Dinghao Wu

    • 1043 Citations
    • 17 h-Index
    19952019
    If you made any changes in Pure, your changes will be visible here soon.

    Research Output 1995 2019

    2019

    A lightweight framework for regular expression verification

    Liu, X., Jiang, Y. & Wu, D., Mar 22 2019, Proceedings - 19th IEEE International Symposium on High Assurance Systems Engineering, HASE 2019. Yu, D., Nguyen, V. & Jiang, C. (eds.). IEEE Computer Society, p. 1-8 8 p. 8673038. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering; vol. 2019-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Finite automata
    Intrusion detection
    Specifications
    Testing
    Formal specification

    Automatic grading of programming assignments: An approach based on formal semantics

    Liu, X., Wang, S., Wang, P. & Wu, D., May 1 2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering Education and Training, ICSE-SEET 2019. Institute of Electrical and Electronics Engineers Inc., p. 126-137 12 p. 8802114. (Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering Education and Training, ICSE-SEET 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    grading
    Computer programming
    programming
    Semantics
    semantics

    Field experience with obfuscating million-user iOS apps in large enterprise mobile development

    Wang, P., Wu, D., Chen, Z. & Wei, T., Feb 1 2019, In : Software - Practice and Experience. 49, 2, p. 252-273 22 p.

    Research output: Contribution to journalArticle

    Application programs
    Industry
    Reverse engineering
    Ecosystems
    Software engineering

    Xmark: Dynamic Software Watermarking Using Collatz Conjecture

    Ma, H., Jia, C., Li, S., Zheng, W. & Wu, D., Nov 1 2019, In : IEEE Transactions on Information Forensics and Security. 14, 11, p. 2859-2874 16 p., 8676372.

    Research output: Contribution to journalArticle

    Watermarking
    Flow control
    Semantics
    Reverse engineering
    Pattern matching
    2018
    4 Citations (Scopus)

    Automated Synthesis of Access Control Lists

    Liu, X., Holden, B. & Wu, D., Jun 21 2018, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 104-109 6 p. (Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Access control
    Encapsulation
    Artificial intelligence
    1 Citation (Scopus)

    From natural language to programming language

    Liu, X. & Wu, D., May 9 2018, Innovative Methods, User-Friendly Tools, Coding, and Design Approaches in People-Oriented Programming. IGI Global, p. 110-130 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Computer programming
    Computer programming languages
    Computer program listings
    Software engineering
    Semantics
    1 Citation (Scopus)

    Lambda obfuscation

    Lan, P., Wang, P., Wang, S. & Wu, D., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 206-224 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Reverse engineering
    Intellectual property
    Flow control
    Semantics
    Engineers

    Large-scale Third-party Library Detection in Android Markets

    Li, M., Wang, P., Wang, W., Wang, S., Wu, D., Liu, J., Xue, R., Huo, W. & Zou, W., Jan 1 2018, (Accepted/In press) In : IEEE Transactions on Software Engineering.

    Research output: Contribution to journalArticle

    Application programs
    Android (operating system)
    Ecosystems
    Scalability
    Marketing
    1 Citation (Scopus)

    Protecting million-user iOS apps with obfuscation: Motivations, pitfalls, and experience

    Wang, P., Wu, D., Chen, Z. & Wei, T., May 27 2018, Proceedings 2018 ACM/IEEE 40th International Conference on Software Engineering: Software Engineering in Practice, ICSE-SEIP 2018. IEEE Computer Society, p. 235-244 10 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Application programs
    Reverse engineering
    Ecosystems
    Industry
    Profitability
    4 Citations (Scopus)

    RedDroid: Android Application Redundancy Customization Based on Static Analysis

    Jiang, Y., Bao, Q., Wang, S., Liu, X. & Wu, D., Nov 16 2018, Proceedings - 29th IEEE International Symposium on Software Reliability Engineering, ISSRE 2018. Ghosh, S., Cukic, B., Poston, R., Natella, R. & Laranjeiro, N. (eds.). IEEE Computer Society, p. 189-199 11 p. 8539081. (Proceedings - International Symposium on Software Reliability Engineering, ISSRE; vol. 2018-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Static analysis
    Application programs
    Redundancy
    Smartphones
    Hard disk storage

    SecControl: Bridging the gap between security tools and SDN controllers

    Wang, L. & Wu, D., Jan 1 2018, Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Proceedings. Ghorbani, A., Ren, K., Zhu, S., Zhang, A. & Lin, X. (eds.). Springer Verlag, p. 11-31 21 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 239).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Controllers
    Network security
    Software defined networking
    Experiments
    2 Citations (Scopus)

    Turing obfuscation

    Wang, Y., Wang, S., Wang, P. & Wu, D., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 225-244 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Turing machines
    Flow control
    Reverse engineering
    Flow graphs
    Machine components
    3 Citations (Scopus)

    VMhunt: A verifiable approach to partially-virtualized binary code simplification

    Xu, D., Ming, J., Fu, Y. & Wu, D., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 442-458 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Cryptography
    Radar
    Switches
    Virtualization
    2017
    22 Citations (Scopus)

    Adaptive unpacking of android apps

    Xue, L., Luo, X., Yu, L., Wang, S. & Wu, D., Jul 19 2017, Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017. Institute of Electrical and Electronics Engineers Inc., p. 358-369 12 p. 7985676. (Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Packers
    Application programs
    Reverse engineering
    Android (operating system)
    1 Citation (Scopus)

    Binary code retrofiting and hardening using SGX

    Wang, S., Wang, W., Bao, Q., Wang, P., Wang, X. F. & Wu, D., Nov 3 2017, FEAST 2017 - Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 43-49 7 p. (FEAST 2017 - Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Hardening
    Cryptography
    Semantics
    Data storage equipment
    4 Citations (Scopus)

    Composite software diversification

    Wang, S., Wang, P. & Wu, D., Nov 2 2017, Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. Institute of Electrical and Electronics Engineers Inc., p. 284-294 11 p. 8094429. (Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Composite materials
    Chemical analysis
    Costs
    19 Citations (Scopus)

    Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping

    Xu, D., Ming, J. & Wu, D., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 921-937 17 p. 7958617. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Computer system firewalls
    Semantics
    Malware

    FEAST 2017: The secondworkshop on forming an ecosystem around software transformation

    Kim, T. & Wu, D., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2633-2634 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Security of data
    Ecosystems
    Secure communication
    4 Citations (Scopus)

    Impeding behavior-based malware analysis via replacement attacks to malware specifications

    Ming, J., Xin, Z., Lan, P., Wu, D., Liu, P. & Mao, B., Aug 1 2017, In : Journal of Computer Virology and Hacking Techniques. 13, 3, p. 193-207 15 p.

    Research output: Contribution to journalArticle

    Specifications
    Malware
    Camouflage
    Syntactics
    5 Citations (Scopus)

    In-memory fuzzing for binary code similarity analysis

    Wang, S. & Wu, D., Nov 20 2017, ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering. Nguyen, T. N., Rosu, G. & Di Penta, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 319-330 12 p. 8115645. (ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Binary Code
    Data storage equipment
    Feature Vector
    Trace
    31 Citations (Scopus)

    LibD: Scalable and precise third-party library detection in android markets

    Li, M., Wang, W., Wang, P., Wang, S., Wu, D., Liu, J., Xue, R. & Huo, W., Jul 19 2017, Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017. Institute of Electrical and Electronics Engineers Inc., p. 335-346 12 p. 7985674. (Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Application programs
    Ecosystems
    Android (operating system)
    Scalability

    MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization

    Ming, J., Xu, D. & Wu, D., Aug 1 2017, In : Journal of Computer Virology and Hacking Techniques. 13, 3, p. 167-178 12 p.

    Research output: Contribution to journalArticle

    Semantics
    Binary codes
    Reverse engineering
    Syntactics
    Software engineering
    6 Citations (Scopus)

    Semantics-aware machine learning for function recognition in binary code

    Wang, S., Wang, P. & Wu, D., Nov 2 2017, Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. Institute of Electrical and Electronics Engineers Inc., p. 388-398 11 p. 8094438

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Learning systems
    Semantics
    Distribution functions
    2016
    4 Citations (Scopus)

    An analysis of BIM web service requirements and design to support energy efficient building lifecycle

    Jiang, Y., Liu, X., Liu, F., Wu, D. & Anumba, C. J., Apr 29 2016, In : Buildings. 6, 2, 20.

    Research output: Contribution to journalArticle

    Web services
    Computer applications
    Electronic data interchange
    Application programs
    Interfaces (computer)
    1 Citation (Scopus)

    BinCFP: Efficient multi-threaded binary code control flow profiling

    Ming, J. & Wu, D., Dec 12 2016, Proceedings - 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation, SCAM 2016. Institute of Electrical and Electronics Engineers Inc., p. 61-66 6 p. 7781797. (Proceedings - 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation, SCAM 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Flow control
    Utility programs
    Flow graphs
    Reverse engineering
    9 Citations (Scopus)

    Deviation-based obfuscation-resilient program equivalence checking with application to software plagiarism detection

    Ming, J., Zhang, F., Wu, D., Liu, P. & Zhu, S., Dec 1 2016, In : IEEE Transactions on Reliability. 65, 4, p. 1647-1664 18 p., 7490384.

    Research output: Contribution to journalArticle

    Semantics
    Copying
    Industry
    Experiments
    9 Citations (Scopus)

    Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods

    Jiang, Y., Zhang, C., Wu, D. & Liu, P., Mar 1 2016, Proceedings - 17th IEEE International Symposium on High Assurance Systems Engineering, HASE 2016. Babiceanu, R., Waeselynck, H., Xu, J., Paul, R. A. & Cukic, B. (eds.). IEEE Computer Society, p. 122-131 10 p. 7423143. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering; vol. 2016-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Software engineering
    Creep
    9 Citations (Scopus)

    Generalized dynamic opaque predicates: A new control flow obfuscation method

    Xu, D., Ming, J. & Wu, D., Jan 1 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 323-342 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9866 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Obfuscation
    Flow Control
    Flow control
    Predicate
    Semantics

    ICruiser: Protecting Kernel Link-Based Data Structures with Secure Canary

    Li, W., Wu, D. & Liu, P., Sep 21 2016, Proceedings - 2016 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2016. Institute of Electrical and Electronics Engineers Inc., p. 31-38 8 p. 7573721. (Proceedings - 2016 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Data structures
    Binary trees
    Seed
    9 Citations (Scopus)

    JRed: Program Customization and Bloatware Mitigation Based on Static Analysis

    Jiang, Y., Wu, D. & Liu, P., Aug 24 2016, Proceedings - 2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016. Claycomb, W., Milojicic, D., Liu, L., Matskin, M., Zhang, Z., Reisman, S., Sato, H., Zhang, Z. & Ahamed, S. I. (eds.). IEEE Computer Society, p. 12-21 10 p. 7551989. (Proceedings - International Computer Software and Applications Conference; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Trimming
    Static analysis
    Soot
    Software engineering
    Data storage equipment
    6 Citations (Scopus)

    Moving target defense against network reconnaissance with softwaredefined networking

    Wang, L. & Wu, D., Jan 1 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 203-217 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9866 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Moving Target
    Networking
    Local area networks
    Computer systems
    Reflector
    3 Citations (Scopus)

    Program-object level data flow analysis with applications to data leakage and contamination forensics

    Xiao, G., Wang, J., Liu, P., Ming, J. & Wu, D., Mar 9 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 277-284 8 p. (CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Data flow analysis
    Contamination
    Servers
    Data flow graphs
    Leakage (fluid)
    5 Citations (Scopus)

    Repackage-proofing android apps

    Luo, L., Fu, Y., Wu, D., Zhu, S. & Liu, P., Sep 29 2016, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 550-561 12 p. 7579771. (Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Application programs
    Ecosystems
    Android (operating system)
    10 Citations (Scopus)

    StraightTaint: Decoupled offline symbolic taint analysis

    Ming, J., Wu, D., Wang, J., Xiao, G. & Liu, P., Aug 25 2016, ASE 2016 - Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering. Khurshid, S., Lo, D. & Apel, S. (eds.). Association for Computing Machinery, Inc, p. 308-319 12 p. (ASE 2016 - Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Dynamic analysis
    Computer forensics
    Reverse engineering
    Program processors
    Communication
    7 Citations (Scopus)

    Translingual obfuscation

    Wang, P., Wang, S., Ming, J., Jiang, Y. & Wu, D., May 9 2016, Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016. Institute of Electrical and Electronics Engineers Inc., p. 128-144 17 p. 7467351. (Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Logic programming
    Computer programming languages
    Reverse engineering
    Flow control
    Engineers
    2015
    4 Citations (Scopus)

    A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract)

    Jiang, Y., Zhang, C., Wu, D. & Liu, P., Nov 6 2015, Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015. Institute of Electrical and Electronics Engineers Inc., p. 184-185 2 p. 7322142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Data flow analysis
    Computer programming
    Computer programming languages
    Software engineering
    Creep
    6 Citations (Scopus)

    Automatic building information model query generation

    Jian, Y., Yu, N., Ming, J., Lee, S., Degraw, J., Yen, J., Messner, J. I. & Wu, D., Dec 1 2015, In : Journal of Information Technology in Construction. 20, p. 518-535 18 p.

    Research output: Contribution to journalArticle

    Data structures
    Data integration
    Interoperability
    Information management
    Personnel
    16 Citations (Scopus)

    LOOP: Logic-oriented opaque predicate detection in obfuscated binary code

    Ming, J., Xu, D., Wang, L. & Wu, D., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 757-768 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Reverse engineering
    Flow control
    Malware
    3 Citations (Scopus)

    Memoized semantics-based binary diffing with application to malware lineage inference

    Ming, J., Xu, D. & Wu, D., Jan 1 2015, ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Proceedings. Federrath, H. & Gollmann, D. (eds.). Springer New York LLC, p. 416-430 15 p. (IFIP Advances in Information and Communication Technology; vol. 455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Semantics
    Binary codes
    Syntactics
    Malware
    Inference
    10 Citations (Scopus)

    Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection

    Jhi, Y. C., Jia, X., Wang, X., Zhu, S., Liu, P. & Wu, D., Sep 1 2015, In : IEEE Transactions on Software Engineering. 41, 9, p. 925-943 19 p., 7076635.

    Research output: Contribution to journalArticle

    Semantics
    7 Citations (Scopus)

    Replacement attacks: Automatically impeding behavior-based malware specifications

    Ming, J., Xin, Z., Lan, P., Wu, D., Liu, P. & Mao, B., Jan 1 2015, Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, Revised Selected Papers. Malkin, T., Lewko, A. B., Kolesnikov, V. & Polychronakis, M. (eds.). Springer Verlag, p. 497-517 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Malware
    Replacement
    Attack
    Specification
    Specifications
    10 Citations (Scopus)

    Risk Assessment of Buffer 'Heartbleed' Over-Read Vulnerabilities

    Wang, J., Zhao, M., Zeng, Q., Wu, D. & Liu, P., Sep 14 2015, Proceedings - 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015. IEEE Computer Society, p. 555-562 8 p. 7266882. (Proceedings of the International Conference on Dependable Systems and Networks; vol. 2015-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Risk assessment
    1 Citation (Scopus)

    Uncovering the dilemmas on antivirus software design in modern mobile platforms

    Huang, H., Chen, K., Liu, P., Zhu, S. & Wu, D., Jan 1 2015, International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Srivatsa, M., Tian, J. & Jing, J. (eds.). Springer Verlag, p. 359-366 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 153).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Software design
    Detectors
    Scanning
    Malware
    Mobile devices
    2014
    8 Citations (Scopus)

    A framework for integrating change management with building information modeling

    Liu, F., Jallow, A. K., Anumba, C. J. & Wu, D., Jan 1 2014, Computing in Civil and Building Engineering - Proceedings of the 2014 International Conference on Computing in Civil and Building Engineering. Issa, R. R. & Flood, I. (eds.). American Society of Civil Engineers (ASCE), p. 439-446 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Data structures
    Energy efficiency
    3 Citations (Scopus)

    PiE: Programming in Eliza

    Liu, X. & Wu, D., Jan 1 2014, ASE 2014 - Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering. Association for Computing Machinery, Inc, p. 695-700 6 p. (ASE 2014 - Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Computer programming languages
    Processing
    15 Citations (Scopus)

    Program logic based software plagiarism detection

    Zhang, F., Wu, D., Liu, P. & Zhu, S., Dec 11 2014, In : Proceedings - International Symposium on Software Reliability Engineering, ISSRE. p. 66-77 12 p., 6982615.

    Research output: Contribution to journalConference article

    Semantics
    Copying
    Industry
    57 Citations (Scopus)

    Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection

    Luo, L., Ming, J., Wu, D., Liu, P. & Zhu, S., Nov 16 2014, 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering, FSE 2014 - Proceedings. Association for Computing Machinery, p. 389-400 12 p. (Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering; vol. 16-21-November-2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Semantics
    1 Citation (Scopus)

    Software cruising: A new technology for building concurrent software monitor

    Wu, D., Liu, P., Zeng, Q. & Tian, D., Nov 1 2014, Secure Cloud Computing. Springer New York, Vol. 9781461492788. p. 303-324 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Data structures
    Monitoring
    Farms
    Servers
    Throughput
    6 Citations (Scopus)

    Teaching information security with virtual laboratories

    Wu, D., Fulmer, J. & Johnson, S., Jan 1 2014, Innovative Practices in Teaching Information Sciences and Technology: Experience Reports and Reflections. Springer International Publishing, Vol. 9783319036564. p. 179-192 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Security of data
    Teaching
    Information science
    Education
    information science