Research Interests
Android Virtualization
Publications
- 2025 JournalVirtualPatch: Distributing Android Security Patches Through Android VirtualizationComputers & Security
- 2025 TalkMatrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on AndroidDEFCON 2025 (Mobile Hacking Community)
- 2024 ConferenceMatrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on AndroidIn Proceedings of the Annual Computer Security Applications Conference (ACSAC 2024)
- 2023 JournalVEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory ForensicsJournal of Cybersecurity and Practice
- 2021 ConferenceRepack Me If You Can: An Anti-Repackaging Solution based on Android VirtualizationIn Proceedings of Annual Computer Security Applications Conference (ACSAC 2021)
- 2021 ConferenceUnder the Hood of MARVELIn Proceedings of the Learning from Authoritative Security Experiment Results (LASER 2021)
- 2019 ConferenceHideMyApp: Hiding the Presence of Sensitive Apps on AndroidIn Proceedings of the 28th USENIX Security Symposium 2019 (USENIX Security 2019)
Theses
- "Towards Secure Virtual Apps: Bringing Application-Level Isolation to Android Virtualization"
- "Towards Secure Virtual Apps: Bringing Android Permission Model to Application Virtualization"
- "VirtualPatch: Fixing Android Security Vulnerabilities with App-Level Virtualization"
- "Virtualization-Based Malwares: Can We Defend Against Them?"
- "A Virtualization-Based Solution for Protecting Android Bluetooth Low-Energy Communications"
Android Vulnerabilities
Publications
- 2021 JournalVulnerabilities in Android WebView Objects: Still Not the End!Computers & Security
- 2021 ConferenceContact Tracing Made Un-relay-ableIn Proceedings of 11th ACM Conference on Data and Application Security and Privacy (CODASPY 2021)
- 2020 JournalDo not Let Next-Intent Vulnerability Be Your Next Nightmare: Type System Based Approach to Detect It in Android AppsInternational Journal of Information Security
Theses
- "Security Comparison Between Xiaomi System Applications and Xiaomi Applications on the Google Play Store"
Automated Vulnerabilities and Attacks Detection
Publications
- 2025 ConferenceHercules Droidot and the murder on the JNI ExpressIn Proceedings of the 34th Usenix Security Symposium (Usenix Security 2025)
- 2025 ConferencePoster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps VulnerabilitiesIn Proceedings of International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2025)
- 2023 WorkshopFuzzing for Smart Contract Interworking Security Evaluation: An Empirical Evaluation of the State of the ArtIn Proceedings of the Workshop Encouraging Building Better Blockchain Security (WEB3SEC), co-located with ACSAC 2023
- 2023 ConferenceGNN4IFA: Interest Flooding Attack Detection With Graph Neural NetworksIn Proceedings of the 8th IEEE European Symposium on Security and Privacy (Euro S&P 2023)
Theses
- "Automatic Vulnerability Testing in Android Applications"
- "Control Flow Graph-based Path Reconstruction in Android Applications"
- "Automated Analysis and Exploitation of Vulnerable Android Applications"
LLMs for Vulnerability Detection, Repair and Reverse Engineering
Publications
- 2025 ConferenceDecompiling the Synergy: An Empirical Study of Human–LLM Teaming in Software Reverse EngineeringIn Proceedings of the Network and Distributed System Security (NDSS) Symposium (NDSS 2026)
- 2025 ConferenceA Dataset for Evaluating LLMs Vulnerability Repair Performance in Android ApplicationsIn Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY 2025)
Theses
- "Leveraging Graph of Thoughts and Large Language Models for Advanced Vulnerability Detection"
- "LLMs Evaluation for Android Vulnerability Repair"
Android & IoT Reverse Engineering
Publications
- 2025 TalkE-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded SystemsBlack Hat USA 2025
- 2023 ConferenceE-Spoofer: Attacking and Defending Xiaomi Electric Scooter EcosystemIn Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'23)
- 2022 ConferenceBreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking EcosystemIn Proceedings of the Transactions on Cryptographic Hardware and Embedded Systems 2022 (TCHES 2022)
Theses
- "Reversing, Analyzing, and Attacking Xiaomi's Electric Scooter Ecosystem"
Information-Centric Networking
Publications
- 2023 JournalSecurity and Privacy of IP-ICN Coexistence: A Comprehensive SurveyIEEE Communications Surveys and Tutorials
- 2022 ConferenceSim2Testbed Transfer: NDN Performance EvaluationIn Proceedings of the 5th International Workshop on Emerging Network Security 2022 (ENS 2022) co-located with ARES 2022
- 2021 ConferenceICN PATTA: ICN Privacy Attack Through Traffic AnalysisIn Proceedings of the 46th IEEE Conference on Local Computer Networks (LCN) (IEEE LCN 2021)
- 2020 JournalThe Road Ahead for Networking: A Survey on ICN-IP Coexistence SolutionsIEEE Communications Surveys and Tutorials
- 2020 JournalChoKIFA+: An Early Detection and Mitigation Approach against Interest Flooding Attacks in NDNInternational Journal of Information Security
- 2020 ConferenceSpatial Bloom Filter in Named Data Networking: a Memory Efficient SolutionIn Proceedings of the 35th ACM/SIGAPP Symposium on Applied Computing (SAC 2020)
- 2020 ConferenceA Proactive Cache Privacy Attack on NDNIn Proceedings of 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020)
- 2019 ConferenceChoKIFA: A New Detection and Mitigation Approach against Interest Flooding Attacks in NDNIn Proceedings of the International Conference on Wired/Wireless Internet Communications (IFIP WWIC 2019)
Wireless Network Vulnerabilities
Publications
- 2023 ConferenceBeware of Pickpockets: A Practical Attack against Blocking CardsIn Proceedings of the 26th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2023)
- 2023 BookThe Security of Wireless Communication Protocols Used in Mobile Health SystemsIn: Women in Telecommunications. Women in Engineering and Science. Springer, Cham
- 2022 ConferenceWhat You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video ChannelsIn Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing (SAC 2022)
- 2019 ConferenceScaRR: Scalable Runtime Remote Attestation for Complex SystemsIn Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)
Theses
Misc
Publications
- 2022 WorkshopFace Recognition Systems: Are you sure they only consider your face?In Proceedings of the IEEE Workshop on the Internet of Safe Things (SafeThings 2022) co-located with IEEE S&P 2022
- 2022 JournalAlpha Phi-shing Fraternity: Phishing Assessment in a Higher Education InstitutionJournal of Cybersecurity Education, Research and Practice
