News

  • July 2017: Xiao Liu won the best paper award at the International Conference on Software Security and Assurance (ICSSA 2017). Congratulations Xiao!
  • June 2017: Xiao Liu won the bronze medal during the ACM graduate student research competition at the PLDI conference, Barcelona, Spain. Congratulations Xiao!
  • June 14, 2017: Yufei Jiang successfully defended his dissertation. Congratulations Dr. Jiang!
  • June 2017: Dr. Wu is promoted to Associate Professor.
  • June 2017: Dr. Wu becomes Penn State Institute for CyberScience (ICS) Faculty Associate.
  • June 2017: Dr. Wu receives NSF CAREER Award to advance malware detection.
  • June 2017: Shuai Wang presented his research at Chinese Academic of Science (CAS) on side channel attack detection.
  • May 2017: Xiao Liu is awarded three Travel Grants and Scholarship to attend GREPSEC 2017, IEEE S&P 2017, and PLMW @ PLDI 2017!
  • May 2017: Dongpeng Xu started to work as a research intern in Fujitsu Laboratories of America.
  • May 2017: Dongpeng Xu presented his research at IEEE S&P 2017 on cryptographic algorithm detection. (YouTube Link)
  • May 2017: Pei started to work as a research intern at Baidu USA X-Lab.
  • May 2017: Two research papers are accepted by USENIX Security ’17, a top-tier conference in security. One paper is on binary similarity analysis, BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking, and  the other is on side channel attack detection, CacheD: Identifying Cache-Based Timing Channels in Production Software. Congratulations to Yufei, Dongpeng, Shuai, Pei, Xiao and Jiang!
  • March 2017: Dr. Wu receives NSF CAREER Award.
  • March 2017: Dr. Wu receives the PNC Technologies Career Development Professorship.
  • February 2017: Our paper “Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping” is accepted by Oakland ’17, a top-tier conference in security. Congratulations!
  • Jan 207: Pei got invited to give a talk on software protection at Chinese Academy of Science in Beijing.
  • December 2016: Two papers are accepted by ICSE ’17, a top-tier conference in software engineering. One paper is on Android app unpacking, Adaptive Unpacking of Android Apps, and the other is on Android app third party library detection LibD: Scalable and Precise Third-party Library Detection in Android Markets. Congratulations!
  • October 2016: More news on our network moving target defense: Network World, and many other places, including Science DailyScience NewslineInnovation TorontoLearnIT Security NewsCryptoTipsStartupZHomeland Security News WireDaily Mail, and Techxplore.
  • September 2016: A Penn State news release on our moving target defense work: Setting up a decoy network may help deflect a hacker’s hits. The news also appeared in Science Daily. The work is also covered by Angel News and Daily Mail.
  • August 2016: JRed was also covered by Tech Republic: Bloatware as a security risk: Researchers’ innovative ways to combat the scourgeTech Switch, and itek.
  • July 2016: Office of Naval Research (ONR) press release about our work JRed to fight software bloat: Shedding the fat: ONR explores ways to trim software bloat, improve security.
  • May 2016: Dr. Wu receives the George J. McMurtry Junior Faculty Excellence in Teaching and Learning Award.
  • May 2016: Pei started to work as a research intern at Baidu USA X-Lab.
  • May 2016: Shuai started to work as a research intern at IBM T.J. Watson research center.
  • March 2016: Pei gave an invited talk on program obfuscation in University of Luxemburg.
  • Nevember 2015: Our Uroboros release has generated a few buzzes on Twitter, Weibo, Reddit, and GitHub.
  • October 2015: Our paper on Translingual Obfuscation has been conditionally accepted by EuroS&P 2016, the 1st IEEE European Symposium on Security and Privacy.
  • October 2015: Our paper on Feature-based Software Customization, led by Yufei, has been accepted by HASE 2016, the 17th IEEE High Assurance Systems Engineering Symposium.
  • October 2015: Open source software release: Uroboros: Reassembleable Disassembling.
  • July 2015: Our LOOP opaque predicate detection paper has been conditionally accepted by CCS 2015.  The code is released at here.
  • May 12, 2015: Two research papers are accepted by USENIX Security ’15, a top-tier conference in security. One paper is led by Jiang on pipelined symbolic taint analysis, and  the other is led by Shuai and Pei on reverse engineering, reassembleable disassembling. Congratulations!!!
  • April 3, 2015: Dr. Wu and Yufei visit UT Dallas. Dr. Wu gave a colloquium talk on Pipelined Symbolic Taint Analysis and Yufei presented his research on Software Customization.
  • March, 2014: Two research papers, one on replacement attacks and the other on memoized semantics-based binnary diffing, led by Jiang Ming have been accepted by ACNS 2015 and IFIP SEC 2015. Congratulations to Jiang and other coauthors.
  • November, 2014: Dinghao presented the LoPD work in ISSRE 2014 in Naples, Italy.
  • September, 2014: Dinghao presented the PiE work in ASE 2014 in Vasteras, Sweden.
  • July 1, 2014: Paper PiE: Programming in Eliza, by Xiao Liu and Dinghao Wu, has been accepted by ASE 2014!
  • June 16, 2014: Paper Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection has been accepted by FSE 2014!
  • May 1, 2014: Dr. Wu got the Junior Faculty Excellence in Research Award in recognition of his innovative and outstanding research.
  • March 20, 2014: Nan successfully defended her thesis. Congratulations Nan!
  • August 1, 2013: The SPLAD project on Software Plagiarism Detection is funded by NSF.
  • March 1, 2013: The secure lean software project is funded by Office of Naval Research (ONR).
  • August 30, 2012:The Cruiser project is funded by NSF.
  • April 20, 2012: Our paper on Algorithm Plagiarism Detection has been accepted by ISSTA 2012.
  • February 15, 2012: Our paper on building information modeling has been accepted by ASCE 2012.
  • January 30, 2012: Our paper on trusted cloud computing has been accepted by CCGrid 2012.
  • October 19, 2011: Our Kruiser paper has been accepted by NDSS 2012.
  • September 29, 2011: Our paper on leader identification for American Cancer Society’s Cancer Survivor Network has been accepted by WITS 2011.
  • August 14, 2011: Our paper on sentiment analysis for online cancer survivor community has been accepted by SocialCom 2011.
  • July 1, 2011: Our paper on remote exploit code analysis has been accepted by SecureComm 2011.
  • February 2, 2011: Our cruiser paper has been accepted by PLDI 2011 (CiteSeer Conference Ranking).
  • December 16, 2010: A research paper on runtime value based software plagarism detection has been accepted by ICSE 2011.
  • February 23, 2011: Our paper on text message classification for emergency response has been accepted by ISCRAM 2011.

Leave a Reply

Your email address will not be published. Required fields are marked *