, M Zhang, F Feng, X Pan, M Yang
Proceedings of the ACM Web Conference 2023, 938-948

   

VenomAttack: Automated and adaptive activity hijacking in Android
P Sun, S Chen, L Fan, P Gao, F Song, M Yang
Frontiers of Computer Science 17 (1), 171801

   

Exorcising 'Wraith': Protecting LiDAR-based object detector in automated driving system from appearing attacks
Q Xiao, X Pan, Y Lu, M Zhang, J Dai, M Yang
32nd USENIX Security Symposium (USENIX Security 23), 2939-2956

   

JADE: A linguistics-based safety evaluation platform for LLM
M Zhang, X Pan, M Yang
arXiv preprint arXiv:2311.00286

   

Notice the imposter! A study on user tag spoofing attack in mobile apps
S Li, Z Yang, G Yang, H Zhang, N Hua, Y Huang, M Yang
32nd USENIX Security Symposium (USENIX Security 23), 5485-5501

   

Rethinking white-box watermarks on deep learning models under neural structural obfuscation
Y Yan, X Pan, M Zhang, M Yang
32nd USENIX Security Symposium (USENIX Security 23), 2347-2364

   

Collect Responsibly But Deliver Arbitrarily? A Study on Cross-User Privacy Leakage in Mobile Apps
M Y. S. Li, Z. Yang, N. Hua, P. Liu, X. Zhang, G. Yang
ACM Conference on Computer and Communications Security (CCS), 2022

   

Precise (un)affected version analysis for web vulnerabilities
Y Shi, Y Zhang, T Luo, X Mao, M Yang
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2022

   

MetaV: A meta-verifier approach to task-agnostic model fingerprinting
X Pan, Y Yan, M Zhang, M Yang
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), 2022

   

Identity Confusion in WebView-based Mobile App-in-app Ecosystems
L Zhang, Z Zhang, A Liu, Y Cao, X Zhang, Y Chen, G Yang, M Yang
31st USENIX Security Symposium (USENIX Security), 2022

   

Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches
Y Shi, Y Zhang, T Luo, X Mao, Y Cao, Z Wang, Y Zhao, Z Huang, M Yang
31st USENIX Security Symposium (USENIX Security), 2022

   

Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis
X Pan, M Zhang, Y Yan, J Zhu, M Yang
31st USENIX Security Symposium (USENIX Security), 2022

   

Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths
S Zhou, Z Yang, D Qiao, P Liu, M Yang, Z Wang, C Wu
31st USENIX Security Symposium (USENIX Security), 2022

   

Rendering Contention Channel Made Practical in Web Browsers
S Wu, J Yu, M Yang, Y Cao
31st USENIX Security Symposium (USENIX Security), 2022

   

Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model
X Pan, Y Yan, S Zhang, M Zhang, M Yang
arXiv preprint arXiv:2206.14371

   

Exploit the Last Straw that Breaks Android Systems
L Zhang, K Lian, H Xiao, Z Zhang, P Liu, Y Zhang, M Yang, H Duan
2022 IEEE Symposium on Security and Privacy (S&P), 2230-2247

   

Analyzing Ground-Truth Data of Mobile Gambling Scams
G Hong, Z Yang, S Yang, X Liaoy, X Du, M Yang, H Duan
2022 IEEE Symposium on Security and Privacy (S&P), 2176-2193

   

Towards Backdoor Attack on Deep Learning based Time Series Classification
D Ding, M Zhang, Y Huang, X Pan, F Feng, E Jiang, M Yang
38th International Conference on Data Engineering (ICDE), 2022

   

Understanding the Practice of Security Patch Management Across Multiple Branches in OSS Projects
X Tan, Y Zhang, J Cao, K Sun, M Zhang, M Yang
Proceedings of the ACM Web Conference 2022

   

Dancing with Wolves: An Intra-Process Isolation Technique with Privileged Hardware
C Wu, M Xie, Z Wang, Y Zhang, K Lu, X Zhang, Y Lai, Y Kang, M Yang
IEEE Transactions on Dependable and Secure Computing (TDSC) 20 (3), 1959-1978

   

Slowing Down the Aging of Learning-Based Malware Detectors with API Knowledge
X Zhang, M Zhang, Y Zhang, M Zhong, X Zhang, Y Cao, M Yang
IEEE Transactions on Dependable and Secure Computing (TDSC) 20 (2), 902-916

   

Rendering contention channel made practical in web browsers
S Wu, J Yu, M Yang, Y Cao
31st USENIX Security Symposium (USENIX Security 22), 3183-3199, 2022

   

Hidden trigger backdoor attack on {NLP} models via linguistic style manipulation
X Pan, M Zhang, B Sheng, J Zhu, M Yang
31st USENIX Security Symposium (USENIX Security 22), 3611-3628, 2022

   

Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains
X Pan, M Zhang, Y Yan, M Yang
Annual Computer Security Applications Conference (ACSAC), 2021

   

Locating the security patches for disclosed oss vulnerabilities with vulnerability-commit correlation ranking
X Tan, Y Zhang, C Mi, J Cao, K Sun, Y Lin, M Yang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2021

   

Facilitating vulnerability assessment through poc migration
J Dai, Y Zhang, H Xu, H Lyu, Z Wu, X Xing, M Yang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2021

   

A Deep Learning Framework for Self-evolving Hierarchical Community Detection
D Ding, M Zhang, H Wang, X Pan, M Yang, X He
30th ACM International Conference on Information and Knowledge Management (CIKM), 2021

   

TAFA: A Task-Agnostic Fingerprinting Algorithm for Neural Networks
X Pan, M Zhang, Y Lu, M Yang
26th European Symposium on Research in Computer Security (ESORICS), 542-562, 2021

   

Enhancing time series predictors with generalized extreme value loss
M Zhang, D Ding, X Pan, M Yang
IEEE Transactions on Knowledge and Data Engineering, 35 (2), 1473-1487, 2021

   

Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks
K Shen, C Wang, M Guo, X Zheng, C Lu, B Liu, Y Zhao, S Hao, H Duan, Q Pan, M Yang
30th USENIX Security Symposium (USENIX Security 21), 2021

   

Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking
X Tan, Y Zhang, X Yang, K Lu, M Yang
30th USENIX Security Symposium (USENIX Security 21), 2471-2488, 2021

   

From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR
B. Liu, C. Lu, Y. Zhang, Z. Li, F. Zhang, H. Duan, Y. Liu, J. Chen, J. Liang, et al.
Network and Distributed System Security Symposium (NDSS), 2021

   

icallee: Recovering call graphs for binaries
W Zhu, Z Feng, Z Zhang, Z Ou, M Yang, C Zhang
CoRR, 2021

   

Understanding promotion-as-a-service on GitHub
K Du, H Yang, Y Zhang, H Duan, H Wang, S Hao, Z Li, M Yang
Annual Computer Security Applications Conference (ACSAC), 597-610, 2020

   

Modeling personalized out-of-town distances in location recommendation
D Ding, M Zhang, X Pan, M Yang, X He
2020 IEEE International Conference on Data Mining (ICDM), 112-121, 2020

   

Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware
X Zhang, Y Zhang, M Zhong, D Ding, Y Cao, Y Zhang, M Zhang, M Yang
27th ACM Conference on Computer and Communications Security (CCS), 2020

   

PDiff: Semantic-based Patch Presence Testing for Downstream Kernels
Z Jiang, Y Zhang, J Xu, Q Wen, Z Wang, X Zhang, X Xing, M Yang, Z Yang
27th ACM Conference on Computer and Communications Security (CCS), 2020

   

Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks
M Zhang, X Zheng, K Shen, Z Kong, C Lu, Y Wang, H Duan, S Hao, B Liu, et al.
27th ACM Conference on Computer and Communications Security (CCS), 1939-1952, 2020

   

An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem
S Zhou, Z Yang, J Xiang, Y Cao, M Yang, Y Zhang
29th USENIX Security Symposium (USENIX Security), 2020

   

Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent
X Pan, M Zhang, D Wu, Q Xiao, S Ji, M Yang
29th USENIX Security Symposium (USENIX Security), 2020

   

BScout: Direct Whole Patch Presence Test for Java Executables
J Dai, Y Zhang, Z Jiang, Y Zhou, J Chen, X Xing, X Zhang, X Tan, M Yang, et al.
29th USENIX Security Symposium (USENIX Security), 2020

   

TEXTSHIELD: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation
J Li, T Du, S Ji, R Zhang, Q Lu, M Yang, T Wang
29th USENIX Security Symposium (USENIX Security), 2020

   

A Geometrical Perspective on Image Style Transfer with Adversarial Learning
X Pan, M Zhang, D Ding, M Yang
IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2020

   

Privacy Risks of General-Purpose Language Models
X Pan, M Zhang, S Ji, M Yang
41st IEEE Symposium on Security and Privacy (S&P), 2020

   

Efficient and Secure SMAP-Enabled Intra-process Memory Isolation
Z Wang, C Wu, M Xie, Y Zhang, K Lu, X Zhang, Y Lai, Y Kang, M Yang
41st IEEE Symposium on Security and Privacy (S&P), 2020

   

TextExerciser: Feedback-driven Text Input Exercising for Android Applications
Y He, L Zhang, Z Yang, Y Cao, K Lian, S Li, W Yang, Z Zhang, M Yang, et al.
41st IEEE Symposium on Security and Privacy (S&P), 2020

   

How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale Study
H Xia, Y Zhang, Y Zhou, X Chen, Y Wang, X Zhang, S Cui, G Hong, et al.
42nd International Conference on Software Engineering (ICSE), 2020

   

Improving the Robustness of Wasserstein Embedding by Adversarial PAC-Bayesian Learning
D Ding, M Zhang, X Pan, M Yang, X He
34th AAAI Conference on Artificial Intelligence (AAAI), 2020

   

Theory-oriented Deep Leakage from Gradients via Linear Equation Solver
X Pan, M Zhang, Y Yan, J Zhu, M Yang
arXiv preprint arXiv:2010.13356, 2020

   

Tainting-assisted and Context-migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
IEEE Transactions on Mobile Computing, 2019

   

Modeling Extreme Events in Time Series Prediction
D Ding, M Zhang, X Pan, M Yang, X He
25th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (KDD), 2019

   

App in the Middle: Demystify Application Virtualization in Android and its Security Threats
L Zhang, Z Yang, Y He, M Li, S Yang, M Yang, Y Zhang, Z Qian
ACM on Measurement and Analysis of Computing Systems (SIGMETRICS), 2019

   

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, et al.
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2018

   

Invetter: Locating Insecure Input Validations in Android Services
L Zhang, Z Yang, Y He, Z Zhang, Z Qian, G Hong, Y Zhang, M Yang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2018

   

Detecting third-party libraries in Android applications with high precision and recall
Y Zhang, J Dai, X Zhang, S Huang, Z Yang, M Yang, H Chen
25th International Conference on Software Analysis, Evolution and Reengineering (ICSME), 2018

   

Who is answering my queries: Understanding and characterizing interception of the DNS resolution path
B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang
27th USENIX Security Symposium (USENIX Security), 2018

   

We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS
J Chen, J Jiang, H Duan, T Wan, S Chen, V Paxson, M Yang
27th USENIX Security Symposium (USENIX Security), 2018

   

An empirical study of web resource manipulation in real-world mobile applications
X Zhang, Y Zhang, Q Mo, H Xia, Z Yang, M Yang, X Wang, L Lu, H Duan
27th USENIX Security Symposium (USENIX Security), 2018

   

Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
Network and Distributed System Security Symposium (NDSS), 2018

   

System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
15th Annual Conference on Mobile Systems, Applications, and Services (MobiSys), 2017

   

Identifying user-input privacy in mobile applications at a large scale
Y Nan, Z Yang, M Yang, S Zhou, Y Zhang, G Gu, X Wang, L Sun
IEEE Transactions on Information Forensics and Security (TIFS), 2017

   

A survey of privacy protection techniques for mobile devices
L Zhang, D Zhu, Z Yang, L Sun, M Yang
Journal of Communications and Information Networks (JCIN), 2016

   

Rethinking permission enforcement mechanism on mobile systems
Y Zhang, M Yang, G Gu, H Chen
IEEE Transactions on Information Forensics and Security (TIFS), 2016

   

Finedroid: Enforcing Permissions with System-Wide Application Execution Context
Y Zhang, M Yang, G Gu, H Chen
International Conference on Security and Privacy in Communication Systems, 2015

   

Uipicker: User-Input Privacy Identification in Mobile Applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th USENIX Security Symposium (USENIX Security 2015), 2015

   

Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps
Y Zhang, M Yang, Z Yang, G Gu, P Ning, B Zang
IEEE Transactions on Information Forensics and Security (TIFS), 2014

   

Cost-Based Optimization of Logical Partitions for a Query Workload in a Hadoop Data Warehouse
S Peng, J Gu, XS Wang, W Rao, M Yang, Y Cao
16th Asia-Pacific Web Conference (APWeb 2014), 2014

   

Cost-Based Join Algorithm Selection in Hadoop
J Gu, S Peng, XS Wang, W Rao, M Yang, Y Cao
15th International Conference on Web Information Systems Engineering (WISE 2014), 2014

   

Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
ACM SIGSAC Conference on Computer & Communications Security (CCS 2013), 2013

   

Appintent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
ACM SIGSAC Conference on Computer & Communications Security (CCS 2013), 2013

   

Leakminer: Detect Information Leakage on Android with Static Taint Analysis
Z Yang, M Yang
2012 Third World Congress on Software Engineering, 2012

   

Swift: A Register-Based JIT Compiler for Embedded JVMs
Y Zhang, M Yang, B Zhou, Z Yang, W Zhang, B Zang
8th ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE 2012), 2012

   

ORDER: Object CentRic DEterministic Replay for Java
Z Yang, M Yang, L Xu, H Chen, B Zang
USENIX Annual Technical Conference (ATC 2011), 2011