Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path Traversal Vulnerability across GitHubACM Asia Conference on Computer and Communications Security (AsiaCCS), 2025 |
ROSA: Finding Backdoors with FuzzingInternational Conference on Software Engineering (ICSE), 2025 |
Automatically Generating Rules of Malicious Software Packages via Large Language ModelDependable Systems and Networks (DSN), 2025 |
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on
Pre-trained Model HubsInternational Conference on Automated Software Engineering (ASE), 2024 |
Towards Robust Detection of Open Source Software Supply Chain Poisoning
Attacks in Industry EnvironmentsInternational Conference on Automated Software Engineering (ASE), 2024 |